🕷️ Crawler Inspector

URL Lookup

Direct Parameter Lookup

Raw Queries and Responses

1. Shard Calculation

Query:
Response:
Calculated Shard: 180 (from laksa181)

2. Crawled Status Check

Query:
Response:

3. Robots.txt Check

Query:
Response:

4. Spam/Ban Check

Query:
Response:

5. Seen Status Check

ℹ️ Skipped - page is already crawled

📄
INDEXABLE
CRAWLED
9 days ago
🤖
ROBOTS ALLOWED

Page Info Filters

FilterStatusConditionDetails
HTTP statusPASSdownload_http_code = 200HTTP 200
Age cutoffPASSdownload_stamp > now() - 6 MONTH0.3 months ago
History dropPASSisNull(history_drop_reason)No drop reason
Spam/banPASSfh_dont_index != 1 AND ml_spam_score = 0ml_spam_score=0
CanonicalPASSmeta_canonical IS NULL OR = '' OR = src_unparsedNot set

Page Details

PropertyValue
URLhttps://usa.kaspersky.com/resource-center/definitions/cryptocurrency-scams
Last Crawled2026-04-10 02:10:29 (9 days ago)
First Indexed2020-10-01 22:27:12 (5 years ago)
HTTP Status Code200
Meta TitleHow To Avoid Cryptocurrency Scams
Meta DescriptionA cryptocurrency scam is a type of investment fraud. Learn how to spot a cryptocurrency scam & how to avoid cryptocurrency scams.
Meta Canonicalnull
Boilerpipe Text
Scammers are always looking for new ways to steal your money, and the massive growth of cryptocurrency in recent years has created plenty of opportunities for fraud. Cryptocurrency crime had a record-breaking year in 2021 – according to a report by blockchain data firm Chainalysis , fraudsters stole $14 billion of crypto that year. If you’re interested in crypto, it’s important to be aware of the risks. Read on to find out more about common crypto scams, how to spot them, and how to avoid them. Cryptocurrency investment scams There are many types of crypto scams. Some of the most common include: Fake websites Scammers sometimes create fake cryptocurrency trading platforms or fake versions of official crypto wallets to trick unsuspecting victims. These fake websites usually have similar but slightly different domain names from the sites they attempt to mimic. They look very similar to legitimate sites, making it difficult to tell the difference. Fake crypto sites often operate in one of two ways: As phishing pages: All the details you enter, such as your crypto wallet's password and recovery phrase and other financial information, end up in the scammers' hands. As straightforward theft: Initially, the site may allow you to withdraw a small amount of money. As your investments seem to perform well, you might invest more money in the site. However, when you subsequently want to withdraw your money, the site either shuts down or declines the request. Phishing scams Crypto phishing scams often target information relating to online wallets. Scammers target crypto wallet private keys, which are required to access funds within the wallet. Their method of working is similar to other phishing attempts and related to the fake websites described above. They send an email to lure recipients to a specially created website asking them to enter private key information. Once the hackers have acquired this information, they steal the cryptocurrency in those wallets. Pump and dump schemes This involves a particular coin or token being hyped by fraudsters through an email blast or social media such as Twitter, Facebook, or Telegram. Not wanting to miss out, traders rush to buy the coins, driving up the price. Having succeeded in inflating the price, the scammers then sell their holdings – which causes a crash as the asset's value sharply declines. This can happen within minutes. Fake apps Another common way scammers trick cryptocurrency investors is through fake apps  available for download through Google Play and the Apple App Store. Although these fake apps are quickly found and removed, that doesn't mean the apps aren't impacting many bottom lines. Thousands of people have downloaded fake cryptocurrency apps.   Fake celebrity endorsements Crypto scammers sometimes pose as or claim endorsements from celebrities, businesspeople, or influencers to capture the attention of potential targets. Sometimes, this involves selling phantom cryptocurrencies that don't exist to novice investors. These scams can be sophisticated, involving glossy websites and brochures that appear to show celebrity endorsements from household names such as Elon Musk. Giveaway scams This is where scammers promise to match or multiply the cryptocurrency sent to them in what is known as a giveaway scam. Clever messaging from what often looks like a valid social media account can create a sense of legitimacy and spark a sense of urgency. This supposed ‘once-in-a-lifetime’ opportunity can lead people to transfer funds quickly in the hope of an instant return. Blackmail and extortion scams Another method scammers use is blackmail. They send emails that claim to have a record of adult websites visited by the user and threaten to expose them unless they share private keys or send cryptocurrency to the scammer. Cloud mining scams Cloud mining refers to companies that allow you to rent mining hardware they operate in exchange for a fixed fee and a share of the revenue you will supposedly make. In theory, this allows people to mine remotely without buying expensive mining hardware. However, many cloud mining companies are scams or, at best, ineffective – in that you end up losing money or earning less than was implied. Fraudulent initial coin offerings (ICOs) An initial coin offering or ICO is a way for start-up crypto companies to raise money from future users. Typically, customers are promised a discount on the new crypto coins in exchange for sending active cryptocurrencies like bitcoin or another popular cryptocurrency. Several ICOs have turned out to be fraudulent , with criminals going to elaborate lengths to deceive investors, such as renting fake offices and creating high-end marketing materials. So, how to spot a crypto scam? Warning signs to look out for include: Promises of guaranteed returns: No financial investment can guarantee future returns because investments can go down as well as up. Any crypto offering that promises you will definitely make money is a red flag. A poor or non-existent whitepaper: Every cryptocurrency should have a whitepaper since this is one of the most critical aspects of an initial coin offering. The whitepaper should explain how the cryptocurrency has been designed and how it will work. If the whitepaper