Fraud Risk Assessment: GigaHash

GigaHash
  • Editor Rating
  • Rated 1 stars
  • 20%

  • GigaHash
  • Reviewed by:
  • Published on:
  • Last modified: September 6, 2015
  • Legitimacy
    Editor: 1%

GigaHash (gigahash.org) was launched in January 2015 providing cloud mining services from Bulgaria. The company’s legitimacy has been evaluated based on the items listed below. Every individual item has been checked for the presence of obvious red flags or warning signals. If these are present, an explanation detailing what triggered them has been included. A detailed description of the reasons to evaluate each of the included items can be found below the table.

Persuasion
Total Flags: 9 (3 Warnings = 1 Flag)
Phantom Richesthumb-up-iconN/A
Scarcitythumb-up-iconN/A
Source Credibilitythumb-up-iconN/A
Social Proofexclamation_warningReferral program awarding 5 percent commission.
Reciprocitythumb-up-iconN/A
Products
Guaranteed Returnthumb-up-iconN/A
High Return / Low Riskthumb-up-iconN/A
Overly Consistent, Positive Returnsthumb-up-iconN/A
External Risk Insurancethumb-up-iconN/A
Hardware Equipment
Public Mining Addressflag-iconNo
Pictures of Mining Equipmentexclamation_warningNone
Secretive or Complex Equipmentexclamation_warningUsers buy GH/s lacking any significant description of underlying equipment. Risks of investing are not disclosed.
Service
Website Availablethumb-up-iconYes
Website Registration Detailsexclamation_warningRegistered January 30 2015, for a period a just 1 year.
Website Designflag-iconTerms of use only contain some generic statements clearly copied from elsewhere.
Grammar on Websiteexclamation_warningThe website contains a lot of weak grammer and errors, for example: "I have question", "instanses", "depoends on lots of factors" and "You will receive daily devidents until profit from mining is greeter than zero".
Payments Optionsexclamation_warningCryptocurrency/PayPal
Service Disruptions & Unbusinesslike Conductflag-iconExtremely limited and generic (almost meaningless) terms and conditions (limited legal basis for doing business).
Contact Informationflag-iconNo contact information (address or telephone number). A city (Varna) in Bulgaria is mentioned, but a specific address is not included.
Business
Verified Addressflag-iconWhois:
Tihomir Ganev
Varna West Industrial Zone
9000 Varna
Bulgaria

The website owner registered with email address [email protected] This address is related to six other domains:

pro-soccer.info
promociq.com
gitbet.com
betstrikes.com
koychev.com
prognozi.bg

These sites have mostly been registered under different owners, although the one that occurs most often is:

Tihomir Koychev/Ganev
Sofroniy Vrachanski 19 (Софроний Врачански)
7500 Silistra (Силистра)
Bulgaria

It leads to the conclusion that at least the main address for Gigahash is false, and that the latter address is most likely the only real address (given ownership of koychev.com).

There is also a Facebook profile with the name "Tihomir Koychev" in Silistra. The actual name on this profile shows "Тихомир Ганев", which translates to Tihomir Ganev - the owner name of gigahash.org.
Verified Ownerflag-iconSee "verified address"
Business Registrationflag-iconLikely fake address, see "verified address"
Independent Auditsexclamation_warningNone

Note that items with a warning instead of a flag indicate that these could occur at a legitimate company. For example, legitimate companies will normally try to persuade you into buying their products. Multiple warnings will, however, still trigger a flag. A description for the listed items is provided below. This list is meant to assist with identifying obvious scams, and therefore does not provide any guarantees that a company is truly legitimate.

Phantom Riches
The most common tactic used by fraudsters is called “phantom riches”. By dangling the prospect of wealth such as “big payoffs”, the scam artist tries to get you to stop thinking logically.

Scarcity
Using the fear of missing out, fraudsters create a false sense of urgency with statements such as “last chance” or “only so few available”. This causes people to agree hastily, before even having the opportunity to think about what they’re doing.

Source Credibility
Persuasion is more likely when the source presents itself as being credible, expert and trustworthy. Common tactics used by scammers to make themselves look legitimate include using fake websites or hacked emails and pretending to be someone they are not. Alternatively, sources can also be external with claims such as “Warren Buffet has already invested in this”.

Social Proof
Fraudsters take advantage of herd behavior by creating the illusion of consensus or social proof that the investment is legitimate with claims that “everybody is already doing it”, or referral programs in which members encourage their friends and associates to invest as well. This automatically triggers something in the head that says: “if everybody [or someone from the inner circle] wants it, it must be good”.

Reciprocity
A business is likely to receive far more of our trust when it provides a lot of free value, because of the rule of reciprocity which causes us to tend to feel obligated to return favors after people do favors for us

Guaranteed Return
All investments carry some degree of risk, so a guaranteed profit is a clear red flag. A valid question would be why an organization would try to sell such a scheme instead of using it to get rich themselves.

High Return / Low Risk
Like a guaranteed return, a high return / low risk investment opportunity also defies the common risk-return relationship. The best advice is an old one: “if it sounds too good to be true, it probably is”.

Overly Consistent, Positive Returns
Cryptocurrency markets are among the most volatile markets, hence the performance of any related product or service is also expected to fluctuate.

External Risk Insurance
The fraudster may present some external risk insurance for the investment in order to add to its credibility. In reality, insurance is only seldom acquired and guarantees typically lack substance. Dummy companies are often used to act as the guarantor or insurer.

Public Mining Address
A cloud mining company must have a public cryptocurrency address in order to participate in the mining process. There is no reason for a legitimate company not to disclose this.

Pictures of Mining Equipment
Cloud Mining companies should be able to provide some pictures of the products they are selling besides any textual descriptions.

Secretive or Complex Equipment
Even in the world of cryptocurrencies one should be skeptical about special competitive advantages without any proper disclosure, or when the information is incomprehensible or incomplete. Too often only the positive elements are accentuated.

Website Available
Considering the importance of  domains and websites in the internet age, there is almost no reason for a legit company not to have one.

Website Registration Details
Very few scam websites survive longer than one year, so domains are generally registered for just one year unless otherwise required for the specific domain. For the same reason, websites created less than one year ago should be considered suspicious.

Website Design
Amateurish, cluttered and disorganized websites can point to a scam as many scam sites use text and images from legit websites and other sources which may not work together very well.

Grammar on Website
Many scammers have limited English proficiency.

Payments Options
Even though cryptocurrency payment options are logical for a cryptocurrency company, it is also very convenient for scammers as the recipient essentially remains anonymous. The same goes for services such as Western Union and Moneygram. Hence a lack of alternative payment options should still be considered a warning signal.

Service Disruptions &  Unbusinesslike Conduct
Especially Ponzi scheme promotors will encourage participants to “roll over” their investment. These schemes are not very fond of investors cashing out, which may lead to difficulties receiving payments and a non-responsive or difficult to reach customer service.

Contact Information
Legitimate companies have very little reason not to list their contact information.

Business Verification
First, you should never hand your hard-earned money over without knowing where it is going. Second, you should do a background check to avoid handing it to a known scammer. Be weary of people without an online identity. Scammers will typically try to hide their identity or conceal their true identity to avoid being easily discovered.

Independent Audits
Audits certainly do not root out every instance of fraud, but auditors do have a responsibility to detect errors or fraud in the company’s financial statements.