Imagine waking up and realizing your hard-earned investment in crypto has vanished overnight. It’s a nightmare too many newcomers face. I’ve been trading and investing in digital assets for years, and I’ve watched scams evolve from crude copy-paste schemes to sophisticated, multi-step traps. The good news: once you know what to look for, you can avoid most of them. In this guide, written on September 20, 2025, I’ll walk you through the real-world red flags I watch for, the psychology scammers exploit, and the practical moves I use to protect my portfolio and help friends do the same.
Understanding the Rise of Crypto Scams
When Bitcoin first popped onto my radar over a decade ago, it was still a fringe experiment—an oddball idea for cypherpunks and curious technologists. Fast forward to today and cryptocurrencies have burst into the mainstream. They’re on TV ads, embedded in major fintech apps, and held by retail investors, family offices, and institutions. With that growth comes attention, liquidity, and opportunity—which is precisely what draws scammers.
The structure of crypto markets creates a perfect storm for fraudsters. You have permissionless assets that can move globally in seconds, pseudo-anonymous addresses, and irreversible transactions. If you send funds to a thief, there’s no bank to call to reverse the charge. Combine that with volatile prices and social media megaphones, and you get an environment where hype can be manufactured and urgency dialed up on command.
I remember 2017’s ICO boom like it was yesterday. A whitepaper and a slick website could raise millions overnight. By 2021, the grifts had upgraded: “yield farms” promising astronomical returns, cartoon avatar “communities” that vanished after a big mint, and token presales where the team dumped on day one. Then came social engineering at scale—fake support reps in Discord, “airdrop claim” pages that drained wallets, and celebrity “giveaway” videos deepfaked to look real. Each cycle teaches scammers what works, and they iterate. According to the ongoing Chainalysis Crypto Crime Report, scam tactics and volumes shift each year as criminals adapt to new defenses.
It’s not all doom and gloom. Tools have improved too. Wallets warn about risky transactions. Block explorers and analytics firms flag suspicious flows. Communities will call out bad actors quickly. Regulators, for better or worse, have become more active. But none of these removes your responsibility to verify. Cryptocurrency security starts with the investor—your habits, your skepticism, and your process.
The most important mindset shift is accepting that crypto’s openness is both its power and its risk. Anyone can launch a token. Anyone can DM you a “deal.” Anyone can spin up a convincing website in an afternoon. That means you can’t outsource your due diligence to vibes, followers, or a friend’s excited text. The standards you use in traditional finance—verifiable identities, audited code, track records—still apply here, and they matter more because there’s no safety net.
With that backdrop, let’s break down the specific red flags I teach every beginner to recognize. If you spot even one, slow down. If you spot two or more, step away.
If you spot even one, slow down. If you spot two or more, step away.
Red Flag 1: Unbelievable Returns

If there’s one rule I repeat to friends over coffee, it’s this: in crypto, gravity still exists. Risk and return travel together. When I see a project advertising “guaranteed 3% per day” or “double your coins in a week,” I don’t debate; I walk.
Here’s why those numbers are suspect. Sustainable returns come from actual economic activity—trading fees, lending interest from real borrowers, block rewards governed by protocol economics, or yield from staking that’s tied to network participation. These are variable by nature and move with market conditions. Unsustainable returns, on the other hand, usually come from one of three sources: newly deposited user funds (a Ponzi), token emissions without real demand (inflation masquerading as yield), or undisclosed leverage that magnifies both gains and losses until the music stops.
Back in 2021, I watched an acquaintance get pulled into a “high-yield platform” that promised 2% daily compounding if you deposited stablecoins. I warned him that even legendary hedge funds don’t annualize at those levels sustainably. He said, “But everyone is getting paid.” They were—until they weren’t. Payouts were just recycling new deposits. When withdrawals spiked, the site went dark and the Telegram admins disappeared.
Scammers also love to dress up promises with pseudo-math. You’ll see spreadsheets that project your $500 into six figures in a year “with just a few clicks.” Or they’ll claim “risk-free” arbitrage bots that mint profits from “inefficiencies” that somehow only they can access. When pushed for audited results or regulator filings, they deflect. When asked for proof-of-trade or proof-of-reserve, they provide screenshots. Screenshots can be faked in minutes. On-chain proofs and independent audits are what matter.
The simplest checks I use:
- Translate the offer into an annualized return. If a platform promises 1% per day, that’s roughly 3,678% per year with compounding. Ask yourself: does any legitimate business produce that without outsized risk?
- Look for the source of yield. If it’s “our secret algorithm,” assume the source is you.
- Demand verifiable third-party validation: code audits from known firms, public team identities with reputations at stake, and on-chain data that substantiates claims.