doesn’t make sense – or worse, doesn’t exist – then tread carefully. Excessive marketing: All businesses promote themselves. But one way that crypto fraudsters attract people is by investing in heavy marketing – online advertising, paid influencers, offline promotion, and so on. This is designed to reach as many people as possible in the shortest time possible – to raise money fast. If you feel that the marketing for a crypto offering seems heavy-handed or makes extravagant claims without backing them up, pause and do further research. Unnamed team members: With most investment businesses, it should be possible to find out who the key people behind it are. Usually, this means easy-to-find biographies of the people who run the investment plus an active presence on social media. If you can’t find out who is running a cryptocurrency, be cautious. Free money : Whether in cash or cryptocurrency, any investment opportunity promising free money is likely to be fake. How to protect yourself from cryptocurrency scams Many crypto frauds are sophisticated and convincing. Here are some steps you can take to protect yourself: Protect your wallet: To invest in cryptocurrency, you need a wallet with private keys. If a firm asks you to share your keys to participate in an investment opportunity, it’s highly likely to be a scam. Keep your wallet keys private. Keep an eye on your wallet app: The first time you transfer money, send only a small amount to confirm the legitimacy of a crypto wallet app. If you’re updating your wallet app and you notice suspicious behavior, terminate the update, and uninstall the app. Only invest in things you understand: If it’s not clear to you how a particular cryptocurrency works, then it’s best to pause and do further research before you decide whether to invest. Take your time: Scammers often use high-pressure tactics to get you to invest your money quickly – for example, by promising bonuses or discounts if you participate straightaway. Take your time and carry out your own research before investing any money. Be wary of social media adverts: Crypto scammers often use social media to promote their fraudulent schemes. They may use unauthorized images of celebrities or high-profile businesspeople to create a sense of legitimacy, or they may promise giveaways or free cash. Maintain a healthy skepticism when you see crypto opportunities promoted on social media and do your due diligence. Ignore cold calls: If someone contacts you out of the blue to sell you a crypto investment opportunity, it’s probably a scam. Never disclose personal information or transfer money to someone who contacts you in this way. Only download apps from official platforms: Although fake apps can end up in the Google Play Store or Apple App Store, it is safer to download apps from these platforms than elsewhere. Do your research: The most popular cryptocurrencies are not scams. But if you haven’t heard of a particular cryptocurrency, research it – see if there is a whitepaper you can read, find out who runs it and how it operates, and look for genuine reviews and testimonials. Look for an up-to-date and credible fake cryptocurrency list to check for scams. Is it too good to be true: Companies that promise guaranteed returns or to make you rich overnight are likely to be scams. If something seems too good to be true, tread carefully. Finally, as with any investment opportunity, never invest money you can’t afford to lose. Even if you're not being scammed, cryptocurrency is volatile and speculative, so it's essential to understand the risks. What to do if you fall victim to a crypto scam Falling victim to a cryptocurrency scam can be devastating, and it's essential to act quickly if you have made a payment or disclosed personal information. Contact your bank immediately if you have: Made a payment using a debit or credit card. Made a payment via bank transfer. Shared personal details about yourself. Crypto fraudsters often sell the details they have captured to other criminals. So, it’s essential to change your usernames and passwords across the board, to prevent further damage. If you are the victim of a social media crypto scam, you can report it to the relevant social media platform. Depending on where you live, you can report frauds to the relevant body in your jurisdiction – for example, in the US, that would be the Federal Trade Commission . Other countries have their own equivalents. Recommended products: Kaspersky Antivirus Kaspersky Premium Antivirus Kaspersky Internet Security Kaspersky Password Manager Kaspersky Secure Connection Further reading: What is cryptojacking and how does it work? Scam websites – what they are and how to avoid them How to report a website
Markdown
[Skip to main content](https://usa.kaspersky.com/resource-center/definitions/cryptocurrency-scams#main) Home Business Partners About us Security Solutions [PREMIUM PROTECTIONKaspersky PremiumBEST SELLERComplete protection for your devices, online privacy & identity](https://usa.kaspersky.com/premium)[ADVANCED PROTECTIONKaspersky PlusCombines security, performance & privacy features in one app](https://usa.kaspersky.com/plus)[STANDARD PROTECTIONKaspersky StandardEnhanced protection with device performance booster](https://usa.kaspersky.com/standard) [View All Solutions](https://usa.kaspersky.com/home-security) Privacy & Kids [PARENTAL CONTROLSKaspersky Safe KidsFlexible parental controls & GPS tracker for your kids.](https://usa.kaspersky.com/safe-kids)[VPNKaspersky VPN Secure Connection The private and secure VPN to enjoy the Internet without compromising on speed.](https://usa.kaspersky.com/vpn-secure-connection)[PASSWORD PROTECTIONKaspersky Password ManagerBank-grade security vault for your passwords & documents.](https://usa.kaspersky.com/password-manager) [Renew License](https://usa.kaspersky.com/renewal-center/home) [Support](https://support.kaspersky.com/) [Trials & Downloads](https://usa.kaspersky.com/downloads) [Kaspersky logo](https://usa.kaspersky.com/) - [Home](https://usa.kaspersky.com/home-security) - [Kaspersky Premium](https://usa.kaspersky.com/premium) - [Kaspersky Plus](https://usa.kaspersky.com/plus) - [Kaspersky Standard](https://usa.kaspersky.com/standard) - [Kaspersky Safe Kids](https://usa.kaspersky.com/safe-kids) - [Kaspersky VPN Secure Connection](https://usa.kaspersky.com/vpn-secure-connection) - [Kaspersky Password Manager](https://usa.kaspersky.com/password-manager) - [Renew