Table of Contents
- The Crypto Scam Landscape
- Common Crypto Scam Types
- Social Media Scams
- Phishing Attacks & Wallet Drainers
- Fake Exchange & Wallet Scams
- Investment Scam Red Flags
- How to Verify Legitimate Projects
- What to Do If You've Been Scammed
- Protecting Yourself: Security Checklist
- Scam Prevention Tools & Resources
Critical Warning
No legitimate person, company, or government agency will ever:
1. Ask for your seed phrase or private keys.
2. Guarantee investment returns in crypto.
3. Ask you to send crypto to "verify" your wallet or "unlock" funds.
4. Contact you first via DM to offer help or investment opportunities.
If any of these happen, you are being scammed. Stop all communication immediately.
The Crypto Scam Landscape
Cryptocurrency fraud has grown into a multi-billion-dollar criminal industry. The FBI's Internet Crime Complaint Center (IC3) reported that crypto-related fraud losses exceeded $5.6 billion in 2023, a 45% increase from the previous year. By 2025, global losses from crypto scams were estimated to surpass $8 billion annually. The pseudonymous and irreversible nature of blockchain transactions makes crypto an attractive target for fraudsters worldwide.
Understanding the scam landscape is your first line of defense. Scammers constantly evolve their tactics, but the underlying patterns remain remarkably consistent. Nearly every crypto scam relies on one or more of these psychological levers:
- Greed: Promises of extraordinary returns or free money
- Fear: Urgency, threats of losing access, or "limited time" pressure
- Trust: Impersonating authority figures, celebrities, or established brands
- Ignorance: Exploiting victims' lack of technical knowledge
- Isolation: Building personal relationships to manipulate victims privately
The good news: once you learn to recognize these patterns, you become virtually immune to the vast majority of scams. Let's break down every major category.
Common Crypto Scam Types
Ponzi & Pyramid Schemes
Crypto Ponzi schemes promise high, consistent returns funded not by legitimate trading or investment, but by new investors' deposits. Early participants may receive real payouts (funded by later victims), which creates social proof and encourages them to recruit others. Eventually, the inflow of new money slows, and the scheme collapses, leaving the majority of participants with total losses.
Real-World Example: BitConnect (2018)
BitConnect promised investors 1% daily returns through an alleged "trading bot." At its peak, the BCC token had a market cap exceeding $2.6 billion. When it collapsed in January 2018, investors lost an estimated $2.4 billion. Founder Satish Kumbhani was indicted by the U.S. DOJ in 2022 on fraud and conspiracy charges. The BitConnect case remains one of the largest crypto Ponzi schemes in history.
How to spot a Ponzi scheme:
- Guaranteed daily, weekly, or monthly returns (no legitimate investment can guarantee returns)
- Returns seem unusually high and consistent regardless of market conditions
- Heavy emphasis on recruiting new members with referral bonuses
- Vague or incomprehensible explanation of how profits are actually generated
- Difficulty withdrawing funds, especially during market downturns
Pump-and-Dump Schemes
A group of insiders accumulates a large position in a low-market-cap token, then uses coordinated social media campaigns, paid influencers, and messaging groups to create artificial hype. As retail buyers flood in and push the price up, the insiders sell their holdings at inflated prices. The price then crashes, leaving late buyers with worthless tokens.
How to spot a pump-and-dump:
- Sudden, unexplained price spikes in low-cap tokens with minimal trading history
- Aggressive promotion across Telegram, Discord, Twitter/X, and Reddit
- Influencers shilling a token they were paid to promote (often undisclosed)
- Claims that a token is "the next Bitcoin" or will "100x guaranteed"
- Very low liquidity and most tokens held by a small number of wallets
Fake ICOs & Token Sales
Scammers create professional-looking websites, whitepapers, and social media profiles for fictitious crypto projects. They raise funds through a fake Initial Coin Offering (ICO) or token presale, then disappear with investors' money. Some go further, creating actual (but worthless) tokens and listing them briefly on decentralized exchanges before pulling liquidity.
