

"With the evolution of cryptocurrency comes new forms of fraud. It's your job to stay current and expand your knowledgebase and protection methods. Rely on evidence-based data as opposed to emotional motivations, as that is the only form of protection you can trust."

A crypto scam is a deceptive scheme that serves to steal either monetary value or private personal information from individuals or businesses. Crypto scams utilize the most appealing characteristics of cryptocurrencies: decentralisation, anonymity and speed of transaction. Scammers promise victims something that sounds too good to be true, such as easy profits, 'free tokens' or exclusive access to a project. The key is the scam artist utilising false representations to acquire funds or data from the unsuspecting victim.
Scammers in the crypto space take advantage of the anonymity of blockchain transactions and the ability to promise quick investment returns to commit fraud against unsuspecting individuals and businesses.
Since Bitcoin's emergence in 2009, the cryptocurrency space has grown significantly; and as the industry has grown, so have the number of scams, including Ponzi schemes and more complex attacks consisting of hacks and social engineering campaigns.
Organizations like Chainalysis report losses of over $7.7 billion from cryptocurrency-related fraud in 2022 alone, due largely to the unregulated but global availability of this particular currency type.
The common indicators of fraud across various types of scams are:
Unrealistic return rates.
Lack of or no information publicly available on the management team and the documents of record associated with this business.
High-pressure or "urgent" calls for you to make a quick investment decision.
Additionally, a project with unverifiable financial audits and whose management team lacks any form of public profile are further red-flags indicating that a given project is likely to be fraudulent.

Ponzi schemes and high-yield investment programs (HYIPs): Pay their early investors using the capital of new investors. Typically, as revenue generated drops, the scheme collapses.
ICO scams: Fake ICO's are designed to gather funding by promoting token pre-sales when there is no viable proof of concept for the product or business plan.
Phishing: Scammers attempt to deceive individuals into providing their keys or login credentials through spoofing websites, sending phishing emails, or using social media spoof accounts. Phishing is one of the largest theft categories, accounting for approximately 35% of all hacks.
Exchange Scams: Scammers provide false market data, steal funds by placing fake trades or staking interfaces, block/prevent access to accounts, or manipulate prices.
Pump-and-dump schemes: Scammers collaborate to artificially inflate the price of low liquidity tokens, sell at the peak price, and leave others with losses.
Rug pulls: Project creators and/or liquidity providers pull all liquidity from the decentralized pool, causing the token's price to crash.
Giveaway scams: Promise "free" tokens but require a nominal payment up front for verification.
Romance scams: Use emotional manipulation over time to get their victim to send them money or sensitive information.
Blackmail and extortion: The victim is threatened with the release of personal information or loss of their wallet unless they pay a ransom.
Honeypots: Malicious smart contracts that let individuals purchase a token but do not allow them to sell it, thereby permanently locking assets.
False News: Scammers create a volatile price for a token to profit off of volatility by disseminating false news about a token.
Transparent operating environment.
Team members were verified before development and are publicly listed.
Professional security audits conducted.
Strong user community and regular engagement.
Realistic roadmaps and viable use cases.
Creators are anonymous or fictitious.
Documentation was copied and pasted (plagiarized).
Suspicious tokenomics.
Hidden token lock-ups that cause severe price declines when released.
The main ways that thieves steal assets are through phishing, malware, SIM swapping, or exploiting API vulnerabilities. Once a thief has access to private keys or seed phrases, funds are quickly transferred to non-monitored accounts.
Hardware Wallet: Storing reasonable balances on a hardware wallet will save you 70% or more of your assets from being stolen.
Use Multi-Factor Authentication (MFA): Enable MFA for each of your accounts.
Practice Good Hygiene: Do not share private keys or seed phrases, and keep your hardware and software updated.
Vet Before Investing: Always vet any exchange or project before investing funds.
Stop all communication with the fraudster and report them to the platform's support team and to the appropriate authorities (regulatory agencies). Notify the community so others do not become victims. Keep all records of communications and documents; these are essential for investigations.
If you see ads for investments with quick returns, no risk, an anonymous team, or high-pressure tactics, you may be dealing with a scam.
No. Most new projects are low risk, but due diligence is required to ensure you aren't targeted by fraudsters.
Most cryptocurrency transactions are not reversible. Rapid reporting increases chances, but very few cases are recovered successfully.
Yes, it is the most common method for compromising wallets and accounts.
Cryptocurrency-related fraud is becoming more sophisticated. Continuous education and proactive security are your best defense. Use verified wallets, regulated exchanges, and data analysis to assess risk. With ASCN.AI, you receive real-time risk alerts to make informed, emotionless decisions.
|
Fraud Type |
Estimated Loss ($Billions) |
Reported Incidences |
Comments |
|
Ponzi or High Return (HYIP) |
4.5 |
12,000 |
Primarily targeting new investors |
|
Exchange Fraud |
3.2 |
5,500 |
Fake exchanges and hacks |
|
Rug Pull |
1.8 |
2,100 |
Most common in DeFi |
|
Phishing |
2.1 |
8,300 |
Social engineering |
|
Pump and Dump |
0.9 |
4,200 |
Price manipulation |
The total dollar value of cryptocurrency fraud has increased by approximately 60% in the last 3 years.
|
Characteristic |
Scam Projects |
Legitimate Projects |
|
Types of Teams |
Anonymous/Fictitious |
Verified/Public |
|
Type of Whitepaper |
Plagiarized, Empty |
Original, detailed, Audited |
|
Type of Tokenomics |
Improbable Yield, Risk of Dump |
Equalization; Good Vesting |
|
Communications |
Aggressive, little support |
Open, responsive |
|
Audit |
No or Fake Audit |
Audited by respected firms |
ASCN.AI's platform aggregated on-chain analytics and user sentiment after the Falcon Finance (FF) rug pull. By alerting thousands of individuals simultaneously during the loss event, ASCN.AI enabled users to take timely action to mitigate losses.
"The smart construction of your portfolio in addition to utilizing AI-driven automation within your portfolio will help you survive in a world of volatility within all asset classes."