License](https://usa.kaspersky.com/renewal-center/home) - [Support](https://support.kaspersky.com/) - [Trials & Downloads](https://usa.kaspersky.com/downloads) - Business - [KSOS Portal](https://ksos.kaspersky.com/#/auth/layout/ksos) - [Trials & Downloads](https://usa.kaspersky.com/small-business-security/downloads) - [Renew SMB license](https://usa.kaspersky.com/renewal-center/business) - [Find a partner](https://locator.kaspersky.com/b2b/) - [Company Account](https://companyaccount.kaspersky.com/account/login) - [Support](https://support.kaspersky.com/us/business) - [Cloud Console](https://ksc.kaspersky.com/) - [Product Training & Certification](https://support.kaspersky.com/learning) - Partners - [Find a reseller](https://locator.kaspersky.com/b2b/) - [Find a distributor](https://locator.kaspersky.com/distributors/) - [Partnership with Kaspersky](https://usa.kaspersky.com/partners) - About us - [Get to know us](https://usa.kaspersky.com/about) - [Transparency](https://usa.kaspersky.com/about/transparency) - [Corporate News](https://usa.kaspersky.com/about/press-releases) - [Kaspersky Academy](https://academy.kaspersky.com/) - [Awards & Recognitions](https://usa.kaspersky.com/about/awards) - [Top 3 Rankings](https://usa.kaspersky.com/top3) - [Press center](https://press.kaspersky.com/) - [Careers](https://careers.kaspersky.com/) - [Sponsorships](https://www.kaspersky.com/about/sponsorships/) - [Policy blog](https://usa.kaspersky.com/about/policy-blog) - [Contact us](https://usa.kaspersky.com/about/contact) Recurring searches for Resource center [What is Cryptocurrency and how does it work?](https://usa.kaspersky.com/resource-center/definitions/what-is-cryptocurrency) [What is the Deep and Dark Web?](https://usa.kaspersky.com/resource-center/threats/deep-web) [What is Cybersecurity? Definition, Types, Threats and Tips](https://usa.kaspersky.com/resource-center/definitions/what-is-cyber-security) My Account Personal [Sign in to My Kaspersky](https://my.kaspersky.com/) [Renew your license](https://usa.kaspersky.com/renewal-center/home) [Downloads](https://usa.kaspersky.com/downloads) [Support for Home](https://support.kaspersky.com/b2c/global) Business [Sign in to KSOS portal](https://ksos.kaspersky.com/) [Kaspersky Business Hub](https://cloud.kaspersky.com/) [Renew License](https://usa.kaspersky.com/renewal-center/vsb) [Support for Business](https://support.kaspersky.com/business) Americas [América Latina](https://latam.kaspersky.com/?ignoreredirects=true)[Brasil](https://www.kaspersky.com.br/?ignoreredirects=true)[United States](https://usa.kaspersky.com/?ignoreredirects=true)[Canada - English](https://www.kaspersky.ca/?ignoreredirects=true)[Canada - Français](https://www.kaspersky.ca/fr?ignoreredirects=true) Africa [Afrique Francophone](https://afrique.kaspersky.com/)[Maroc](https://www.kaspersky.ma/)[South Africa](https://www.kaspersky.co.za/?ignoreredirects=true)[Tunisie](https://afrique.kaspersky.com/) Middle East [Middle East (English)](https://me-en.kaspersky.com/?ignoreredirects=true)[الشرق الأوسط (Arabic)](https://me.kaspersky.com/?ignoreredirects=true) Western Europe [Belgique & Luxembourg](https://www.kaspersky.be/?ignoreredirects=true)[Danmark](https://www.kaspersky.dk/?ignoreredirects=true)[Deutschland & Schweiz](https://www.kaspersky.de/?ignoreredirects=true)[España](https://www.kaspersky.es/?ignoreredirects=true)[France](https://www.kaspersky.fr/?ignoreredirects=true)[Italia & Svizzera](https://www.kaspersky.it/?ignoreredirects=true)[Nederland](https://www.kaspersky.nl/?ignoreredirects=true)[Norge](https://no.kaspersky.com/?ignoreredirects=true)[Österreich](https://www.kaspersky.de/?ignoreredirects=true)[Portugal](https://www.kaspersky.pt/?ignoreredirects=true)[Sverige](https://www.kaspersky.se/?ignoreredirects=true)[Suomi](https://www.kaspersky.fi/?ignoreredirects=true)[United Kingdom](https://www.kaspersky.co.uk/?ignoreredirects=true) Eastern Europe [Česká republika](https://www.kaspersky.cz/)[Magyarország](https://hu.kaspersky.com/)[Polska](https://www.kaspersky.com.pl/)[România](https://www.kaspersky.ro/)[Srbija](https://www.kaspersky.rs/)[Türkiye](https://www.kaspersky.com.tr/?ignoreredirects=true)[Ελλάδα (Greece)](https://www.kaspersky.gr/)[България (Bulgaria)](https://bg.kaspersky.com/)[Қазақстан - Русский (Kazakhstan - Russian)](https://www.kaspersky.kz/)[Қазақстан - Қазақша (Kazakhstan - Kazakh)](https://www.kaspersky.kz/kk)[Россия и Белару́сь (Russia & Belarus)](https://www.kaspersky.ru/?ignoreredirects=true)[Україна (Ukraine)](https://ukraine.kaspersky.com/) Asia & Pacific [Australia](https://www.kaspersky.com.au/?ignoreredirects=true)[India](https://www.kaspersky.co.in/?ignoreredirects=true)[Indonesia (Bahasa)](https://id.kaspersky.com/?ignoreredirects=true)[Malaysia - English](https://www.kaspersky.my/?ignoreredirects=true)[Malaysia - Bahasa Melayu](https://www.kaspersky.my/ms/?ignoreredirects=true)[New Zealand](https://www.kaspersky.com.au/?ignoreredirects=true)[Việt Nam](https://www.kaspersky.com.vn/)[ไทย (Thailand)](https://www.kaspersky.co.th/)[한국 (Korea)](https://www.kaspersky.co.kr/)[中国 (China)](https://www.kaspersky.com.cn/?ignoreredirects=true)[香港特別行政區 (Hong Kong SAR)](https://www.kaspersky.com.hk/)[台灣 (Taiwan)](https://www.kaspersky.com.tw/)[日本語 (Japan)](https://www.kaspersky.co.jp/) For all other countries [Global Website](https://www.kaspersky.com/?ignoreredirects=true) [Home](https://usa.kaspersky.com/) [Home Products](https://usa.kaspersky.com/home-security) [Resource Center](https://usa.kaspersky.com/resource-center) [Definitions](https://usa.kaspersky.com/resource-center/definitions) Common cryptocurrency scams and how to avoid them # Common cryptocurrency scams and how to avoid them ![Common cryptocurrency scams and how to avoid them](https://content.kaspersky-labs.com/fm/press-releases/23/235d859405062bbe2dce144701e894c5/processed/cryptocurrency-scams-1-q75.jpg) Scammers are always looking for new ways to steal your money, and the massive growth of [cryptocurrency](https://usa.kaspersky.com/resource-center/definitions/what-is-cryptocurrency) in recent years has created plenty of opportunities for fraud. Cryptocurrency crime had a record-breaking year in 2021 – according to [a report by blockchain data firm Chainalysis](https://blog.chainalysis.com/reports/2022-crypto-crime-report-introduction/), fraudsters stole \$14 billion of crypto that year. If you’re interested in crypto, it’s important