Warning signs:
- Anonymous team or team members whose identities cannot be verified
- Plagiarized whitepaper or one filled with vague buzzwords and no technical substance
- No working product, prototype, or GitHub repository
- Unrealistic roadmaps with no accountability milestones
- Pressure to invest immediately before the "presale ends"
Romance Scams & Pig Butchering
"Pig butchering" (from the Chinese term "sha zhu pan," meaning to fatten a pig before slaughter) is one of the fastest-growing and most devastating scam categories. In 2023, the FBI attributed over $3.9 billion in losses to investment fraud, much of it driven by pig butchering schemes.
The scam follows a consistent pattern:
- Initial contact: A stranger reaches out via dating apps (Tinder, Bumble, Hinge), social media, LinkedIn, or even a "wrong number" text message
- Relationship building: Over weeks or months, the scammer builds trust and emotional connection through daily conversations
- Introduction to crypto: The scammer casually mentions their success with crypto trading and offers to teach the victim
- The fake platform: The victim is directed to a fraudulent trading platform that shows fabricated profits
- Escalating deposits: Encouraged by fake "gains," the victim invests more and more money
- The slaughter: When the victim tries to withdraw, they're told they need to pay "taxes," "fees," or "deposits" to unlock their funds. Eventually, the platform disappears entirely
Pig Butchering Warning Signs
If someone you met online — especially on a dating app or through an unsolicited message — starts talking about crypto investing, it is almost certainly a scam. This applies even if they seem genuine, communicate for weeks, and appear emotionally invested. Many pig butchering operations are run by criminal organizations that employ hundreds of scammers working from scripts.
Giveaway Scams
"Send 1 BTC and receive 2 BTC back!" These scams impersonate celebrities (Elon Musk is the most commonly impersonated), crypto companies, or major exchanges. They appear on YouTube live streams (using deepfakes or re-streamed content), Twitter/X, and fake websites. The premise is always the same: send a small amount of crypto to "verify your wallet" and receive a larger amount back.
The reality: No legitimate person or organization will ever ask you to send crypto to receive more back. This is always a scam, 100% of the time, without exception.
Impersonation Scams
Scammers create fake social media profiles, websites, or email addresses that closely mimic legitimate companies, exchanges, wallet providers, or public figures. Common impersonation targets include:
- Exchange support: Fake Coinbase, Binance, or Kraken support accounts on Twitter/X and Telegram
- Wallet providers: Fake MetaMask, Ledger, or Trezor support
- Project founders: Fake Vitalik Buterin, CZ, or other crypto leaders
- Government agencies: Fake IRS, SEC, or law enforcement claiming you owe crypto taxes
Rug Pulls
A rug pull occurs when developers of a DeFi project or token suddenly withdraw all liquidity or funds, leaving investors with worthless tokens. This is especially common with new meme coins and unaudited DeFi protocols.
Real-World Example: Squid Game Token (2021)
The SQUID token, capitalizing on the popularity of the Netflix series, surged over 75,000% in days before the developers drained $3.4 million in liquidity and vanished. Investors could not sell because the token's smart contract contained a hidden anti-sell mechanism. The contract had never been audited, and the team was entirely anonymous.
Social Media Scams
Fake Celebrity Endorsements
Scammers create deepfake videos, fake screenshots, and doctored social media posts to make it appear that celebrities endorse a particular token or platform. With advances in AI-generated video and audio, these fakes have become increasingly convincing.
Common tactics include:
- Deepfake videos of Elon Musk, Jeff Bezos, or other tech figures promoting a "new crypto platform"
- Fake news articles on sites designed to look like Forbes, Bloomberg, or CNN
- Edited screenshots of celebrity tweets endorsing a token
- Hijacked verified YouTube channels re-streaming old content with scam overlays
Protection: Always verify endorsements through the celebrity's official, verified social media accounts. Legitimate endorsements will be on their actual profiles, not in ads or re-posted screenshots. If a celebrity is supposedly giving away crypto, check their real account — they're not.
