Scams in general, have been around ever since humanity existed; and around a decade ago, it looks like scammers found another industry to make money off — the cryptocurrency space.

While bitcoin and cryptocurrencies sure have their advantages — unfortunately, just like with any other technology, there will always be some downsides. The cryptocurrency space is infested with scams simply due to the pseudo-anonymous nature of bitcoin and cryptocurrencies, which allows scammers to get away with huge heists with potentially little to no trace if they know what they’re doing.

The best way to not get caught up by these scams is to simply educate yourself and be extremely cautious in everything you see online in general, inside and outside the cryptocurrency

Listed and described below are most of the common scams that are currently being used in the cryptocurrency space.

Phishing Scams 🎣

One of the most effective scams until today; not only in the cryptocurrency space but on the world wide web in general.

A phishing scam is an attempt to steal account login information, credit/debit card information, your bitcoin or crypto wallet’s recovery phrase, or whatever valuable information that a bad actor can take advantage of, mostly through fake clone websites and software.

How the scam works

One simple way scammers spread phishing sites is through the Google ads platform. You do a simple Google search query, typing up “Binance”, and if you don’t use an ad blocker, there’s a decent chance that the top search result would be an advertisement.

Google ad phishing result impersonating Binance

It clearly says “www.binance.com/“, on the link text, but when you click on the link and take look at your browser’s address bar, there’s a decent chance that the site you’ve just opened is going to be something like “binancel.com“, “binancesite.co“, or something else that isn’t the legitimate “binance.com“.

Some of these methods are so tricky, as they use domains like “biṇaṇce.com“. You might not have noticed it immediately, but it’s actually an ‘‘, a Latin character.

Google ads are just one way of spreading phishing sites and software though. Other ways and methods of them spreading phishing sites and software include:

Always keep your eyes peeled. Some hackers and scammers are extremely smart, and they can create other more convincing ways to trick people into opening their phishing links. It’s heavily recommended that people always check their browser’s address bar if they’re actually on a legitimate website.

Fraudulent mobile apps

Fraudulent MEW mobile app listing in app store

Pretty much the same with phishing sites, but in the form of apps. Especially on the Google PlayStore for Android devices, there are A LOT of fraudulent mobile apps made to steal your funds.

Mostly faked apps include:

How to protect yourself

Twitter Giveaway and “doubling” Scams 🐦

Fortunately, Twitter giveaway scams have died down a bit, though they could still appear on Twitter once in a while.

Twitter giveaway scams are pretty straightforward. The scammer makes a fake Twitter account masquerading as a famous person(mostly people in the tech industry). The scammer would then reply to the legitimate person’s tweet, saying something along the lines of:

Fake Elon Musk giveaway tweet scam example

As you can see, Elon Musk’s legitimate Twitter handle is @elonmusk whereas the scammer is using the Twitter username @elonmusk___.

While this scam should be pretty obvious, unfortunately, some people still fall for it.

NOTE: While such scams mostly take place on Twitter, they can take place on any other social media site or website in general.

How the scam works

How to protect yourself

Investment Scams & Ponzi Schemes 🎩

Investment scams have existed pretty much even before the birth of the internet and the world wide web.

Investment scams and Ponzi schemes mostly have well-designed websites that claim to give you a 10% profit daily from your initial deposit or something along those lines.

They ask you to deposit a certain amount of money(or crypto, in this case), and promise a certain amount in return daily, weekly, or monthly. Some investment scams allow you to withdraw your profit for a while, in the hopes of you depositing more money, then they simply lock up your account after a while. Losing your access to your funds.

Common types of Investment and Ponzi schemes

Fraudulent Trading Bots

The victim is asked to “invest” in a trading bot, claiming that the trading bot can make the victim a certain amount of money in a certain period. Usually something enticing but unrealistic like 50% in 3 days or something similar.

Cloud Mining Scams

Similar to fraudulent trading bots where the victim is asked to deposit a certain amount of money for “cloud mining”, again, mostly with unrealistic promises of profit.

Bitcoin & Cryptocurrency Investment Scams

Again similar to the previous two, the scammer asks for a certain deposit, with unrealistic promises of profit. This scam is mostly used for people who have little to no idea and are totally clueless about what Bitcoin and cryptocurrencies are, and how they actually work.