to be aware of the risks. Read on to find out more about common crypto scams, how to spot them, and how to avoid them. ## Cryptocurrency investment scams There are many types of crypto scams. Some of the most common include: **Fake websites** Scammers sometimes create fake cryptocurrency trading platforms or fake versions of official crypto wallets to trick unsuspecting victims. These fake websites usually have similar but slightly different domain names from the sites they attempt to mimic. They look very similar to legitimate sites, making it difficult to tell the difference. Fake crypto sites often operate in one of two ways: - As [phishing](https://usa.kaspersky.com/resource-center/threats/spam-phishing) pages: All the details you enter, such as your crypto wallet's password and recovery phrase and other financial information, end up in the scammers' hands. - As straightforward theft: Initially, the site may allow you to withdraw a small amount of money. As your investments seem to perform well, you might invest more money in the site. However, when you subsequently want to withdraw your money, the site either shuts down or declines the request. **Phishing scams** Crypto phishing scams often target information relating to online wallets. Scammers target crypto wallet private keys, which are required to access funds within the wallet. Their method of working is similar to other phishing attempts and related to the fake websites described above. They send an email to lure recipients to a specially created website asking them to enter private key information. Once the hackers have acquired this information, they steal the cryptocurrency in those wallets. **Pump and dump schemes** This involves a particular coin or token being hyped by fraudsters through an email blast or social media such as Twitter, Facebook, or Telegram. Not wanting to miss out, traders rush to buy the coins, driving up the price. Having succeeded in inflating the price, the scammers then sell their holdings – which causes a crash as the asset's value sharply declines. This can happen within minutes. **Fake apps** Another common way scammers trick cryptocurrency investors is through [fake apps](https://usa.kaspersky.com/resource-center/preemptive-safety/identifying-and-avoiding-fake-apps) available for download through Google Play and the Apple App Store. Although these fake apps are quickly found and removed, that doesn't mean the apps aren't impacting many bottom lines. Thousands of people [have downloaded fake cryptocurrency apps.](https://news.bitcoin.com/10000-people-downloaded-fake-cryptocurrency-apps/) **Fake celebrity endorsements** Crypto scammers sometimes pose as or claim endorsements from celebrities, businesspeople, or influencers to capture the attention of potential targets. Sometimes, this involves selling phantom cryptocurrencies that don't exist to novice investors. These scams can be sophisticated, involving glossy websites and brochures that appear to show celebrity endorsements from household names such as Elon Musk. **Giveaway scams** This is where scammers promise to match or multiply the cryptocurrency sent to them in what is known as a giveaway scam. Clever messaging from what often looks like a valid social media account can create a sense of legitimacy and spark a sense of urgency. This supposed ‘once-in-a-lifetime’ opportunity can lead people to transfer funds quickly in the hope of an instant return. ### Blackmail and extortion scams Another method scammers use is blackmail. They send emails that claim to have a record of adult websites visited by the user and threaten to expose them unless they share private keys or send cryptocurrency to the scammer. ### Cloud mining scams Cloud mining refers to companies that allow you to rent mining hardware they operate in exchange for a fixed fee and a share of the revenue you will supposedly make. In theory, this allows people to mine remotely without buying expensive mining hardware. However, many cloud mining companies are scams or, at best, ineffective – in that you end up losing money or earning less than was implied. **Fraudulent initial coin offerings (ICOs)** An initial coin offering or ICO is a way for start-up crypto companies to raise money from future users. Typically, customers are promised a discount on the new crypto coins in exchange for sending active cryptocurrencies like [bitcoin](https://usa.kaspersky.com/resource-center/definitions/what-is-bitcoin) or another popular cryptocurrency. Several ICOs have [turned out to be fraudulent](https://ethereumworldnews.com/consumers-lose-100-million-ico-exit-scams/), with criminals going to elaborate lengths to deceive investors, such as renting fake offices and creating high-end marketing materials. ## How to spot cryptocurrency scams So, how to spot a crypto scam? Warning signs to look out for include: **Promises of guaranteed returns:** No financial investment can guarantee future returns because investments can go down as well as up. Any crypto offering that promises you will definitely make money is a red flag. **A poor or non-existent whitepaper:** Every cryptocurrency should have a whitepaper since this is one of the most critical aspects of an initial coin offering. The whitepaper should explain how the cryptocurrency has been designed and how it will work. If the whitepaper doesn’t make sense – or worse, doesn’t exist – then tread carefully. **Excessive marketing:** All businesses promote themselves. But one way that crypto fraudsters attract people is by investing in heavy marketing – online advertising, paid influencers, offline promotion, and so on. This is designed to reach as many people as possible in the shortest time possible – to raise money fast. If you feel that the marketing for a crypto offering seems heavy-handed or makes extravagant claims without backing them up, pause and do further research. **Unnamed team members:** With most investment businesses, it should be possible to find out who the key people behind it are. Usually, this means easy-to-find biographies of the people who run the investment plus an active presence on social media. If you can’t find out who is running a cryptocurrency, be cautious. **Free money**: Whether in cash or cryptocurrency, any investment opportunity promising free money is likely to be fake. ![Is crypto a scam?](https://usa.kaspersky.com/content/en-us/images/repository/isc/2022/cryptocurrency-scams-2.jpg) ## How