The 7 Most Common Crypto Scams of 2025. (And How To Avoid Them)

Written by
Ted Bloquet
October 22, 2025
5
min. read
Crypto scams happens in many shapes in 2025

From fake investment “opportunities” to AI-generated deepfakes and love-turned-fraud, scammers are evolving just as fast as the technology they exploit.

The results?

Billions of dollars lost every year, not from exchange hacks or code exploits, but from manipulation, persuasion, and trust.

These are social engineering scams, schemes that convince people to hand over their crypto willingly. No smart contract exploit required. Just human psychology.

Here’s a look at how and how much money has been stolen by crypto scammers over the past few years, and why awareness is still your best defense.

What counts as a crypto scam?

Any scheme that steals your coins (BTC, ETH, USDT, etc.) or tricks you into sharing sensitive info (seed phrase, private keys, passwords) by posing as an exchange, advisor, love interest, or “can’t-miss” investment.

Why scammers love crypto

  • Transactions are hard or impossible to reverse

  • No central “help desk”

  • Huge interest + low familiarity = easy targets
Approximate scam-only data from Chainalysis, FBI, and CertiK reports

The 7 big ones

1) “Too-good-to-be-true” investments (a.k.a. modern Ponzi)

How it works: A slick “manager” dangles oversized, fast returns and shows you a polished dashboard with fake profits. Withdrawals get mysteriously “fee-gated” or “KYC-blocked,” then the site ghosts. Often the “support team” keeps you paying to “unlock” funds.

Red flags: Guaranteed yields, countdowns, pay-to-withdraw, anonymous team, vague whitepaper, celebrity/“expert” endorsements (frequently deepfaked).

How to spot it: Verify the company in multiple sources (not just its own site). Test with a tiny deposit and a tiny withdrawal. If the story changes when you try to exit, that’s your sign.

2) Romance & “pig-butchering”

How it works: A long game on dating apps or chat platforms builds emotional trust, then pivots to “joint investing” on a fake platform. You’ll see staged wins (screenshots, dashboards) and be coached to “top up” to unlock bigger gains. When you ask to withdraw, fees and pressure spike, then they vanish.

Red flags: Avoids video calls or real-life meetings, pushes secrecy (“don’t tell your bank”), introduces crypto out of nowhere, claims convenient “insider” access.

How to spot it: Don’t mix romance and ROI.

If someone you barely know wants you off-platform (WhatsApp/Telegram) and into a private link or app, stop.

Pressure + secrecy = manipulation.

3) Phishing (email, DMs, support impostors)

How it works: You get an urgent message: “Your wallet is compromised, log in now.”

The link opens a perfect clone that captures credentials or seed phrases. In community servers, fake “mods” DM first, then direct you to “verify” on a malicious site.

Red flags: Slightly off URLs, grammar/spelling slips, “act now or lose everything,” requests for seed/private keys (legit support will never ask).

How to spot it: Type the URL yourself or use a trusted bookmark. Treat unsolicited DMs as hostile until proven otherwise.

For wallet connections, verify the domain and permissions before signing anything.

4) Pump-and-dump coins

How it works: Coordinated promoters hype a micro-cap toke,; price rockets on FOMO and thin liquidit,; insiders dump; chart falls off a cliff. “Partnerships” are often imaginary; “roadmaps” are copy-pasted.

Red flags: Paid promos masked as advice, unverified partnerships, Telegram/Discord groups promising “signals,” no utility beyond “number go up.”

How to spot it: Read independent sources and block explorers.

Check liquidity depth, holder distribution, and whether insiders control most supply.

If the only story is hype, walk away.

5) Fake crypto apps & wallets

How it works: Malicious apps/extensions impersonate legit wallets/exchanges, requesting excessive permissions or stealing keys.

Sideloaded APKs and TestFlight links are popular vectors.

Some fakes show your real balances, then prompt “security” actions that exfiltrate secrets.

Red flags: Not in official app stores, templated five-star reviews, sketchy publisher accounts, frequent permission prompts, broken features.

How to spot it: Download only via official sites or app stores linked from verified social profiles. Confirm publisher name.

If an app asks for your seed phrase to “restore” outside your control, stop.

6) Rug pulls / fake ICOs

How it works: A token/DeFi project launches with buzzy branding and influencer backing. Devs retain minting rights or liquidity control, then yank funds or flip a malicious function. Honeypot tokens may block selling entirely.

Red flags: Anonymous team with no history, unaudited contracts, opaque tokenomics, “can buy but can’t sell,” liquidity not locked or controlled by a single wallet.

How to spot it: Check audits from reputable firms, verify liquidity lock and timelocks, inspect contract permissions, and research the team’s prior repos.

If you can’t independently verify, assume risk is high.

7) Crypto “drainers”

How it works: A fake airdrop/mint or malicious dapp prompts you to connect a wallet and sign a transaction that quietly grants spending approvals.

Automated bots empty tokens the moment conditions are met. “Drainer-as-a-service” kits make this widespread.

Red flags: Random “claim” links, unfamiliar signatures, unlimited approvals, requests outside the dapp’s stated purpose.

How to spot it: Use a burner wallet for new dapps. Read the human-readable permission before you sign.

Regularly review and revoke stale approvals with a reputable token approval tool.

Verify wallet safety in seconds. Paste any address and see if it’s linked to scams, stolen funds, or the dark web. Check a wallet.

Pro tips to avoid all of the above

  • MFA everything. Turn on multi-factor authentication for exchanges, email, and password manager.

  • Seed phrase = master key. Never share it. Don’t store it in cloud notes/screenshots.

  • Type, don’t tap. For exchanges and wallets, type the URL yourself.

  • Hardware wallets for savings. Keep trading funds separate from long-term holdings.

  • Research before you send. Google the project, team, audits, and withdrawal experiences. Try a tiny test withdrawal first.

  • Be skeptical of urgency. Scarcity countdowns and “limited spots” exist to short-circuit judgment.

Sounds like a stupid tip, but it's actually a pro tip: If CZ DMs you a crypto opportunity, it’s not CZ.

If you think you’ve been scammed

  1. Stop sending funds and disconnect affected wallets (revoke approvals on reputable token approval checkers).

  2. Document everything: screenshots, TX hashes, wallet addresses, chat logs, domains.

  3. Report it:

    • US: FTC (reportfraud.ftc.gov) and FBI IC3 (ic3.gov)

    • File a ticket with the exchange/wallet you used (Coinbase, Binance, etc.)

  4. Warn others (platform reports, social posts). Even if you can’t recover funds, you can slow the scam and help others.

For builders & businesses

Keep your users, and treasury safer while you scale.

  • Notifications: Set up on-chain webhooks to spot high-risk patterns (sudden approvals, large transfers) and alert users in real time.

  • Data API: Monitor addresses, token allowances, and unusual flows without heavy node ops.

  • KMS: Sign transactions locally with Tatum KMS to reduce key-exposure risk.

  • Virtual Accounts: Add off-chain controls (limits, approvals) before funds hit the chain.

  • Fee Estimation: Prevent “stuck” txs scammers exploit by showing accurate fees and confirmations in-app.

Build it into your flow: Automate checks at signup, withdrawal, or counterparty add with Tatum’s Malicious Address endpoint.

Closing thought

The best alpha isn’t a secret group on Telegram, it’s your own awareness.