
What to do if you’ve been Scammed
If you’ve fallen victim to a cryptocurrency scam it’s critical to take immediate action. At Crypto Consulting NZ, we specialize in scam support services tailored to your specific needs. We’ll help you confirm if you’ve been scammed, guide you through documenting your case, and provide expert advice on what to do.
Whether it’s a Malware or Rug Pulls our team can assist with every step of the process to ensure you’re informed and protected moving forward.
What is Malware?
Malware refers to any malicious software or code designed to infect, damage, or gain unauthorized access to computer systems. While different types of malware affect devices in various ways, their primary goal is to compromise the security and privacy of your system. Malware can target financial data and sensitive information leading to fraud, extortion, and identity theft.
Malware affects not only Windows PCs but also Macs, mobile devices, and other operating systems. Common types of malware include adware, spyware, viruses, botnets, trojans, worms, rootkits, and ransomware, all of which can infiltrate your device without your knowledge and cause significant harm.
How Malware Infects Devices
Malware typically infects your device after you unknowingly download or install malicious software, often by clicking on an infected link or visiting a compromised website. Most infections occur when users unintentionally trigger the malware, such as by clicking on a malicious email link or downloading a file from a sketchy website. Peer-to-peer file-sharing services and free software bundles are also common ways malware spreads, with hackers embedding malicious code in popular torrents.
Mobile devices are equally at risk, with malware sometimes delivered through infected text messages. Additionally, malware can be spread via USB sticks or flash drives, where it’s loaded onto the firmware, remaining undetected by most users. Once installed, malware begins its work, pursuing the hacker’s objectives—whether it’s stealing data or causing system disruptions.
Each type of malware operates differently once inside a system, but they all follow this basic infection pattern, exploiting unsuspecting victims.

Common Types of Malware
Ransomware: Ransomware locks or denies access to your device or critical files until you pay a ransom to the hacker. This type of malware is especially dangerous for individuals or organizations storing sensitive information, as it effectively holds your data hostage.
Spyware: Spyware secretly collects information from a device and transmits it back to the attacker. Popular spyware, such as Pegasus, monitors internet activity and gathers personal data like login credentials, credit card details, and financial information, often leading to identity theft or fraud.
Worms: Worms are self-replicating malware that spread from one device to another without requiring user intervention. Some worms act as delivery mechanisms for additional malware, while others simply spread, consuming network bandwidth and resources.
Adware: Adware displays intrusive advertisements on infected devices. While not always harmful, adware is highly annoying and can collect personal data to target users with personalized ads. It often comes bundled with free software like games or browser toolbars.
Trojans: Trojans disguise themselves as legitimate software, tricking users into installing them. Once activated, trojan malware can download additional malware or give attackers control over the infected device. The term “trojan” refers to the ancient Greek story of soldiers hiding inside a wooden horse to sneak into the city of Troy.
Botnets: A botnet is a network of computers infected with malware, controlled remotely by a hacker. These networks provide the attacker with collective processing power, often used for Distributed Denial of Service (DDoS) attacks, sending spam, stealing data, or generating fake ads.

The Evolution of Malware
Malware has evolved significantly since its inception in the early 1980s, becoming one of the most potent threats to digital security.
The first notable attack occurred in 1982 with the Elk Cloner virus, targeting Apple II systems via floppy disks. By 1990, cybersecurity analyst Yisrael Radai coined the term “malware” as viruses began hiding in document templates and infecting the growing number of Windows 95 PCs. The early 2000s saw the rise of worms like JS/Exploit-Messenger, which spread rapidly through instant messaging platforms. Adware became widespread by 2005, with pop-ups and malvertising disrupting user experiences. As social media platforms expanded in 2008, hackers exploited these networks with infected links.
The Stuxnet worm of 2010 demonstrated malware’s ability to wreak havoc on physical infrastructure. By 2013, ransomware made its mark with the CryptoLocker attack, while 2016 saw smart home devices hijacked by malware like Mirai to form botnets.
In 2019, ransomware surged in frequency, targeting governments and businesses worldwide. Finally, 2022 brought some of the largest corporate data breaches in history, with malware compromising millions of users’ information. As malware continues to evolve, it remains a significant threat to digital security globally, including New Zealand’s crypto industry.
How to Protect Against Malware Attacks
To protect yourself from malware attacks, using a comprehensive anti-malware program is essential. In addition to using anti-malware software, you can reduce your exposure by following these key steps:
- Avoid Clicking on Shady Pop-ups or Banner Ads: Don’t interact with ads that seem suspicious or too good to be true.
- Be Cautious with Links and Attachments: Only click on links or download attachments if you’re certain they are from trusted sources.
- Keep Your Software Updated: Regularly update your operating system, browsers, and apps to ensure you have the latest security patches.
- Install Apps from Trusted Sources: Only download mobile apps from official stores like the Apple App Store or Google Play.
- Check Program Ratings and Reviews: Before downloading any software, review user feedback to avoid malicious programs.
- Be Cautious with P2P Networks: Peer-to-peer networks can be a hotspot for malware, so exercise caution when using them.
- Back Up Your System Regularly: Regular backups can help you recover your data in case of a malware attack.

What to Do If You’ve Been Scammed
If you’ve fallen victim to malicious malware, it’s crucial to act quickly. While the decentralized nature of cryptocurrency makes recovering funds difficult, there are steps you can take to mitigate the damage.
Crypto Consulting NZ offers scam support services to guide you through the recovery process. Here’s what you should do:
- Document Everything: Save all correspondence, screenshots of transactions, and any relevant details about the scam. This information will be critical.
- Alert Your Bank: If you’ve shared bank details, contact your bank immediately to flag any suspicious activity or halt future transactions.
- Use Crypto Consulting NZ’s Scam Support Services: Crypto Consulting NZ specializes in helping victims of crypto scams by offering expert advice, guidance on documenting your case, and support through the process
- Secure Your Devices and Accounts: If your personal data or login credentials have been compromised, reset all passwords, enable two-factor authentication (2FA), and scan your devices for malware.