to protect yourself from cryptocurrency scams Many crypto frauds are sophisticated and convincing. Here are some steps you can take to protect yourself: **Protect your wallet:** To invest in cryptocurrency, you need a wallet with private keys. If a firm asks you to share your keys to participate in an investment opportunity, it’s highly likely to be a scam. Keep your wallet keys private. **Keep an eye on your wallet app:** The first time you transfer money, send only a small amount to confirm the legitimacy of a crypto wallet app. If you’re updating your wallet app and you notice suspicious behavior, terminate the update, and uninstall the app. **Only invest in things you understand:** If it’s not clear to you how a particular cryptocurrency works, then it’s best to pause and do further research before you decide whether to invest. **Take your time:** Scammers often use high-pressure tactics to get you to invest your money quickly – for example, by promising bonuses or discounts if you participate straightaway. Take your time and carry out your own research before investing any money. **Be wary of social media adverts:** Crypto scammers often use social media to promote their fraudulent schemes. They may use unauthorized images of celebrities or high-profile businesspeople to create a sense of legitimacy, or they may promise giveaways or free cash. Maintain a healthy skepticism when you see crypto opportunities promoted on social media and do your due diligence. **Ignore cold calls:** If someone contacts you out of the blue to sell you a crypto investment opportunity, it’s probably a scam. Never disclose personal information or transfer money to someone who contacts you in this way. **Only download apps from official platforms:** Although fake apps can end up in the Google Play Store or Apple App Store, it is safer to download apps from these platforms than elsewhere. **Do your research:** The most popular cryptocurrencies are not scams. But if you haven’t heard of a particular cryptocurrency, research it – see if there is a whitepaper you can read, find out who runs it and how it operates, and look for genuine reviews and testimonials. Look for an up-to-date and credible fake cryptocurrency list to check for scams. **Is it too good to be true:** Companies that promise guaranteed returns or to make you rich overnight are likely to be scams. If something seems too good to be true, tread carefully. Finally, as with any investment opportunity, never invest money you can’t afford to lose. Even if you're not being scammed, cryptocurrency is volatile and speculative, so it's essential to understand the risks. ## What to do if you fall victim to a crypto scam Falling victim to a cryptocurrency scam can be devastating, and it's essential to act quickly if you have made a payment or disclosed personal information. Contact your bank immediately if you have: - Made a payment using a debit or credit card. - Made a payment via bank transfer. - Shared personal details about yourself. Crypto fraudsters often sell the details they have captured to other criminals. So, it’s essential to change your usernames and passwords across the board, to prevent further damage. If you are the victim of a social media crypto scam, you can report it to the relevant social media platform. Depending on where you live, you can report frauds to the relevant body in your jurisdiction – for example, in the US, that would be the [Federal Trade Commission](https://reportfraud.ftc.gov/#/). Other countries have their own equivalents. **Recommended products:** - [Kaspersky Antivirus](https://www.kaspersky.com/antivirus) - [Kaspersky Premium Antivirus](https://www.kaspersky.com/premium) - [Kaspersky Internet Security](https://usa.kaspersky.com/internet-security) - [Kaspersky Password Manager](https://usa.kaspersky.com/downloads/password-manager) - Kaspersky Secure [Connection](https://www.kaspersky.com/vpn-secure-connection) **Further reading:** - [What is cryptojacking and how does it work?](https://usa.kaspersky.com/resource-center/definitions/what-is-cryptojacking) - [Scam websites – what they are and how to avoid them](https://usa.kaspersky.com/resource-center/preemptive-safety/scam-websites) - [How to report a website](https://usa.kaspersky.com/resource-center/preemptive-safety/how-to-report-a-website) [![](https://cdn.kaspersky.com/fm/site-editor/f6/f61bf2fc17b1e8ba3a6690b1987b34a6/processed/output-onlinepngtools-q93.png)](https://usa.kaspersky.com/downloads/premium-free-trial?icid=rc-premium-free-trial-skyscrapper-300x600&utm_source=rc&utm_medium=seo&utm_campaign=skyscaper&utm_term=premium) ## Common cryptocurrency scams and how to avoid them Kaspersky A cryptocurrency scam is a type of investment fraud. Learn how to spot a cryptocurrency scam & how to avoid cryptocurrency scams. ![Kaspersky logo](https://content.kaspersky-labs.com/se/com/content/en-global/images/homepage/kaspersky-logo/kaspersky-logo.svg) Share with your friends - [![](https://cdn.kaspersky.com/fm/site-editor/2f/2f0a7404c547065a1fe6eb7754282ff9/processed/facebook.svg)](https://www.facebook.com/sharer/sharer.php?u=https://usa.kaspersky.com/resource-center/definitions/cryptocurrency-scams) - [![](https://cdn.kaspersky.com/fm/site-editor/ad/ad34ec646b386d1a3c8fccd270d58bda/source/twitterx.svg)](http://twitter.com/share?url=https://usa.kaspersky.com/resource-center/definitions/cryptocurrency-scams) - [![](https://cdn.kaspersky.com/fm/site-editor/6e/6e58acdcfdbd7ecb043da3fc03848651/processed/linkedin.svg)](https://www.linkedin.com/sharing/share-offsite/?url=https://usa.kaspersky.com/resource-center/definitions/cryptocurrency-scams) - [![](https://cdn.kaspersky.com/fm/site-editor/5d/5d57477b76a23972f9ef486bf88a615d/processed/whatsapp.svg)](https://wa.me/?text=https://usa.kaspersky.com/resource-center/definitions/cryptocurrency-scams) ## Related articles ### [What is Digital Forensics?](https://usa.kaspersky.com/resource-center/definitions/digital-forensics) Who is responsible for cybercrime, and how can... [Read More](https://usa.kaspersky.com/resource-center/definitions/digital-forensics) ### [What is a Remote Access Trojan (RAT)? A cybersecurity guide](https://usa.kaspersky.com/resource-center/definitions/what-is-a-rat-remote-access-trojan) Discover the risks of RAT malware and how to... [Read More](https://usa.kaspersky.com/resource-center/definitions/what-is-a-rat-remote-access-trojan) ### [What is authorization