**READ: The Types of Bitcoin & Cryptocurrency Wallets **

How the scam works:

How to protect yourself

Some famous crypto-related ponzi scams in the past

Pump And Dump Schemes 📉

Pump-and-dump style price chart behavior example

What the chart of a pump & dump coin commonly looks like. source

Pump and dump schemes are pretty easy to spot, as pump and dump group leaders usually advertise them as “trading signal groups“, or sometimes even straight-off shamelessly advertise them as “pump groups”.

The scheme is pretty straightforward: The group leader asks his/her members to buy a certain coin/token that is quite low in market cap to make the price far easier to manipulate, claiming that it will rise or “pump” in price.

Before the group leader announces which coin/token to buy, the leader already bought a significant amount of that certain coin/token, so the leader can sell them at a significantly higher price. The price of that coin/token does then increase because the group members buy loads of the specific coin/token, while the leader is selling at higher prices; earning the group leader significant amounts of profit, sometimes even as high as 10x.

How the scam works

How to protect yourself

Scam ICOs 🪙

Initial Coin Offerings or ICOs are quite similar to crowdfunding where the company/team accepts BTC/ETH from the people in exchange for a certain amount of their coins/tokens, depending on how much you sent them.

An ICO in itself isn’t necessarily a scam as some are definitely legitimate, but a big percentage of ICOs are indeed either a scam or are bound to fail. Unfortunately, some well-made ICO scams are quite hard to detect as a scammer could create a legitimate well-thought project and simply just not deliver the product and run away with the money. Though some characteristics could be enough proof for you to stay away from certain ICOs.

For a more in-depth guide about ICO scams: Detecting Scam ICOs

How the scam works

How to protect yourself

Gambling/Exchange Site Deposit Scams 🎰

This scam usually takes place by someone asking the victim to use a certain gambling site and then saying that they gave the victim some free bitcoin to start playing/gambling with. If the victim attempts to withdraw the funds, the website then asks the victim to deposit a certain amount of bitcoin, claiming that deposit to be for the “withdrawal fees”; but in fact, the victim is sending the bitcoin to the hacker’s bitcoin wallet. After the victim made a deposit, the scammer then runs away with the deposited bitcoin.

This scam usually is attempted via private messages on forums and some social media sites.

If someone on social media messages you that’s describing a similar scheme, take a few seconds and report the account to hopefully prevent other people from getting scammed.

How the scam works

How to protect yourself

**READ: How To Secure Your Bitcoin & Cryptocurrency Exchange Accounts

**

Airdrop Scams 🪂

A very common misunderstanding when taking part in cryptocurrency airdrops is that you have nothing to lose. Where, most of the time, you actually do have something to lose.

Private keys

Some scam airdrops take advantage of some people’s ignorance of how wallets work, by telling them to hand over their wallet’s private keys, effectively giving access to their funds to the scammers.

Email Accounts

The most common thing that an airdrop(scam or not) asks for.

For the more unethical scams though, they collect their participant’s emails, and either send them spam or sell the emails they collected to other companies.

Personal Documents

Some airdrops require the submission of personal identification documents like photos of your driver’s license, passport, birth certificate, etc.

While some legitimate airdrops require the submission of these documents for legitimate reasons like to prevent hoarders from claiming airdrops using multiple emails, most of the airdrops collect personal documents to either sell them or commit identity theft.

How the scam works

How to protect yourself

Fake Mining Hardware Sites ⛏️

Due to the hype of bitcoin and cryptocurrencies, bitcoin mining is also a hot topic from time to time.

Scammers take advantage of this hype by scamming people online who are trying to buy Application-specific integrated circuit(ASIC) miners from manufacturers like Bitmain.

The scammer simply creates a fake website, lists some ASIC miners like Bitmain’s famous Antminer, and accepts bitcoin payments as bitcoin payments are non-reversible. The scammer simply takes the money and doesn’t ship anything to the buyer, effectively stealing the buyer’s money.

Scammers mostly spread their fake mining hardware websites through:

How the scam works

How to protect yourself

Fraudulent Paper Wallet Generators 📄

Compromised paper wallet generator with attacker-controlled spend key

A paper wallet is a type of bitcoin and cryptocurrency wallet that you generate through an open-source HTML page, and simply print out on a piece of paper.

The way scammers take advantage of this is that they create their own version of a paper wallet generator, whereas they have access to every single paper wallet that you generate through their website.

They simply wait for a bitcoin deposit to the paper wallet’s address, and they either simply steal the money immediately, or sometimes they wait till the paper wallet holds a significant amount of bitcoin before they steal it.

