How to spot scams like "Tether Wallet Voting Rewards"

Phishing/Scam

Also Known As: Fake Tether Wallet Voting Rewards website

Damage level:

Get free scan and check if your device is infected.

Remove it now

To use full-featured product, you have to purchase a license for Combo Cleaner. Seven days free trial available. Combo Cleaner is owned and operated by RCS LT, the parent company of PCRisk.com.

What is "Tether Wallet Voting Rewards scam?

Our analysis shows that register-tether[.]xyz is a deceptive website designed to look like the official Tether page (tether.io). It offers rewards in exchange for voting, but its real purpose is to trick visitors into following instructions that can lead to the theft of their cryptocurrency. This website should not be trusted. If visited, it should be closed.

Tether Wallet Voting Rewards Scam

IMPORTANT NOTE: We do not review crypto projects, please do your own research when investing money.

Federal Trade Commission (FTC) states that since the start of 2021, more than 46,000 people have reported losing over $1 billion in crypto to scams – that's about one out of every four dollars reported lost, more than any other payment method.

"Tether Wallet Voting Rewards" scam in detail

Tether (tether.io) is a cryptocurrency designed to be worth around 1 US dollar, making it useful for quick, stable crypto transfers. This platform is not associated with the fake website, register-tether[.]xyz. On the fraudulent page, users are encouraged to vote in order to get rewards.

The deceptive page claims to be a "Tether Wallet" platform offering rewards to users. It provides a "Rewards Allocation" option that encourages users to vote on the amount and timing of future payouts. The page suggests that these rewards are meant for "active users". It also includes a "Vote Now" button.

The purpose of this page is to trick visitors into connecting their wallets. If they do so, the site activates a cryptocurrency drainer, a malicious tool designed to steal crypto from victims. This tool can transfer cryptocurrency from the victim's wallet to the scammer's. It is important to note that blockchain transactions cannot be undone.

Stolen cryptocurrency obtained through scams is usually very difficult, if not impossible, to recover. Users should carefully verify that a website is trustworthy before connecting their wallet.

Threat Summary:
Name Fake Tether Wallet Voting Rewards website
Threat Type Scam, Social Engineering, Fraud
Fake Claim Participants can get rewards
Disguise Legitimate Tether website
Related Domain register-tether[.]xyz
Detection Names (register-tether[.]xyz) PhishFort (Malicious), Full List Of Detections (VirusTotal)
Symptoms Unofficial domain, lack of official verification, unrealistic claims, too good-to-be-true promises
Distribution methods Fake social media accounts, deceptive websites, rogue online advertisements
Damage Cryptocurrency theft
Malware Removal (Windows)

To eliminate possible malware infections, scan your computer with legitimate antivirus software. Our security researchers recommend using Combo Cleaner.

Download Combo Cleaner

To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by RCS LT, the parent company of PCRisk.com.

Conclusion

Tether is a legitimate project, but scammers are using fake sites to imitate it. The fraudulent page (register-tether[.]xyz) promises rewards as a lure. Its real goal is to get users to connect their crypto wallets so their funds can be stolen. Crypto-related pages should be examined before interacting with them.

Some examples of similar scams are "Make Aliens Great Again ($MAGA) Allocation", "Sky Voting Rewards", and "Hyperswap Voting Rewards".

How did I open a scam website?

Crypto scams are often spread through fake or compromised social media accounts on platforms like Facebook, X (Twitter), and YouTube, as well as through hacked WordPress sites. They may also be promoted through malicious ad networks on torrent sites, illegal streaming pages, and other unsafe websites.

In other cases, users are redirected to these scams after clicking misleading ads, pop-ups, or fake download buttons. Scammers also use phishing emails, push notifications from untrustworthy sites, and advertisements generated by unwanted software (e.g., adware) to promote their scams.

How to avoid visiting scam pages?

Keep your operating system and all applications up to date. Download software from official sources (official pages or app stores), and avoid pirated programs or key generators. Be cautious with unexpected emails - do not click links or open attachments unless you are certain they are safe.

Avoid interacting with suspicious ads, pop-ups, or links on untrusted websites, and do not allow push notifications from suspicious websites. If your computer is already infected with unwanted apps, we recommend running a scan with Combo Cleaner Antivirus for Windows to automatically eliminate them.

The appearance of "Tether Wallet Voting Rewards" scam (GIF):

Appearance of Tether Wallet Voting Rewards Scam scam

The original Tether website (tether.io):

Tether Wallet Voting Rewards Scam real website wallet (tether.io)

Instant automatic malware removal:

Manual threat removal might be a lengthy and complicated process that requires advanced IT skills. Combo Cleaner is a professional automatic malware removal tool that is recommended to get rid of malware. Download it by clicking the button below:

DOWNLOAD Combo Cleaner

By downloading any software listed on this website you agree to our Privacy Policy and Terms of Use. To use full-featured product, you have to purchase a license for Combo Cleaner. 7 days free trial available. Combo Cleaner is owned and operated by RCS LT, the parent company of PCRisk.com.