vs authentication?](https://usa.kaspersky.com/resource-center/definitions/authentication-vs-authorization) Discover the key differences between... [Read More](https://usa.kaspersky.com/resource-center/definitions/authentication-vs-authorization) ### [What is 2FA, and why is it essential for online security?](https://usa.kaspersky.com/resource-center/definitions/what-is-2fa) Learn how Two-factor authentication (2FA) adds an... [Read More](https://usa.kaspersky.com/resource-center/definitions/what-is-2fa) ### [What is WPA2 (Wireless Protected Access 2)?](https://usa.kaspersky.com/resource-center/definitions/wireless-protected-access-2) WPA2 security is essential for keeping your... [Read More](https://usa.kaspersky.com/resource-center/definitions/wireless-protected-access-2) ### [What is passwordless authentication and how does it work](https://usa.kaspersky.com/resource-center/definitions/what-is-passwordless-authentication) Discover how passwordless authentication works,... [Read More](https://usa.kaspersky.com/resource-center/definitions/what-is-passwordless-authentication) ### [What is identity theft and how to prevent it](https://usa.kaspersky.com/resource-center/definitions/what-is-identity-theft) Identity theft can lead to serious consequences.... [Read More](https://usa.kaspersky.com/resource-center/definitions/what-is-identity-theft) ### [Preparing for Quantum Computing in Cybersecurity](https://usa.kaspersky.com/resource-center/definitions/what-is-quantum-computing) Is quantum computing the greatest cybersecurity... [Read More](https://usa.kaspersky.com/resource-center/definitions/what-is-quantum-computing) ### [What is Data Integrity and Why is it Important?](https://usa.kaspersky.com/resource-center/definitions/what-is-data-integrity) Maintaining data integrity is crucial for... [Read More](https://usa.kaspersky.com/resource-center/definitions/what-is-data-integrity) ### [What is APK and How to Install APK on Your Phone](https://usa.kaspersky.com/resource-center/definitions/what-is-apk) APK applications are the backbone of Android... [Read More](https://usa.kaspersky.com/resource-center/definitions/what-is-apk) [Home Solutions](https://usa.kaspersky.com/home-security) - [Kaspersky Standard](https://usa.kaspersky.com/standard) - [Kaspersky Plus](https://usa.kaspersky.com/plus) - [Kaspersky Premium](https://usa.kaspersky.com/premium) - [Kaspersky Safe Kids](https://usa.kaspersky.com/safe-kids) - [Kaspersky VPN Secure Connection](https://usa.kaspersky.com/vpn-secure-connection) - [Kaspersky Password Manager](https://usa.kaspersky.com/password-manager) - [All Solutions](https://usa.kaspersky.com/home-security) Device Specific Solutions - [Android Antivirus](https://usa.kaspersky.com/android-antivirus) - [Mac Antivirus](https://usa.kaspersky.com/mac-antivirus) - [Mobile Security](https://usa.kaspersky.com/mobile-security) - [Windows Antivirus](https://usa.kaspersky.com/windows-antivirus) Small & Medium Business - [Kaspersky Small Office Security](https://usa.kaspersky.com/small-business-security/small-office-security) - [Kaspersky Next EDR Foundations](https://usa.kaspersky.com/next-edr-foundations) - [Kaspersky Next EDR Optimum](https://usa.kaspersky.com/next-edr-optimum) - [All Products](https://usa.kaspersky.com/small-to-medium-business-security) Enterprise Solutions - [Kaspersky Next](https://usa.kaspersky.com/next) - [Kaspersky Cybersecurity Services](https://usa.kaspersky.com/enterprise-security/cybersecurity-services) - [Threat Management and Defense](https://usa.kaspersky.com/enterprise-security/threat-management-defense-solution) - [Kaspersky Next XDR Expert](https://usa.kaspersky.com/enterprise-security/xdr) - [Kaspersky Threat Intelligence](https://usa.kaspersky.com/enterprise-security/threat-intelligence) - [Hybrid Cloud Security](https://usa.kaspersky.com/enterprise-security/cloud-security) - [All Solutions](https://usa.kaspersky.com/enterprise-security) © 2026 AO Kaspersky Lab - [Privacy Policy](https://usa.kaspersky.com/web-privacy-policy) - Cookies - [Online Tracking Opt-Out Guide](https://www.kaspersky.com/web-privacy-policy/ccpa#optout) - [Anti-Corruption Policy](https://usa.kaspersky.com/anti-corruption-policy) - [License Agreement B2C](https://usa.kaspersky.com/end-user-license-agreement) - [License Agreement B2B](https://usa.kaspersky.com/business/eula) - [Contact Us](https://usa.kaspersky.com/about/contact) - [About Us](https://usa.kaspersky.com/about) - [Partners](https://usa.kaspersky.com/partners) - [Blog](https://usa.kaspersky.com/blog/) - [Resource Center](https://usa.kaspersky.com/resource-center) - [Press Releases](https://usa.kaspersky.com/about/press-releases) - [Sitemap](https://usa.kaspersky.com/sitemap) - [Careers](https://usa.kaspersky.com/about/careers) - [Unsubscribe from Push Notifications](https://usa.kaspersky.com/unsubscribe-from-push-notifications) United States Americas [América Latina](https://latam.kaspersky.com/?ignoreredirects=true)[Brasil](https://www.kaspersky.com.br/?ignoreredirects=true)[United States](https://usa.kaspersky.com/?ignoreredirects=true)[Canada - English](https://www.kaspersky.ca/?ignoreredirects=true)[Canada - Français](https://www.kaspersky.ca/fr?ignoreredirects=true) Africa [Afrique Francophone](https://afrique.kaspersky.com/)[Maroc](https://www.kaspersky.ma/)[South Africa](https://www.kaspersky.co.za/?ignoreredirects=true)[Tunisie](https://afrique.kaspersky.com/) Middle East [Middle East (English)](https://me-en.kaspersky.com/?ignoreredirects=true)[الشرق الأوسط (Arabic)](https://me.kaspersky.com/?ignoreredirects=true) Western Europe [Belgique & Luxembourg](https://www.kaspersky.be/?ignoreredirects=true)[Danmark](https://www.kaspersky.dk/?ignoreredirects=true)[Deutschland & Schweiz](https://www.kaspersky.de/?ignoreredirects=true)[España](https://www.kaspersky.es/?ignoreredirects=true)[France](https://www.kaspersky.fr/?ignoreredirects=true)[Italia & Svizzera](https://www.kaspersky.it/?ignoreredirects=true)[Nederland](https://www.kaspersky.nl/?ignoreredirects=true)[Norge](https://no.kaspersky.com/?ignoreredirects=true)[Österreich](https://www.kaspersky.de/?ignoreredirects=true)[Portugal](https://www.kaspersky.pt/?ignoreredirects=true)[Sverige](https://www.kaspersky.se/?ignoreredirects=true)[Suomi](https://www.kaspersky.fi/?ignoreredirects=true)[United Kingdom](https://www.kaspersky.co.uk/?ignoreredirects=true) Eastern Europe [Česká