D CryptoHome
lang: zh en ja ko
Home Wiki Categories Download Download Register

Common Crypto Scams and How to Protect Yourself

Download Binance APP to Start Trading

Android users can download APK directly without VPN.

Crypto Scam Prevention Guide: How to Identify and Avoid Common Scams

The rapid growth of the crypto industry has attracted a large number of bad actors. Because transactions are irreversible and pseudonymous, crypto is a high-risk environment for fraud. According to various estimates, billions of dollars are lost to crypto scams every year. This article provides a systematic breakdown of common scam types and how to protect yourself.

Part One: Common Scam Types

1. Phishing and Impersonation Scams

Fake exchange and wallet websites

Scammers create websites that closely mimic legitimate exchanges or wallets, tricking users into entering their login credentials or seed phrases.

How to spot them:

  • Carefully check the URL spelling (e.g., "binance" replaced with "blnance")
  • Check the SSL certificate details
  • Access sites only through official channels — never click ads in search engine results
  • Save the correct URL as a browser bookmark

Fake customer support

Scammers impersonate exchange or project support staff, citing "account anomalies" or "verification requirements" as reasons to demand sensitive information.

How to spot them:

  • Official support will never contact you proactively to ask for your password or seed phrase
  • Do not resolve account issues through social media direct messages
  • Only use the official in-app support channel

Fake airdrops and giveaways

Scams using patterns like "send 1 ETH and receive 10 ETH in return."

How to spot them:

  • Any "giveaway" that requires you to send funds first is a scam — no exceptions
  • Genuine airdrops never require you to send any crypto
  • Verify whether the activity is announced on the project's official channels

2. Investment Fraud

Ponzi schemes and money games

Attract investors with promises of high, fixed returns, paying earlier investors with funds from newer ones — until the scheme collapses.

Warning signs:

  • Promises of fixed high returns (e.g., 1% daily, 20% monthly)
  • Multi-level referral bonus structures
  • Unable to clearly explain the source of returns
  • Continual pressure to deposit more
  • Withdrawal restrictions or high withdrawal thresholds

Notable examples:

  • BitConnect (collapsed 2018, losses exceeded $2 billion)
  • PlusToken (collapsed 2019, involved billions of dollars)
  • Various schemes marketed as "quantitative trading" or "smart arbitrage"

Rug Pulls

The project team attracts large amounts of capital, then suddenly removes liquidity or disappears with the funds.

Warning signs:

  • Anonymous team with no traceable identity
  • Code is not open source and has not been audited
  • Liquidity is not locked
  • Heavy marketing hype with no real product
  • The token contract contains hidden malicious functionality (e.g., can buy but not sell)

How to spot them:

  • Check whether liquidity is locked (verifiable with on-chain tools)
  • Inspect the token contract for unusual functions
  • Evaluate whether the team is named, verifiable, and has a credible track record
  • Confirm whether the project has an actual product or demonstrable progress

3. Social Engineering Scams

Pig butchering (romance-based investment fraud)

Scammers build relationships through social apps — messaging, dating platforms — and gradually lead victims to deposit funds into fraudulent platforms.

Typical flow:

  1. Meet through social media or a dating app
  2. Build trust through extended conversations
  3. "Casually" show off investment profit screenshots
  4. Guide the victim to open an account on a designated platform
  5. Allow small withdrawals initially to build trust
  6. Induce a large deposit, then shut down the platform

How to protect yourself:

  • Be skeptical of "investment experts" who initiate contact online
  • Never deposit on unfamiliar platforms
  • Only use well-known, regulated exchanges
  • Any claim of "guaranteed profits" is a scam

Fake KOLs and private groups

Impersonating well-known crypto analysts or running paid "insider" groups to push fake investment advice and manipulate prices.

How it works:

  1. Create a paid group or channel
  2. Post a token that is "about to explode"
  3. Group members buy in en masse, pushing the price up
  4. The operator sells at the top
  5. Price crashes, ordinary members are left holding losses

4. Technical Attack Scams

Approval phishing

Tricks users into signing a malicious smart contract approval. Once signed, the scammer can transfer tokens from the user's wallet.