Telegram & Discord Scams
Messaging platforms like Telegram and Discord are central to the crypto community, which makes them prime hunting grounds for scammers. Common tactics include:
- Fake admin DMs: Scammers create accounts with names nearly identical to real project admins and DM members with "support" or "airdrop" offers
- Fake announcement channels: Cloned channels that look identical to official ones, posting phishing links
- Scam bots: Automated bots that DM every new member of a crypto group with phishing links or fake "verification" requirements
- Pump-and-dump groups: Groups claiming to offer "insider signals" that are actually coordinating pump-and-dump schemes where the group admin profits and members lose
Protect Yourself on Discord & Telegram
Telegram: Go to Settings > Privacy and Security > set "Who can add me to groups" to "My Contacts" and disable auto-download of media. Never click links in DMs from unknown accounts.
Discord: Go to Settings > Privacy & Safety > disable "Allow direct messages from server members." Legitimate projects will never DM you first.
Phishing Attacks & Wallet Drainers
Fake Websites
Phishing websites are clones of legitimate crypto platforms designed to steal your credentials, seed phrases, or private keys. They are often nearly pixel-perfect copies of real sites with subtly altered domain names.
Examples of phishing domains:
coinbasse.cominstead ofcoinbase.commetamask.io.cominstead ofmetamask.iouniswwap.orginstead ofuniswap.orgledger-support.cominstead ofledger.com
These sites frequently appear as Google Ads at the top of search results. Scammers pay for ads targeting common crypto searches (e.g., "MetaMask download," "Uniswap exchange"), placing their phishing sites above the legitimate results.
Never Click Crypto Ads in Search Results
Google Ads for crypto services are one of the most common phishing vectors. Always scroll past ads to organic search results, or better yet, bookmark all crypto sites you use regularly and only access them through your bookmarks. Type URLs manually if you must, and double-check every character.
Wallet Drainers
Wallet drainers are malicious smart contracts or websites designed to trick you into signing a transaction that gives the attacker access to your funds. They have become increasingly sophisticated:
- Signature-based drains: You sign a seemingly harmless message that actually authorizes a token transfer (using EIP-2612 permits or similar standards)
- Approval drains: You approve a malicious contract to spend your tokens, and it immediately drains your wallet
- NFT drains: A "free mint" or airdrop claim site that actually transfers your valuable NFTs to the attacker
- setApprovalForAll exploits: A single transaction that gives the attacker permission to transfer all tokens in a specific collection from your wallet
Approval Exploits
When you interact with a DeFi protocol, you typically grant a "token approval" allowing the protocol's smart contract to spend your tokens. Many users grant unlimited approvals without realizing the risk. If the protocol is later compromised or was malicious from the start, the attacker can drain all approved tokens from your wallet — even long after your initial interaction.
| Approval Type | Risk Level | Description |
|---|---|---|
| Exact amount | Low | Only the specific amount you're transacting is approved. Safest option. |
| Unlimited approval | High | The contract can spend any amount of that token forever. Convenient but dangerous. |
| setApprovalForAll (NFTs) | Very High | The contract can transfer any NFT in that collection from your wallet. |
| Permit signatures (off-chain) | Very High | Gasless signatures that grant spending rights — you may not realize you're approving a transfer. |
Protection: Regularly audit and revoke unnecessary approvals using Revoke.cash, Etherscan's Token Approval Checker, or your wallet's built-in approval manager. Only approve the exact amounts needed for each transaction.
Fake Exchange & Wallet Scams
Scammers create entirely fake cryptocurrency exchanges and wallet applications to steal deposits. These operations can be shockingly elaborate, featuring professional websites, mobile apps (sometimes even sneaking past Apple App Store and Google Play review), customer support chatbots, and fabricated trading interfaces that show fake balances and profits.