republika](https://www.kaspersky.cz/)[Magyarország](https://hu.kaspersky.com/)[Polska](https://www.kaspersky.com.pl/)[România](https://www.kaspersky.ro/)[Srbija](https://www.kaspersky.rs/)[Türkiye](https://www.kaspersky.com.tr/?ignoreredirects=true)[Ελλάδα (Greece)](https://www.kaspersky.gr/)[България (Bulgaria)](https://bg.kaspersky.com/)[Қазақстан - Русский (Kazakhstan - Russian)](https://www.kaspersky.kz/)[Қазақстан - Қазақша (Kazakhstan - Kazakh)](https://www.kaspersky.kz/kk)[Россия и Белару́сь (Russia & Belarus)](https://www.kaspersky.ru/?ignoreredirects=true)[Україна (Ukraine)](https://ukraine.kaspersky.com/) Asia & Pacific [Australia](https://www.kaspersky.com.au/?ignoreredirects=true)[India](https://www.kaspersky.co.in/?ignoreredirects=true)[Indonesia (Bahasa)](https://id.kaspersky.com/?ignoreredirects=true)[Malaysia - English](https://www.kaspersky.my/?ignoreredirects=true)[Malaysia - Bahasa Melayu](https://www.kaspersky.my/ms/?ignoreredirects=true)[New Zealand](https://www.kaspersky.com.au/?ignoreredirects=true)[Việt Nam](https://www.kaspersky.com.vn/)[ไทย (Thailand)](https://www.kaspersky.co.th/)[한국 (Korea)](https://www.kaspersky.co.kr/)[中国 (China)](https://www.kaspersky.com.cn/?ignoreredirects=true)[香港特別行政區 (Hong Kong SAR)](https://www.kaspersky.com.hk/)[台灣 (Taiwan)](https://www.kaspersky.com.tw/)[日本語 (Japan)](https://www.kaspersky.co.jp/) For all other countries [Global Website](https://www.kaspersky.com/?ignoreredirects=true) ![](https://mc.yandex.com/watch/98380790)
Readable Markdown
Scammers are always looking for new ways to steal your money, and the massive growth of [cryptocurrency](https://usa.kaspersky.com/resource-center/definitions/what-is-cryptocurrency) in recent years has created plenty of opportunities for fraud. Cryptocurrency crime had a record-breaking year in 2021 – according to [a report by blockchain data firm Chainalysis](https://blog.chainalysis.com/reports/2022-crypto-crime-report-introduction/), fraudsters stole \$14 billion of crypto that year. If you’re interested in crypto, it’s important to be aware of the risks. Read on to find out more about common crypto scams, how to spot them, and how to avoid them. ## Cryptocurrency investment scams There are many types of crypto scams. Some of the most common include: **Fake websites** Scammers sometimes create fake cryptocurrency trading platforms or fake versions of official crypto wallets to trick unsuspecting victims. These fake websites usually have similar but slightly different domain names from the sites they attempt to mimic. They look very similar to legitimate sites, making it difficult to tell the difference. Fake crypto sites often operate in one of two ways: - As [phishing](https://usa.kaspersky.com/resource-center/threats/spam-phishing) pages: All the details you enter, such as your crypto wallet's password and recovery phrase and other financial information, end up in the scammers' hands. - As straightforward theft: Initially, the site may allow you to withdraw a small amount of money. As your investments seem to perform well, you might invest more money in the site. However, when you subsequently want to withdraw your money, the site either shuts down or declines the request. **Phishing scams** Crypto phishing scams often target information relating to online wallets. Scammers target crypto wallet private keys, which are required to access funds within the wallet. Their method of working is similar to other phishing attempts and related to the fake websites described above. They send an email to lure recipients to a specially created website asking them to enter private key information. Once the hackers have acquired this information, they steal the cryptocurrency in those wallets. **Pump and dump schemes** This involves a particular coin or token being hyped by fraudsters through an email blast or social media such as Twitter, Facebook, or Telegram. Not wanting to miss out, traders rush to buy the coins, driving up the price. Having succeeded in inflating the price, the scammers then sell their holdings – which causes a crash as the asset's value sharply declines. This can happen within minutes. **Fake apps** Another common way scammers trick cryptocurrency investors is through [fake apps](https://usa.kaspersky.com/resource-center/preemptive-safety/identifying-and-avoiding-fake-apps) available for download through Google Play and the Apple App Store. Although these fake apps are quickly found and removed, that doesn't mean the apps aren't impacting many bottom lines. Thousands of people [have downloaded fake cryptocurrency apps.](https://news.bitcoin.com/10000-people-downloaded-fake-cryptocurrency-apps/) **Fake celebrity endorsements** Crypto scammers sometimes pose as or claim endorsements from celebrities, businesspeople, or influencers to capture the attention of potential targets. Sometimes, this involves selling phantom cryptocurrencies that don't exist to novice investors. These scams can be sophisticated, involving glossy websites and brochures that appear to show celebrity endorsements from household names such as Elon Musk. **Giveaway scams** This is where scammers promise to match or multiply the cryptocurrency sent to them in what is known as a giveaway scam. Clever messaging from what often looks like a valid social media account can create a sense of legitimacy and spark a sense of urgency. This supposed ‘once-in-a-lifetime’ opportunity can lead people to transfer funds quickly in the hope of an instant return. ### Blackmail and extortion scams Another method scammers use is blackmail. They send emails that claim to have a record of adult websites visited by the user and threaten to expose them unless they share private keys or send cryptocurrency to the scammer. ### Cloud mining scams Cloud mining refers to companies that allow you to rent mining hardware they operate in exchange for a fixed fee and a share of the revenue you will supposedly make. In theory, this allows people to mine remotely without buying expensive mining hardware. However, many cloud mining companies are scams or, at best, ineffective – in that you end up losing money or earning less than was implied. **Fraudulent initial coin offerings (ICOs)** An initial coin offering or ICO is a way for start-up crypto companies to raise money from future users. Typically, customers are promised a discount on the new crypto coins in exchange for sending active cryptocurrencies like [bitcoin](https://usa.kaspersky.com/resource-center/definitions/what-is-bitcoin) or