Quick menu:

How to identify a pop-up scam?

Pop-up windows with various fake messages are a common type of lures cybercriminals use. They collect sensitive personal data, trick Internet users into calling fake tech support numbers, subscribe to useless online services, invest in shady cryptocurrency schemes, etc.

While in the majority of cases these pop-ups don't infect users' devices with malware, they can cause direct monetary loss or could result in identity theft.

Cybercriminals strive to create their rogue pop-up windows to look trustworthy, however, scams typically have the following characteristics:

  • Spelling mistakes and non-professional images - Closely inspect the information displayed in a pop-up. Spelling mistakes and unprofessional images could be a sign of a scam.
  • Sense of urgency - Countdown timer with a couple of minutes on it, asking you to enter your personal information or subscribe to some online service.
  • Statements that you won something - If you haven't participated in a lottery, online competition, etc., and you see a pop-up window stating that you won.
  • Computer or mobile device scan - A pop-up window that scans your device and informs of detected issues - is undoubtedly a scam; webpages cannot perform such actions.
  • Exclusivity - Pop-up windows stating that only you are given secret access to a financial scheme that can quickly make you rich.

Example of a pop-up scam:

Example of a pop-up scam

How do pop-up scams work?

Cybercriminals and deceptive marketers usually use various advertising networks, search engine poisoning techniques, and shady websites to generate traffic to their pop-ups. Users land on their online lures after clicking on fake download buttons, using a torrent website, or simply clicking on an Internet search engine result.

Based on users' location and device information, they are presented with a scam pop-up. Lures presented in such pop-ups range from get-rich-quick schemes to fake virus scans.

How to remove fake pop-ups?

In most cases, pop-up scams do not infect users' devices with malware. If you encountered a scam pop-up, simply closing it should be enough. In some cases scam, pop-ups may be hard to close; in such cases - close your Internet browser and restart it.

In extremely rare cases, you might need to reset your Internet browser. For this, use our instructions explaining how to reset Internet browser settings.

How to prevent fake pop-ups?

To prevent seeing pop-up scams, you should visit only reputable websites. Torrent, Crack, free online movie streaming, YouTube video download, and other websites of similar reputation commonly redirect Internet users to pop-up scams.

To minimize the risk of encountering pop-up scams, you should keep your Internet browsers up-to-date and use reputable anti-malware application. For this purpose, we recommend Combo Cleaner Antivirus for Windows.

What to do if you fell for a pop-up scam?

This depends on the type of scam that you fell for. Most commonly, pop-up scams try to trick users into sending money, giving away personal information, or giving access to one's device.

  • If you sent money to scammers: You should contact your financial institution and explain that you were scammed. If informed promptly, there's a chance to get your money back.
  • If you gave away your personal information: You should change your passwords and enable two-factor authentication in all online services that you use. Visit Federal Trade Commission to report identity theft and get personalized recovery steps.
  • If you let scammers connect to your device: You should scan your computer with reputable anti-malware (we recommend Combo Cleaner Antivirus for Windows) - cyber criminals could have planted trojans, keyloggers, and other malware, don't use your computer until removing possible threats.
  • Help other Internet users: report Internet scams to Federal Trade Commission.

Frequently Asked Questions (FAQ)

What is a fake crypto giveaway?

These scams are designed to steal cryptocurrency by tricking users into revealing sensitive information like recovery phrases, running malicious tools (e.g., crypto drainers), or transferring funds directly to cybercriminals.

What is the purpose of a crypto scam?

Their goal is to steal crypto by tricking individuals into exposing private details, running harmful tools like drainers, or transferring crypto to fraudsters.

Why do I encounter scam websites?

Scams are commonly spread through fake or hacked social media profiles, phishing emails, and compromised websites. Criminals also use shady advertising networks often seen on torrent platforms and illegal streaming sites to push malicious content. In addition, users may encounter scams via notifications from unreliable sites, deceptive pop-ups, misleading advertisements, or unsafe links on untrusted pages.

Will Combo Cleaner protect me from scams?

Yes, Combo Cleaner is capable of detecting potentially unsafe website behavior and alerting users to help them avoid malicious sites.

Share:

facebook
X (Twitter)
linkedin
copy link
Tomas Meskauskas

Tomas Meskauskas

Expert security researcher, professional malware analyst

I am passionate about computer security and technology. I have an experience of over 10 years working in various companies related to computer technical issue solving and Internet security. I have been working as an author and editor for pcrisk.com since 2010. Follow me on Twitter and LinkedIn to stay informed about the latest online security threats.

▼ Show Discussion

PCrisk security portal is brought by a company RCS LT.

Joined forces of security researchers help educate computer users about the latest online security threats. More information about the company RCS LT.

Our malware removal guides are free. However, if you want to support us you can send us a donation.

Donate