Fake Exchanges
Fake exchanges typically operate in one of two ways:
- Deposit theft: The exchange accepts deposits but never allows withdrawals. When you try to withdraw, you're told you need to pay "verification fees," "taxes," or "insurance" first. These additional payments are also stolen.
- Credential theft: The exchange's login page captures your email and password, which attackers then try on real exchanges (credential stuffing). This is why unique passwords for every platform are essential.
How to identify a fake exchange:
- Not listed on CoinGecko or CoinMarketCap as a tracked exchange
- No verifiable regulatory registration or compliance information
- Domain registered recently (check with WHOIS lookup tools)
- No publicly known team or company registration
- Unsolicited recommendations, especially from online acquaintances
- Returns displayed on the platform seem impossibly high
Fake Wallet Apps
Counterfeit wallet applications have appeared in official app stores, mimicking popular wallets like MetaMask, Trust Wallet, and Phantom. These fake apps either steal your seed phrase during setup or redirect your deposits to the attacker's wallet.
Always Verify Wallet Downloads
Only download wallet apps from the official website of the wallet provider. For MetaMask, go to metamask.io. For Trust Wallet, go to trustwallet.com. Do not search for these apps in app stores — navigate to the official site and follow their download links. Check download counts and developer names carefully if using an app store.
Investment Scam Red Flags
While scam tactics evolve, the red flags remain remarkably consistent. If you encounter any of the following, treat the opportunity with extreme suspicion:
| Red Flag | What They Say | The Reality |
|---|---|---|
| Guaranteed returns | "Earn 5% daily, guaranteed!" | No investment can guarantee returns. This is the hallmark of a Ponzi scheme. |
| Urgency & pressure | "This offer expires in 24 hours!" | Legitimate investments don't have artificial deadlines. Scammers use urgency to prevent rational decision-making. |
| Unsolicited contact | "Hi, I'm a crypto expert who can help you..." | Real financial advisors don't cold-DM strangers on social media. |
| Celebrity endorsement | "Elon Musk recommends this platform!" | Almost always fabricated. Verify through official celebrity accounts only. |
| Recruitment incentives | "Earn 20% commission for every friend you refer!" | Multi-level referral structures are a defining characteristic of pyramid schemes. |
| Secret or exclusive access | "Only a select few get access to this opportunity." | Exclusivity creates FOMO. Real investments are transparent and open. |
| Complex withdrawal process | "Pay a 10% tax before you can withdraw." | Legitimate platforms never require additional deposits to process withdrawals. |
| Vague technology claims | "Our AI quantum algorithm generates profits." | Buzzword-heavy explanations with no verifiable substance signal fraud. |
"If it sounds too good to be true, it is." — This cliche exists because it is true in virtually 100% of crypto scam cases. Extraordinary returns require extraordinary proof — and scammers never have it.
How to Verify Legitimate Projects
Before investing in any cryptocurrency project, token, or platform, conduct thorough due diligence. Here's a systematic verification process:
Team Verification
- Check LinkedIn profiles: Do team members have real professional histories with verifiable employment? Or are they newly created profiles with stock photos?
- Search for interviews and conference talks: Legitimate founders typically have a public track record
- Verify identities: Reverse image search team photos to check for stolen images
- Anonymous teams are higher risk: While some legitimate projects (like Bitcoin) have anonymous founders, anonymity significantly increases scam risk for new projects
Technical Due Diligence
- GitHub activity: Is there an active, public code repository with regular commits from multiple developers?
- Smart contract audits: Has the code been audited by reputable firms? (CertiK, Trail of Bits, OpenZeppelin, Consensys Diligence, Halborn)
- Contract verification: Is the smart contract code verified and published on the block explorer (Etherscan, BscScan, etc.)?
- Tokenomics: Is the token distribution fair, or do insiders hold an outsized percentage?
- Liquidity lock: Is liquidity locked in a time-locked contract, or can developers withdraw it at any time?