another popular cryptocurrency. Several ICOs have [turned out to be fraudulent](https://ethereumworldnews.com/consumers-lose-100-million-ico-exit-scams/), with criminals going to elaborate lengths to deceive investors, such as renting fake offices and creating high-end marketing materials. So, how to spot a crypto scam? Warning signs to look out for include: **Promises of guaranteed returns:** No financial investment can guarantee future returns because investments can go down as well as up. Any crypto offering that promises you will definitely make money is a red flag. **A poor or non-existent whitepaper:** Every cryptocurrency should have a whitepaper since this is one of the most critical aspects of an initial coin offering. The whitepaper should explain how the cryptocurrency has been designed and how it will work. If the whitepaper doesn’t make sense – or worse, doesn’t exist – then tread carefully. **Excessive marketing:** All businesses promote themselves. But one way that crypto fraudsters attract people is by investing in heavy marketing – online advertising, paid influencers, offline promotion, and so on. This is designed to reach as many people as possible in the shortest time possible – to raise money fast. If you feel that the marketing for a crypto offering seems heavy-handed or makes extravagant claims without backing them up, pause and do further research. **Unnamed team members:** With most investment businesses, it should be possible to find out who the key people behind it are. Usually, this means easy-to-find biographies of the people who run the investment plus an active presence on social media. If you can’t find out who is running a cryptocurrency, be cautious. **Free money**: Whether in cash or cryptocurrency, any investment opportunity promising free money is likely to be fake. ![Is crypto a scam?](https://usa.kaspersky.com/content/en-us/images/repository/isc/2022/cryptocurrency-scams-2.jpg) ## How to protect yourself from cryptocurrency scams Many crypto frauds are sophisticated and convincing. Here are some steps you can take to protect yourself: **Protect your wallet:** To invest in cryptocurrency, you need a wallet with private keys. If a firm asks you to share your keys to participate in an investment opportunity, it’s highly likely to be a scam. Keep your wallet keys private. **Keep an eye on your wallet app:** The first time you transfer money, send only a small amount to confirm the legitimacy of a crypto wallet app. If you’re updating your wallet app and you notice suspicious behavior, terminate the update, and uninstall the app. **Only invest in things you understand:** If it’s not clear to you how a particular cryptocurrency works, then it’s best to pause and do further research before you decide whether to invest. **Take your time:** Scammers often use high-pressure tactics to get you to invest your money quickly – for example, by promising bonuses or discounts if you participate straightaway. Take your time and carry out your own research before investing any money. **Be wary of social media adverts:** Crypto scammers often use social media to promote their fraudulent schemes. They may use unauthorized images of celebrities or high-profile businesspeople to create a sense of legitimacy, or they may promise giveaways or free cash. Maintain a healthy skepticism when you see crypto opportunities promoted on social media and do your due diligence. **Ignore cold calls:** If someone contacts you out of the blue to sell you a crypto investment opportunity, it’s probably a scam. Never disclose personal information or transfer money to someone who contacts you in this way. **Only download apps from official platforms:** Although fake apps can end up in the Google Play Store or Apple App Store, it is safer to download apps from these platforms than elsewhere. **Do your research:** The most popular cryptocurrencies are not scams. But if you haven’t heard of a particular cryptocurrency, research it – see if there is a whitepaper you can read, find out who runs it and how it operates, and look for genuine reviews and testimonials. Look for an up-to-date and credible fake cryptocurrency list to check for scams. **Is it too good to be true:** Companies that promise guaranteed returns or to make you rich overnight are likely to be scams. If something seems too good to be true, tread carefully. Finally, as with any investment opportunity, never invest money you can’t afford to lose. Even if you're not being scammed, cryptocurrency is volatile and speculative, so it's essential to understand the risks. ## What to do if you fall victim to a crypto scam Falling victim to a cryptocurrency scam can be devastating, and it's essential to act quickly if you have made a payment or disclosed personal information. Contact your bank immediately if you have: - Made a payment using a debit or credit card. - Made a payment via bank transfer. - Shared personal details about yourself. Crypto fraudsters often sell the details they have captured to other criminals. So, it’s essential to change your usernames and passwords across the board, to prevent further damage. If you are the victim of a social media crypto scam, you can report it to the relevant social media platform. Depending on where you live, you can report frauds to the relevant body in your jurisdiction – for example, in the US, that would be the [Federal Trade Commission](https://reportfraud.ftc.gov/#/). Other countries have their own equivalents. **Recommended products:** - [Kaspersky Antivirus](https://www.kaspersky.com/antivirus) - [Kaspersky Premium Antivirus](https://www.kaspersky.com/premium) - [Kaspersky Internet Security](https://usa.kaspersky.com/internet-security) - [Kaspersky Password Manager](https://usa.kaspersky.com/downloads/password-manager) - Kaspersky Secure [Connection](https://www.kaspersky.com/vpn-secure-connection) **Further reading:** - [What is cryptojacking and how does it work?](https://usa.kaspersky.com/resource-center/definitions/what-is-cryptojacking) - [Scam websites – what they are and how to avoid them](https://usa.kaspersky.com/resource-center/preemptive-safety/scam-websites) - [How to report a website](https://usa.kaspersky.com/resource-center/preemptive-safety/how-to-report-a-website)
Shard180 (laksa)
Root Hash8981804672672209180
Unparsed URLcom,kaspersky!usa,/resource-center/definitions/cryptocurrency-scams s443