<img src="https://secure.52enterprisingdetails.com/787683.png" style="display:none;">
Skip to content

£7.2 billion siphoned off blockchains by cybercrime. 

Coincover protects against

Social engineering

When a malicious third party deceives an individual employee of your company and tricks them into sharing sensitive information that subsequently gives access to their digital assets and those digital assets are then stolen by the malicious third party. This is subject to you having followed your internal verification process which have been signed off by Coincover.

Spear phishing

A targeted email that is used to deceive a customer of your company into completing an action that gives a malicious third-party access to their digital asset accounts held with you and these account details are subsequently used to steal assets from the customers' account, subject to the customer having implemented the Two Factor Authentication policies you have set out and have been approved by Coincover.​

Ransomware

Where a system that holds the credentials/key material which are required to access your assets is impacted by ransomware, therefore preventing access to your digital assets.​

Sim swap

Where your/your customers' mobile phone provider has been compromised by a malicious third party and provided your/your customers' phone number to a new sim that is controlled by the malicious third party of which enables them to successfully pass through your cell phone based two factor authentication, proceed to access your account and send your digital assets to an alternative wallet that the malicious third-party controls.

Address poisoning

A situation where a bad actor has misled you into sending funds in an alternative wallet address by closely matching (within 2 characters) a previously used and trusted address by you.

Brute force attack

When a third-party gains access to your digital assets due to a repeated trial and error approach of guessing your log in credentials.

Man-in-the-middle

Where you have been subjected to a compromission of a secure communication channel which results in a malicious third- party intercepting and altering two parties communication which, in turn results in cryptocurrency being sent to the malicious third party, subject to you having followed your internal verification processes which have been signed off by Coincover.

Whaling

When a malicious third-party masquerades as a legitimate, known entity and deceives senior executives in an organisation into sharing sensitive information that subsequently gives access to their digital assets and those digital assets are then stolen by the malicious third party. This is subject to you having followed your internal verification process which have been signed off by Coincover.

Account Takeover (ATO)

A security breach in which an unauthorised person gains access to your customers' digital asset account on your platform and subsequently uses this access to successfully request that the digital assets are sent to an alternative wallet address.

Social engineering

When a malicious third party deceives an individual employee of your company and tricks them into sharing sensitive information that subsequently gives access to their digital assets and those digital assets are then stolen by the malicious third party. This is subject to you having followed your internal verification process which have been signed off by Coincover.

Spear phishing

A targeted email that is used to deceive a customer of your company into completing an action that gives a malicious third-party access to their digital asset accounts held with you and these account details are subsequently used to steal assets from the customers' account, subject to the customer having implemented the Two Factor Authentication policies you have set out and have been approved by Coincover.​

Ransomware

Where a system that holds the credentials/key material which are required to access your assets is impacted by ransomware, therefore preventing access to your digital assets.​

Sim swap

Where your/your customers' mobile phone provider has been compromised by a malicious third party and provided your/your customers' phone number to a new sim that is controlled by the malicious third party of which enables them to successfully pass through your cell phone based two factor authentication, proceed to access your account and send your digital assets to an alternative wallet that the malicious third-party controls.

Address poisoning

A situation where a bad actor has misled you into sending funds in an alternative wallet address by closely matching (within 2 characters) a previously used and trusted address by you.

Brute force attack

When a third-party gains access to your digital assets due to a repeated trial and error approach of guessing your log in credentials.

Man-in-the-middle

Where you have been subjected to a compromission of a secure communication channel which results in a malicious third- party intercepting and altering two parties communication which, in turn results in cryptocurrency being sent to the malicious third party, subject to you having followed your internal verification processes which have been signed off by Coincover.

Whaling

When a malicious third-party masquerades as a legitimate, known entity and deceives senior executives in an organisation into sharing sensitive information that subsequently gives access to their digital assets and those digital assets are then stolen by the malicious third party. This is subject to you having followed your internal verification process which have been signed off by Coincover.

Account Takeover (ATO)

A security breach in which an unauthorised person gains access to your customers' digital asset account on your platform and subsequently uses this access to successfully request that the digital assets are sent to an alternative wallet address.

Cyber Threats

Other risks mitigated by Coincover

Lost access

Eliminate single points of failure and benefit from a secure, non-custodial recovery solution.

Operational failure

Guard against operational business risks and boost credibility and user adoption.

Human error

Safeguard against sending funds to the wrong account, corrupt or deleted access material, and other common mistakes.

Technology failure

Shield assets from infrastructure vulnerabilities.​

Image
Image-2
Image-texture3
Image-texture3

Going beyond insurance in Blockchain and creating a new category of protection

We offer comprehensive protection against a wide array of risks and can customise our solution to meet your specific commercial, operational, or regulatory requirements.

MOST POPULAR

Core

  • One platform
  • Basic alerts
  • Quarterly reporting
  • 96 hour recovery SLA
  • Ransomware
  • Lost seed phrase
  • 2FA back up
  • Damaged or stolen device
  • Wallet provider / Custody failure
MOST POPULAR

Advanced

  • Up to 3 platforms
  • Custom alerts
  • Monthly reporting
  • Proof of protection certificate
  • 48 hour recovery SLA
Includes all Core features plus:
  • Whaling
  • Sim swap
  • Fat finger (mistyped address)
  • Spear phishing
  • Man in the middle
  • Internal bad actors
  • Brute force attack
  • Biometric security failure
  • Multi-factor security failure
BEST COVERAGE

Complete

  • Up to 5 platforms
  • Advanced alerts
  • Live reporting
  • Proof of protection certificate
  • 24 hour recovery SLA
Includes all Core and Advanced features plus:
  • Exit scams
  • Human error
  • Social engineering
  • Address poisoning
  • Supply chain hacks
  • Account takeover (ATO)
  • Staked key assets access
  • Insolvency crypto assets access