Guides

Common crypto scams and how to avoid them

A practical guide to common crypto scams, the different risk levels, and simple ways to protect yourself.

Crypto scams are not all the same. Some are low-effort phishing attempts, while others are highly convincing operations that can drain wallets, steal seed phrases, or trick users into fake investment schemes.

The best protection starts with recognizing the different levels of risk.

Level 1: obvious scams

These are the easiest to spot once you know the pattern.

Examples:

  • fake giveaway posts
  • direct messages promising guaranteed returns
  • support impersonators asking for your seed phrase
  • scam comments under YouTube, Telegram, or X posts

How to protect yourself:

  • never share your seed phrase or private key
  • ignore guaranteed-profit claims
  • do not trust random support messages
  • verify every official account and website manually

Level 2: realistic scams

These are more dangerous because they often look almost real.

Examples:

  • cloned exchange login pages
  • fake wallet apps
  • phishing emails that look like official product updates
  • fake token airdrops that ask you to connect a wallet

How to protect yourself:

  • type important URLs manually or use bookmarks
  • install apps only from official sources
  • double-check domains before signing in or connecting a wallet
  • do not connect your wallet just because a site looks polished

Level 3: advanced scams

These are the scams that catch even experienced users.

Examples:

  • wallet-draining approval scams
  • fake OTC or recovery services
  • long-running romance or investment scams
  • malware that swaps wallet addresses in your clipboard

How to protect yourself:

  • review wallet approvals carefully
  • test with small amounts first
  • confirm addresses on the receiving device, not just your screen
  • use a hardware wallet for meaningful balances
  • keep separate wallets for storage and experimentation

Best protection habits

HabitWhy it matters
Keep long-term holdings in a hardware walletReduces the chance of losing everything through one bad click
Use separate wallets for spending, testing, and storageLimits blast radius if something goes wrong
Bookmark official product sitesReduces phishing risk
Slow down before every signature or transferMost scams win by forcing urgency
Treat every message as suspicious until verifiedImpersonation is common in crypto

Red flags that should stop you immediately

  • pressure to act fast
  • promises of easy profit
  • requests for your seed phrase
  • links sent in DMs
  • a website asking for unusual wallet permissions
  • customer support contacting you first

Final rule

If something feels rushed, secret, or unusually profitable, slow down and verify it from scratch.

In crypto, most costly mistakes happen when a user acts too quickly.