A quick side note: even realistic yields can hide structural risk. Liquidity can vanish. Smart contracts can have bugs. Token incentives can change. So even when returns don’t scream “scam,” I still size positions conservatively and test withdrawals early and often.
To make the difference concrete, here’s how I think about returns I’ve personally seen over the years versus promises that set off sirens.
Scenario | Typical/Realistic Return | Red Flag Examples |
---|---|---|
BTC/ETH long-term holding | Historically volatile; no guaranteed yield; returns depend on market cycles | “Guaranteed 10% weekly growth regardless of market direction” |
ETH staking | ~3–8% annualized, variable with network conditions | “Fixed 2% DAILY staking rewards, auto-compounded” |
Blue-chip DeFi lending | ~2–10% APY depending on asset/liquidity | “Risk-free 50% monthly on stablecoins” |
Market-neutral basis trade (pro level) | Single-digit to low double-digit annualized, fluctuates with funding | “100% monthly from arbitrage bot, zero risk” |
Early-stage token farming | Highly variable; can spike early then normalize; high risk | “3x your money in 14 days—guaranteed by smart contract” |
If you find yourself rationalizing why this time is different, pause. In my experience, the urge to believe is strongest right before the trap snaps shut.
Red Flag 2: Pressure to Act Quickly
Scammers hate time. Time lets you think, verify, ask questions, and compare notes with friends who might save you from yourself. That’s why so many frauds are engineered around urgency. They push you to make a decision before your critical thinking turns on.
I’ve seen countless flavors of this:
- Flash mints with ticking countdowns that play a sound when you “miss a slot.”
- “Limited whitelist” presales that mysteriously reset when you ask for documents.
- DMs from “admins” warning your account will be liquidated unless you click a link immediately.
- Airdrop claim pages that say your tokens will expire in minutes unless you sign a transaction now.
- Live streams faking a celebrity “event” where you must send coins within a short window to “participate.”
The psychology is simple: urgency narrows your focus to the promised reward (or the fear of missing out) and away from the process of verification. Scarcity—real or staged—makes mediocre offers look irresistible. Add social proof (bots posting fake “I got paid!” screenshots) and your brain starts arguing for the impulsive choice.
Here’s how I counter pressure in practice:
- I decide my minimum verification steps in advance. For example, before I send funds to any new platform, I require: a known team identity, at least one reputable code audit, on-chain liquidity that I can independently verify, and small test transactions that clear. If any piece is missing, my default answer is no.
- I use a “cooling-off rule.” If an offer can’t survive 24 hours of scrutiny, it doesn’t deserve my money. When I enforce this, most “opportunities” melt away on their own.
- I separate research from execution. I keep my funding wallets off the devices where I browse social media. This one habit makes impulse clicks physically harder.
A personal story: earlier this year, a friend pinged me about a “can’t-miss” presale that would end in 30 minutes. The site looked polished, the community on Discord was buzzing, and the tokenomics slide deck was a work of art. But the contract address wasn’t published, the team was “doxed” only to brand-new LinkedIn profiles, and the countdown timer had reset twice while we were chatting. We passed. Within two weeks, the website 404’d and the Discord was read-only. Dodging that bullet cost us nothing but a little adrenaline.
A final tell: anyone who becomes hostile when you ask basic due diligence questions is waving a crimson flag. Legitimate teams welcome auditors, skeptics, and critical feedback. Scammers try to isolate and rush you. Choose the projects that choose transparency.
Red Flag 3: Suspicious Communication Methods
If you spend time in crypto communities, you’ll see a pattern: the bigger the buzz, the more fake “helpers” appear. I’ve personally been impersonated by scammers DM’ing people in my name, and I’ve had my own relatives ping me about emails “from exchanges” claiming account issues. The communication layer is where social engineering thrives.
Common plays I watch for:
- Fake support reps: On Discord or Telegram, you ask a question in a public channel and instantly receive a DM offering to “assist.” Real support teams will never DM you first. They use tickets or official portals.
- Phishing emails and domain spoofs: One extra letter in a domain—exampIe.com instead of example.com—can fool a tired eye. Attackers copy branding perfectly and direct you to a pixel-perfect login page that steals your credentials or triggers a wallet-draining signature.
- “Security alert” SMS: You’ll get a text saying your withdrawal is on hold and to “verify” via a link. The link asks for your seed phrase, password, or 2FA code. No legitimate service asks for seed phrases. Ever.
- Deepfake video “giveaways”: Stream recordings looped to look live, asking viewers to send crypto to receive double back. There’s no return. The address just collects funds.
- Bot-filled group chats: I’ve been added to groups that look active but are entirely scripted. The “admin” drops a contract address; the “community” replies with rockets and fake profit screenshots. It’s theater.
How I filter and protect:
- Default-deny DMs. In Discord and Telegram, I disable DMs from server members and treat unsolicited messages as hostile until proven otherwise.