Community & Reputation
- Independent reviews: Search for reviews on crypto forums, Reddit, and YouTube that are not promotional/paid
- Community engagement: Does the project have genuine community discussion, or is it all promotional content and bots?
- Media coverage: Has the project been covered by reputable crypto media outlets (CoinDesk, The Block, Decrypt)?
- Scam databases: Search the project name on scam-reporting platforms and the FTC's complaint database
Contract Analysis Tools
- Token Sniffer (tokensniffer.com): Automated contract analysis that detects common scam patterns
- RugDoc (rugdoc.io): Community-driven risk assessments of DeFi projects
- GoPlus Security (gopluslabs.io): Token security detection API
- DexScreener (dexscreener.com): View token holder distribution and liquidity data
- Bubblemaps (bubblemaps.io): Visualize token holder concentration and wallet connections
What to Do If You've Been Scammed
If you believe you've fallen victim to a crypto scam, take these steps immediately:
Immediate Actions
- Stop all communication with the scammer. Do not send any more money, even if they claim it's needed to "release" your funds
- Secure your accounts: If you shared credentials, change passwords immediately on all crypto-related accounts. If you shared your seed phrase, transfer any remaining funds to a brand new wallet with a new seed phrase as quickly as possible
- Revoke token approvals: If you interacted with a malicious smart contract, use Revoke.cash to revoke all approvals from the compromised wallet
- Document everything: Take screenshots of all conversations, transaction hashes, wallet addresses, websites, and any other evidence before the scammer deletes them
- Do not pay "recovery" fees: Scammers (or their associates) often contact victims again offering to "recover" stolen funds for a fee. This is always a second scam targeting the same victim
"Recovery" Scams Are Real
After being scammed, victims are frequently targeted by so-called "recovery agents" or "crypto recovery services" that claim they can retrieve stolen funds for an upfront fee. These are almost always scams. No private service can reverse blockchain transactions. If you see ads for crypto recovery services on social media, they are targeting scam victims for a second round of theft.
Reporting
Reporting is important even if recovery seems unlikely. It helps law enforcement track criminal networks, build cases, and potentially prevent future victims.
- FBI IC3 (ic3.gov): The FBI's Internet Crime Complaint Center — the primary reporting channel for U.S. victims of cyber fraud
- FTC (reportfraud.ftc.gov): Federal Trade Commission fraud reporting
- Local law enforcement: File a police report — this creates an official record
- Exchange reporting: If the scammer's address received funds through a centralized exchange, report it to that exchange's fraud department. Exchanges can freeze accounts associated with fraud
- Blockchain analytics firms: Companies like Chainalysis and TRM Labs work with law enforcement. Reporting helps build their intelligence databases
- Crypto scam databases: Report the scam on BitcoinAbuse.com, Chainabuse.com, or ScamAlert.sg to warn others
Recovery Options
Honest assessment: recovering stolen crypto is extremely difficult. However, there are some legitimate avenues:
- Law enforcement action: In some high-profile cases, law enforcement agencies have successfully seized and returned stolen crypto. The FBI recovered $30 million from the Ronin Bridge hack in 2022
- Exchange freezes: If stolen funds are sent to a regulated exchange, law enforcement can request an account freeze. Time is critical — report immediately
- Insurance: Some exchanges and DeFi protocols carry insurance that may cover certain types of theft
- Legal action: If you can identify the scammer, civil litigation is possible, though often impractical for smaller amounts or international cases
- Blockchain tracing: Professional blockchain analysis can sometimes trace funds through mixing services and bridges, but this typically requires law enforcement involvement
Protecting Yourself: Security Checklist
Use this comprehensive checklist as your daily defense against crypto scams:
Communication Security
- Never respond to unsolicited DMs about crypto investments
- Never share your seed phrase, private keys, or passwords with anyone
- Disable DMs from strangers on Discord and Telegram
