Crypto scams have surged dramatically during bull markets, exploiting the heightened excitement and rush to invest. Today, scammers blend classic tricks with cutting-edge technologies, making it increasingly challenging to navigate safely. Understanding these evolving threats is vital to protect your crypto assets. Here’s a detailed breakdown of five prevalent crypto scams, how they operate, and practical strategies to avoid falling victim to them.
1. Copycat Tokens: Fakes Disguised as the Real Deal
One of the simplest yet most widespread scams involves copycat tokens. Scammers create counterfeit altcoins mimicking well-known projects by using identical or similar names and tickers. Anyone can deploy a token, which fraudsters exploit by cloning branding and riding waves of FOMO (Fear of Missing Out). They often design contracts with hidden traps—honeypots that let you buy but not sell or impose exorbitant sell fees that capture your entire investment.
Address Poisoning is a more subtle tactic linked to copycat tokens. Attackers send tiny transactions from addresses visually similar to yours (sharing the beginning and ending characters). This transaction appears in your wallet’s history, increasing the risk of accidentally sending funds to the scammer’s address when copying from recent activity—a technique even the FBI has warned about.
How to Stay Safe:
- Use Official Sources Only: Never rely on search bars to find tokens. Instead, obtain contract addresses from official project websites, verified social media accounts, or reputable documentation. Confirm the address across multiple platforms.
- Paste Contract Addresses on DEXs: Paste the verified contract address directly into your decentralized exchange rather than relying on token names.
- Heed Platform Warnings: Leading DEXs like Uniswap now flag suspicious tokens and warn users about dodgy features—respect these alerts.
- Perform Sanity Checks: Utilize tools such as Dex Screener to inspect token contracts for harmful features like excessive sell taxes.
- Test with a Burner Wallet: For early participation, conduct a small test transaction to verify you can sell the token without unreasonable fees.
- Avoid FOMO-driven Decisions: Legitimate tokens remain available after due diligence; don’t rush into unverified purchases.
2. Wallet Drainers: Code That Empties Your Funds
Wallet drainers are malicious codes designed to take control of a victim’s wallet assets. The most common route is through granting approval to a questionable smart contract when connecting your wallet to a fraudulent site or application. However, other vectors include malicious browser extensions and compromised software.
Recently, wallet drainers have become so sophisticated that they are offered as a “service” with client dashboards, updates, and customer support for criminals. High-profile incidents include attacks on respected crypto websites, fake airdrop scams, and multi-million-dollar thefts targeting whales.
Defense Strategies:
- Be Vigilant with Links: Only connect wallets to official project domains or verified social media accounts. Bookmark these for direct access.
- Cold Storage is Key: Keep your core funds offline in cold wallets, reserving “burner” wallets for risky interactions like new app mints or claiming airdrops.
- Revoke Unnecessary Approvals: Disconnecting a wallet doesn’t revoke on-chain permissions. Use wallet management tools like Rabby or third-party platforms like Revoke.cash to inspect and cancel approvals—even though it costs a small fee, it’s worthwhile insurance.
3. Shills and Rugs: Manipulated Hype for Insider Profit
Shills are paid promotions—whether articles, influencer endorsements, or celebrity hype—meant to artificially pump demand and price. This manufactured volume creates an ideal setup for a rug pull, where developers or insiders systematically drain liquidity or sell off large token holdings, leaving investors with worthless coins.
Rug pulls come in two forms:
- Hard Rugs: Immediate removal of liquidity, crashing the token’s value to zero.
- Slow Rugs: Gradual extraction of value over time with no intention to build, coupled with silence from the team.
Regulators have begun fining influencers and celebrities who promote cryptos without proper disclosures, but scams persist.
Tips to Avoid:
- Maintain Healthy Skepticism: Treat glowing promotions as marketing unless proven. Always check for disclosures like “#ad” or “sponsored.”
- Scrutinize Tokenomics: Review team and investor allocations, token unlock schedules, and marketing wallet activity.
- Be Wary of Celebrity Endorsements: When a celebrity pushes a token, approach with caution or avoid altogether.
4. Unknown Tokens in Your Wallet: The Hidden Traps
You may encounter mystery tokens suddenly appearing in your wallet with enticing balances and URLs embedded in their names or descriptions. These unsolicited tokens are traps designed to entice you into interacting—swapping, sending, or approving a transaction—that can result in your wallet being drained.
Scammers time such tokens to coincide with popular airdrops, preying on the urgency and excitement of claimants. Even hardware wallets like Ledger or Trezor cannot fully shield you here, as malicious approvals can be granted without compromising your private keys.
How to Protect Yourself:
- Ignore Unknown Tokens: Do not swap, send, or approve operations related to unsolicited tokens.
- Avoid Tokens with URLs: Any token name or description containing a URL is a red flag.
- Hide Suspicious Tokens: Adjust your wallet settings to conceal unknown or suspicious tokens, reducing accidental interactions.
- Use Burners for Airdrops: If you hunt airdrops, start from vetted official announcements and only use wallets with minimal funds.
- Never Share Keys or Seed Phrases: Legitimate airdrops won’t ask for your private keys or unlimited approvals.
5. Social Engineering: Human Manipulation Amplified by AI
The most insidious scams use social engineering—manipulating people directly through emails, texts, social media DMs, or live streams. Scammers pose as exchange support reps, project insiders, or celebrities offering free crypto, aiming to trick you into transferring funds or revealing sensitive information.
With AI, these scams have become even more convincing. For instance, during SpaceX’s Starship launch, over 35 fake Elon Musk live streams appeared, promoting fraudulent “send 1 BTC, get 2 back” schemes. Malicious trading bots marketed through AI-generated videos have also drained millions.
Best Practices:
- Never Respond to Unsolicited Offers: Legitimate projects or exchanges will not DM you first with offers or “help.”
- Verify Support Channels: Only engage through official websites, apps, or verified customer support.
- Avoid Suspicious Live Streams: If a stream incessantly pushes links or promises unreal rewards, exit immediately.
- Be Skeptical and Stay Educated: Maintain heightened vigilance, especially during market hype periods.
Final Thoughts: Vigilance Is Your Best Defense
The crypto market’s volatility and innovation invite bad actors who leverage new technologies and psychological tactics to deceive users. To safeguard your holdings:
- Prioritize official sources over convenience.
- Use cold storage and burner wallets strategically.
- Monitor and revoke unnecessary contract approvals.
- Stay skeptical of hype and unsolicited communication.
By understanding these scams in depth and applying caution, you can significantly reduce the risk of falling prey. Remember: when it comes to crypto security, taking a moment to think twice is worth far more than rushing a decision you might regret.
Stay safe and informed as you navigate the exciting but risky world of cryptocurrency!
By Wolfy Wealth - Empowering crypto investors since 2016
Subscribe to Wolfy Wealth PRO
Disclosure: Authors may be crypto investors mentioned in this newsletter. Wolfy Wealth Crypto newsletter, does not represent an offer to trade securities or other financial instruments. Our analyses, information and investment strategies are for informational purposes only, in order to spread knowledge about the crypto market. Any investments in variable income may cause partial or total loss of the capital used. Therefore, the recipient of this newsletter should always develop their own analyses and investment strategies. In addition, any investment decisions should be based on the investor's risk profile.