- Verify from first principles. If I get a message “from” an exchange or wallet provider, I never click the link. I navigate to the official site I already know, log in, and check for alerts there. If it’s important, it’ll be in my account dashboard, not just in my inbox.
- Create a dedicated “crypto email.” I use a unique, strong email address that I never post publicly and pair it with a hardware security key (FIDO2) for account logins. The fewer places my email appears, the fewer phish I attract.
- Inspect URLs and certificates. Before connecting a wallet, I read the entire domain name—especially the part immediately before the dot. I also check the site’s SSL certificate details; mismatches are a tell.
- Read the signature request. Wallet pop-ups will show exactly what you’re granting. If it asks for unlimited spend approval on a token I’m not intending to use, I cancel. If the function is obscure (permit, setApprovalForAll) and I’m not expecting it, I back out and research.
One more habit that’s saved me: I keep a “burner” wallet for experiments with tiny amounts. If a site insists I connect, I connect the burner first. If something feels off, I close the tab and revoke any approvals immediately using a trusted revoke tool from my bookmarks, not from search results.
“MetaMask will never ask you for your Secret Recovery Phrase.” — [MetaMask Support](https://support.metamask.io/hc/en-us/articles/360015489531-Never-share-your-Secret-Recovery-Phrase)
When your digital doorbell rings unexpectedly—email, DM, text—assume it’s a test. If you didn’t start the conversation, you don’t owe anyone a reply, a click, or a signature.
Practical Steps to Safeguard Your Investments
Red flags are the why; safeguards are the how. Over time I’ve settled on a security stack that balances convenience with strong protection. You don’t need to implement everything on day one, but every step here meaningfully reduces your risk of crypto scams and helps you avoid crypto fraud across the board.
“Not your keys, not your coins remains the fundamental truth of crypto custody.” — Andreas M. Antonopoulos
Wallet hygiene
- Use a hardware wallet for meaningful balances. Hot wallets are for coffee money and experiments; cold wallets are for savings.
- Split roles: one wallet for DeFi exploration, another for long-term holds, and a third burner for testing. Never connect your vault wallet to dApps.
- Back up seed phrases offline, on durable media, stored in two separate secure locations. Don’t take photos; don’t upload to cloud drives.
- Consider multisig (or smart contract wallets with account abstraction features) for high-value stores. Requiring two approvals—say, hardware key plus a second device—stops many single-point failures.
Authentication and devices
- Use a password manager with unique, long passwords for every exchange, email, and wallet-related account.
- Turn on phishing-resistant 2FA (hardware security keys) wherever supported. Authenticator apps are good; SMS is the weakest.
- Keep your primary trading device clean: no browser extensions you don’t need, no pirated software, and auto-updates enabled.
- Just starting out with on-ramps? Compare reputable options in our Best Cryptocurrency Exchanges for Beginners 2024.
Transaction discipline
- Test withdraws first. Before depositing significant funds into a platform, send a small amount and pull it back out. If withdrawals are “down for maintenance,” that’s your sign to exit, not to add more.
- Read every signature. If the wallet pop-up is unreadable jargon, copy the transaction data into a decoder you trust—again, from bookmarks, not search.
- Set spending limits. When approving token spend, choose a specific cap rather than unlimited approvals. Revoke approvals regularly.
⚠️ Warning: Never type or paste your seed phrase into any website, form, or chat. Only use it offline inside your wallet’s official recovery flow, and avoid granting unlimited token approvals you don’t absolutely need.
Research workflow
- Verify teams, audits, and on-chain activity. If the only evidence of legitimacy is social media buzz, keep your hands in your pockets.
- Cross-check contract addresses across multiple official sources. Scammers often publish near-identical tokens with one altered character.
- Size positions as if they can go to zero. Because sometimes they do.
To make implementation simple, I keep a living checklist. Here’s a condensed version you can adapt today.
Security Measure | What to Do | Why It Matters |
---|---|---|
Hardware wallet | Store meaningful holdings on a hardware device; keep firmware updated | Keeps private keys offline and resistant to malware |
Segmented wallets | Use separate wallets: vault, DeFi, burner | Limits blast radius if one wallet is compromised |
Seed storage | Write seed on durable medium; store in two secure locations | Prevents loss and theft; avoids cloud exposure |
Strong auth | Use password manager + hardware security keys; avoid SMS 2FA | Reduces account takeover risk from phishing/SIM swaps |
Test transactions | Send a small amount first; confirm withdrawal works | Verifies platform health and your address entry |
Approval hygiene | Approve minimal spend; periodically revoke old approvals | Prevents wallet-drainer exploits from old permissions |
URL verification | Bookmark official sites; triple-check contract addresses | Avoids phishing and fake tokens |
Device hygiene | Minimal extensions; no pirated apps; updates on | Lowers malware exposure on trading devices |
Research gate | Require docs, audits, and on-chain proof before funding | Filters hype-only projects and Ponzi structures |
Community cross-check | Ask trusted peers privately before committing | Adds collective experience to your decision-making |
Protecting your stack isn’t about paranoia—it’s about making fraudsters work so hard that they move on to softer targets. Layer enough friction on the scammer’s path, and most will give up.