How to protect yourself:

  • Do not connect your wallet to unknown websites
  • Read approval request details carefully before signing
  • Regularly check and revoke unnecessary approvals using tools like Revoke.cash
  • Use a separate wallet for DeFi interactions, distinct from your storage wallet

Malicious contract tokens

Some tokens have malicious logic baked into their smart contracts:

  • Can be bought but not sold (honeypot)
  • Selling triggers an extremely high tax (e.g., 99%)
  • The contract owner can mint unlimited additional tokens

How to protect yourself:

  • Do not buy tokens from unknown sources
  • Use tools like Token Sniffer to check contract safety
  • Before buying, test with a very small amount to confirm you can sell normally

Clipboard hijacking

Malware monitors your clipboard. When you copy a crypto address, it silently replaces it with the scammer's address.

How to protect yourself:

  • After pasting an address, always verify the first and last few characters
  • Use your exchange's address book feature
  • Keep your operating system and antivirus software up to date
  • Do not install software from untrusted sources

5. Fake Project Scams

Fake ICOs and IEOs

Issuing worthless tokens backed by a fraudulent white paper and exaggerated claims.

Copycat projects

Copying the code and branding of well-known projects to create confusion. Examples include:

  • Tokens claiming to be "V2" or "upgrade" versions of legitimate projects
  • Tokens with names similar to major coins
  • Fake NFT collections mimicking established series

Part Two: How to Identify Scams

Red Flag Checklist

Any of the following should trigger serious caution:

Red Flag Risk Level
Guaranteed capital and returns Extreme
Asked for seed phrase or private key Extreme
Anonymous team with no verifiable identity High
Code not open source and not audited High
Heavy marketing with no real product High
Price surged extremely quickly Medium-High
Community shows only positive comments, no criticism Medium
White paper is plagiarized or lacks substance Medium
Website is poorly made with incomplete info Medium

The DYOR Principle

Do Your Own Research is the most important principle in crypto:

  1. Verify the team: Search team members on LinkedIn, GitHub, and other platforms
  2. Review the code: Check the GitHub repository's commit history and code quality
  3. Check for audits: Confirm whether a reputable audit firm has published an audit report
  4. Analyze tokenomics: Are team allocations and unlock schedules reasonable?
  5. Assess the community: Is there organic discussion, or mostly bots?
  6. Compare to competitors: Does this project offer unique value, or is it a simple copy?

The Common Sense Test

If an investment opportunity:

  • Sounds too good to be true — it almost certainly is not true
  • Requires you to decide immediately — it is almost certainly a scam
  • Comes from an unsolicited recommendation by a stranger — there is almost certainly a financial motive
  • Claims zero risk and high returns — it is 100% a scam

Part Three: Security Best Practices

Account Security

  1. Use a different, strong password for every exchange
  2. Enable Google Authenticator (not SMS-based verification)
  3. Set an anti-phishing code
  4. Enable a withdrawal whitelist
  5. Never operate from a public device or public Wi-Fi

Wallet Security

  1. Never store your seed phrase or private key on any internet-connected device
  2. Use physical media (paper, metal plates) and keep multiple copies of your seed phrase in different secure locations
  3. Use a hardware wallet for large holdings
  4. Use separate wallets for different purposes
  5. Regularly review your wallet's token approvals

Information Security

  1. Do not publicly disclose your holdings on social media
  2. Do not click on any unfamiliar links
  3. Verify the authenticity of all information sources
  4. Only download apps from official channels
  5. Be alert to any request for private or sensitive information

Part Four: What to Do If You Are Scammed

If you become a victim of fraud:

  1. Act immediately

    • Move unaffected assets to a secure wallet
    • Change all related account passwords
    • Revoke all suspicious contract approvals
  2. Gather evidence

    • Save all transaction records and chat logs
    • Record the scammer's wallet address
    • Take screenshots of all relevant information
  3. Report and seek help

    • File a report with local law enforcement
    • Report suspicious addresses to the exchange
    • Flag the scammer's address on blockchain explorers
    • Contact relevant blockchain security companies
  4. Learn from the experience

    • Analyze how and why the scam succeeded
    • Strengthen your security practices to prevent recurrence
    • Share your experience with the community to warn others

Summary

In crypto, trust is the most valuable asset. Maintaining a healthy skepticism, thinking independently, and practicing strict security habits are the most effective defenses against scams. Remember one golden rule: if someone claims they can easily make you a lot of money, you are the money they plan to make.


Register on Binance | Download Binance App

📱
Download Binance APP to Start Trading

Android users can download APK directly without VPN.

Download Binance APP to Start Trading

Android users can download APK directly without VPN.

Author
CryptoHome Editorial Team Dedicated to crypto knowledge and encyclopedia writing