- Verify that support requests go through official channels only (found on the project's verified website)
- Be deeply skeptical of anyone who contacts you first about crypto
Transaction Security
- Always double-check recipient addresses before sending crypto
- Send a small test transaction before transferring large amounts
- Review every transaction detail on your hardware wallet screen before confirming
- Only approve exact token amounts needed — never unlimited
- Use transaction simulation tools (like Pocket Universe or Blowfish) to preview what a transaction will do before signing
- Revoke unnecessary token approvals monthly using Revoke.cash
Platform Security
- Bookmark all crypto sites and only access them through bookmarks
- Never click crypto-related Google Ads
- Verify URLs character by character before entering any information
- Use a hardware wallet for all significant holdings
- Enable 2FA with an authenticator app (not SMS) on all exchange accounts
- Use unique, strong passwords generated by a password manager
- Set up anti-phishing codes on exchanges that offer them
- Whitelist withdrawal addresses on exchanges
Investment Security
- Research every project thoroughly before investing (team, code, audits, tokenomics)
- Never invest based on unsolicited advice from online acquaintances
- Reject any investment promising guaranteed returns
- Never send crypto to receive more back — this is always a scam
- Verify celebrity endorsements through official, verified accounts
- Only invest money you can afford to lose entirely
- Be suspicious of any investment opportunity that requires urgency
Device & Account Security
- Keep operating system, browser, and wallet software updated
- Use reputable antivirus software
- Consider a dedicated device for crypto transactions
- Never use public Wi-Fi for crypto transactions without a VPN
- Regularly review authorized sessions and API keys on exchange accounts
- Use a dedicated email address for crypto accounts
- Do not discuss your crypto holdings publicly
Scam Prevention Tools & Resources
Browser Extensions & Wallet Tools
| Tool | Type | What It Does |
|---|---|---|
| Pocket Universe | Browser extension | Simulates transactions before you sign them, showing exactly what will happen to your assets |
| Blowfish | Browser extension | Warns you about malicious transactions, phishing sites, and suspicious approvals |
| Revoke.cash | Web tool | View and revoke all token approvals you've granted to smart contracts |
| Wallet Guard | Browser extension | Real-time phishing protection that blocks known malicious crypto websites |
| ScamSniffer | Browser extension | Detects phishing websites and wallet drainers using on-chain data analysis |
Research & Verification Tools
| Tool | Use Case | URL |
|---|---|---|
| Token Sniffer | Analyze token contracts for scam patterns | tokensniffer.com |
| RugDoc | Community risk ratings for DeFi projects | rugdoc.io |
| Bubblemaps | Visualize token holder concentration | bubblemaps.io |
| DexScreener | View token liquidity, holders, and trading data | dexscreener.com |
| Chainabuse | Report and search for scam addresses | chainabuse.com |
| WHOIS Lookup | Check when a website domain was registered | whois.domaintools.com |
Reporting Platforms
- FBI IC3: ic3.gov — Report internet crime to the FBI
- FTC: reportfraud.ftc.gov — Report fraud to the Federal Trade Commission
- Chainabuse: chainabuse.com — Community-driven crypto scam reporting
- CFTC: cftc.gov/complaint — Report crypto fraud to the Commodity Futures Trading Commission
- Action Fraud (UK): actionfraud.police.uk — UK national fraud reporting
Educational Resources
- CFTC Crypto Education: Official U.S. government resources on crypto fraud awareness
- Chainalysis Blog: In-depth analysis of crypto crime trends and data
- SlowMist Hack Archive: Database of DeFi exploits and security incidents
- Rekt News (rekt.news): Investigative reporting on DeFi hacks and exploits
- Web3 is Going Just Great (web3isgoinggreat.com): Timeline of crypto scams, hacks, and failures
Knowledge Is Your Best Defense
The vast majority of crypto scams succeed because victims don't know the warning signs. By reading this guide, you've already made yourself significantly harder to scam. Stay informed, stay skeptical, and remember: legitimate opportunities never require urgency, secrecy, or upfront payments. When in doubt, slow down, research independently, and ask trusted community members for advice.