The Impact of Crypto Scams on the Market
Every rug pull and phishing spree does more than hurt individual victims; it corrodes trust in the entire ecosystem. I’ve seen promising projects stall because newcomers—burned or scared—sit on the sidelines. Liquidity dries up, valuations compress, and builders spend cycles defending against FUD that scammers sparked.
Market-wide effects tend to cluster around a few themes:
- Liquidity shocks: When a large fraud is exposed, investors de-risk broadly. They pull capital from unrelated protocols, selling tokens to sit in stablecoins or fiat. That cascades into lower prices and wider spreads.
- Reputational damage: Friends ask me, “Isn’t crypto just scams?” That question hurts adoption more than any bear market. Convincing people to try again takes time and consistent good experiences.
- Regulatory reaction: High-profile blowups invite scrutiny. Sometimes that scrutiny is constructive—clearer rules, better disclosures, safer custody standards. Other times it’s blanket skepticism that chills innovation. Either way, scams shape the policy environment.
On the flip side, security has advanced because of hard lessons. Wallets now warn about suspicious approvals and simulate transactions before you sign. Some exchanges publish proof-of-reserve attestations. Smart contract audits are increasingly expected, not optional. And I’m optimistic about where things are heading: account abstraction features that let you set spending limits and social recovery; human-readable signing prompts; on-chain identity and reputation that make it harder for serial scammers to restart under new names; and better consumer education baked into the tools themselves.
If you’re a builder or community mod, you can help at scale. Default your community settings to block unsolicited DMs. Pin a “how to verify us” post with official links and contract addresses. Publish plain-English risk disclosures alongside your docs. Encourage third-party security reviews and celebrate the auditors who find issues before launch. The more we normalize good hygiene, the less room scammers have to maneuver.
Ultimately, markets are trust machines. Crypto’s promise is stronger, faster, borderless finance. That promise survives only if we make fraud expensive and transparency cheap.
Summary and Next Steps
Here’s the compact checklist I share with beginners and veterans alike. Seven red flags that, if spotted, should make you slow down or walk away:
1) Unbelievable returns
- If it’s “guaranteed,” “risk-free,” or compounding at daily rates that annualize to absurd numbers, it’s almost certainly a scam.
2) Pressure to act quickly
- Countdown timers, “last chance” messages, and hostile responses to due diligence are tools to short-circuit your judgment.
3) Suspicious communication methods
- Unsolicited DMs, phishing emails, fake support reps, and deepfake “giveaways” are the front door to theft. You decide who gets in.
4) Requests for seed phrases or private keys
- No legitimate service will ever ask for these. The moment someone does, you’ve identified a thief.
5) Unclear or dangerous signing requests
- Wallet pop-ups asking for unlimited spend approvals, “setApprovalForAll,” or inexplicable permissions unrelated to your action are a hard stop.
6) Fake endorsements and social proof
- Celebrity promos, paid shill threads, botted group chats, and edited “payment proof” screenshots are theater, not evidence.
7) Opaque teams, tokenomics, or audits
- If you can’t verify who built it, how it works, and who has reviewed the code, you’re not investing—you’re donating to strangers.
My final advice is simple: build habits that make safe choices automatic. Use hardware wallets, segment your funds, bookmark official sites, test with small amounts, and lean on trusted peers before you click. When something feels off, it usually is. I’ve passed on dozens of “opportunities” that later imploded, and I’ve never regretted missing those.
Stay skeptical, stay curious, and stay kind to people who are learning. Share this with a friend who’s new to crypto. The more we talk openly about how crypto scams operate and how to avoid crypto fraud, the stronger our communities become. And if you take one action today, make it this: pick one security measure from the checklist and implement it now. Small steps compound—just like good investments do.
Stay informed and share these insights with fellow crypto enthusiasts to build a safer investment community.
—

Steve Gregory is a lawyer in the United States who specializes in licensing for cryptocurrency companies and products. Steve began his career as an attorney in 2015 but made the switch to working in cryptocurrency full time shortly after joining the original team at Gemini Trust Company, an early cryptocurrency exchange based in New York City. Steve then joined CEX.io and was able to launch their regulated US-based cryptocurrency. Steve then went on to become the CEO at currency.com when he ran for four years and was able to lead currency.com to being fully acquired in 2025.