Fraudsters generally use one of three methods to execute this specific scam: 1. Phishing for Credentials The email provides a link to "claim" your prize.

Even PDF or Word files can execute malicious scripts.

It directs you to a cloned, fake login page of a popular exchange (like Coinbase or Binance).

Responding confirms to the scammer that your email address is active.

Mark the email as phishing/spam in your email client to train their filters.

If you have received or opened this email, execute the following steps immediately:

This file usually contains remote access trojans (RATs) or keystroke loggers.

{you Won 1 Btc} ❲GENUINE❳

Fraudsters generally use one of three methods to execute this specific scam: 1. Phishing for Credentials The email provides a link to "claim" your prize.

Even PDF or Word files can execute malicious scripts. {You won 1 btc}

It directs you to a cloned, fake login page of a popular exchange (like Coinbase or Binance). Fraudsters generally use one of three methods to

Responding confirms to the scammer that your email address is active. {You won 1 btc}

Mark the email as phishing/spam in your email client to train their filters.

If you have received or opened this email, execute the following steps immediately:

This file usually contains remote access trojans (RATs) or keystroke loggers.