Though we’re against using paper wallets in general due to the level of difficulty in creating an actual secure paper wallet, stick to the legitimate ones like bitaddress.org.

Hardware Wallet Scams 💾

Fraudulent Ledger Live popup requesting the full backup phrase

Fraudulent Ledger Live software. Source: u/Yobleed

A common misconception with hardware wallets is that when you’re using a hardware wallet, it’s going to be next to impossible for your funds to get stolen. But in fact, while reputable hardware wallets are secure, there are still some ways that scammers can steal your funds.

Fake Hardware Wallet Software

Hackers and scammers create almost exact duplicates of existing hardware wallet software like Ledger Live and create their own methods in attempting to steal their victim’s funds.

The most common way is by asking their victims to enter their wallet’s 24-word mnemonic phrase, effectively gaining total access to their victim’s money.

Tampered Hardware Wallet Packages

Tampered Ledger package scam with pre-scratched recovery card

A victim of a tempered Ledger wallet package

While there is currently no proof of someone managing to successfully tamper with a Ledger hardware wallet, hackers and scammers can take advantage of someone’s lack of knowledge of how wallets work.

In the case of the victim in the screenshot above, instead of the wallet buyer generating his own set of 24-word mnemonic phrase on the hardware wallet itself, he/she followed the fraudulent instructions of the scammer. Whereas the scammer included a pre-generated list of 24-words, a wallet that the scammer has access to.

QR Code Generator Scams 🔲

Fake Bitcoin address-to-QR converter website example

bitcoinaddresstoqrcode.com, a fake QR Code generator

It’s safe to assume that some people prefer using QR Codes rather than wallet addresses simply because it’s quicker to do a QR Code scan using a mobile phone.

Due to this, some people resort to using “QR Code Generators” or “converters” to convert a wallet address to a usable QR Code.

How the scam works

How to protect yourself

Fraudulent Bitcoin Forks 🍴

To put it simply, Bitcoin forks are different versions of Bitcoin; the most famous being Bitcoin Cash(BCH). And while the original Bitcoin(BTC) is what really matters, people can sell their forked bitcoin in exchange for a certain amount of money.

To be able to claim Bitcoin forks though, you’d need to enter your Bitcoin(BTC) wallet’s private keys into the Bitcoin fork’s wallet. And while there are legitimate Bitcoin fork wallets out there, there are also a lot of fraudulent ones.

How the scam works

How to protect yourself

Ransomware Attacks 🦠

Ransomware is a type of malware that once your device gets infected, the malware locks up your device’s operating system, rendering it unusable. The malware then demands a certain amount of bitcoin or other cryptocurrencies for your device to be usable again.

If your device has been infected with ransomware, all you need to do is to do a fresh install of your operating system and you’ll be good to go.

How to protect yourself

Clipboard hijacking attacks 📋

Clipboard hijacking malware replacing a pasted wallet address in Electrum

A clipboard hijacking attack is when a hacker gains access to your device’s clipboard, allowing the hacker to replace your clipboard with whatever the hacker wants.

While this is more of a “hack” than a “scam”, a hacker could get the malware to be installed on your device through various methods that scammers use.

How the scam works

How to protect yourself

Chargeback scams ↩️

A chargeback scam is a way for scammers to purchase bitcoin or cryptocurrencies(or other stuff online), pay for the purchase, and get their money back in the end.

This scam is mostly done using PayPal, as people can claim that a certain transaction wasn’t made by them, and there’s a good chance that PayPal will reverse that transaction.

How the scam works

How to protect yourself

Testnet scams 🧪

A “testnet”, regardless if it’s for Bitcoin or any other cryptocurrency, is an alternative blockchain, specifically to be used for testing purposes.

Since testnets use a different blockchain from the live blockchain of a specific cryptocurrency, coins from the live blockchain can’t be sent to the testnet version and vice versa. Hence, testnet coins can’t be used to pay for merchant payments and are pretty much worthless.

Mostly done using bitcoin testnet coins, unfortunately, scammers take advantage of people who don’t know what testnet coins are(regardless of how obvious it is due to the name “test-net”), and sell them these coins as if they’re actual “real” coins.

How the scam works

📙 Final Thoughts

While we covered a lot and most of the existing scams in this article, remember that hackers and scammers are very creative, and will invent more ways of tricking people in the future. This a reminder to always make it a habit of being skeptical.


- 😃 Help save a crypto wallet from getting stolen by sharing our [website](https://chainsec.io/)!