12 Jun 2025

Social Engineering in Crypto: Top 5 Fraud Schemes

A recent hacking incident has highlighted that while fraudsters’ tactics may vary technically, their underlying principles are remarkably consistent. In today’s digital landscape, recognizing emerging scam tactics is an essential skill for any crypto users.

On this page

Ayush Gupta, a developer affiliated with Polygon, BlackRock, and KGeN, became the target of cybercriminals who used social engineering and malware to access his digital wallet and subsequently misuse it.

Ayush was approached on LinkedIn by an individual named Nickolas Donoso, who proposed a freelance collaboration. Donoso requested that Ayush execute a repository file on GitHub and share his insights. The developer noted, the repo looked fine at first glance,” which prompted him to engage with it.

Upon executing the file, Ayush's macOS displayed a system notification: “Security wants to use your confidential info stored in chrome safe storage in your keychain.” This immediately aroused Ayush’s suspicions, leading him to delete the file and restart his system.

He then verified his wallet's balance using Etherscan, reassuring himself that the funds were intact (spoiler—it was not).

The perpetrator had merely convinced Ayush that his assets were safe: “If he had access to my wallet, he would have already stolen my money,” Ayush reasoned, thus he did not move his cryptocurrency from the compromised wallet to a safer location. The scammer was simply biding time: while Ayush was checking Etherscan, the thief already had access to his funds. Within the first five minutes of the attack, the scammer extracted $14,400 in cryptocurrency. He also managed to sell several NFTs and converted some assets to ETH. 

Unauthorized transactions including the withdrawal of NFT#2222, BADGER, and ALI from the victim’s wallet. Source: nansen.ai

Unauthorized transactions including the withdrawal of NFT#2222, BADGER, and ALI from the victim’s wallet. Source: nansen.ai

As a result of a 5-hour cyber attack, the total damage amounted to $16,970. Ayush lost all of his capital invested in cryptocurrency.

It's important to note that this scam on LinkedIn is not an isolated case. Fake recruiters might also send phishing links, request personal documents for KYC procedures on trading platforms, or ask for payments to cover the “delivery” of corporate equipment.

Victims can encounter virus-infected files under various circumstances: while interacting on dating sites, in crypto community chats, or in comments under Telegram posts. The context varies based on the scamming technique used by the fraudster.

Social Engineering Attacks in Crypto  

This developer's ordeal is not unique. Comparing the first half of 2023 with the same period in 2024, the scale of fraud has escalated: losses categorized as “stolen funds” reached $1.58 billion (up from $857 million the previous year), and losses from “ransomware” amounted to $459.8 million, nearly unchanged from the previous year’s $449.1 million. 

Advanced cybercriminals, including IT workers linked to North Korea, are increasingly leveraging off-chain methods, such as social engineering, to steal funds by infiltrating crypto-related services

according to a report by Chainalysis.

The role a scammer can play is limited only by their imagination. They could pose as a recruiter, a crypto exchange analyst, or even a romantic interest—each disguise is carefully tailored to their scheme. Users need to be vigilant and able to recognize these tactics to avoid falling victim to fraud. 

Scheme #1: The Pity Me Strategy  

To win someone's sympathy and favor, play on their emotions. If you're seeking romance, open up about your personal challenges; if you're aiming for a promotion, let your boss know about your financial struggles; if you're looking to build a large following on X, discuss your financial hardships like bankruptcy.

Icon of Sympathy: Puss in Boots. Source: fandom.com

Icon of Sympathy: Puss in Boots. Source: fandom.com

Posts where authors claim financial ruin, hacks, or being victims of scams quickly amass thousands of views. For many, these narratives significantly boost their media profiles; some even fabricate their own victimhood, such as pretending to be robbed, to draw new followers. For others, it becomes a method to engage in illicit activities.

Scammers often fabricate dramatic stories like liquidating $100,000 on meme coin trades, losing all their funds to a phishing attack, or asset losses due to a hacked cross-chain bridge. Their goals typically include:

  • Attracting an audience: The initial, seemingly harmless goal is to gain followers—unsuspecting users subscribe to the “victim” and occasionally see their posts in their feed.
  • Generating income through donations: The act of soliciting sympathy donations has reached a new level with statements like, “We only accept crypto.”
  • Pushing phishing links and fraudulent projects: Authors of these posts might endorse a “fantastic” service that allegedly helped them recover their funds. In hope of retrieving their losses, users might follow these phishing links, only to end up in a worse situation.

The prevalence of such posts often increases in tandem with unpredictable events in the crypto market, such as the FTX collapse, the Atomic Wallet hack, or the altcoin market downturn in April 2024. These events impact a large number of people, thus increasing the number of users with similar, often fabricated, stories. 

Scheme #2: The Friendly Chat Strategy  

This social engineering tactic frequently targets men, exploiting their weaknesses for easy money and female attention. An unsuspecting victim might start a conversation on a dating site like Badoo or Tinder and, within a few days or weeks, be lured into becoming a “crypto investor.”

The scammer builds trust with the victim and later suggests signing up on a scam-controlled exchange (to steal confidential data), investing in fraudulent tokens, or making a donation. These actions are often motivated by promises of a personal meeting, sharing photos, and continuing the conversation.

Interestingly, the FBI recently recovered $5 million for victims of this very type of scam.  

Scheme #3: The Crypto Mentor Ruse  

It may seem that the era of phone scams is long gone as people increasingly use caller ID services like Getcontact, refrain from disclosing the three digits on the back of their bank cards, and avoid sharing confidential information with strangers. Public awareness of such scams has indeed increased, yet fraudsters have developed more sophisticated schemes.

For example, advertisements promising easy earnings in crypto may entice a victim to leave their phone number for further discussions with a “consultant.” This individual is not a genuine consultant but a well-trained scammer skilled at pressing the right psychological buttons. Even if the victim suspects a scam, this expert manipulator can convince them otherwise.

Incentives for investing could include:

  • The launch of a token through an ICO. Between 2019 and 2020, scammers frequently enticed investments with the promise of the Telegram Open Network (TON) ICO.
  • The missed surge in cryptocurrency prices. Even seasoned traders can succumb to FOMO (fear of missing out), let alone those without experience.
  • The opportunity to join the crypto industry. To many, cryptocurrencies still seem like enigmatic and unattainable assets, which allows scammers to offer their victims the “unique chance” to join an exclusive community.

Once a victim is primed to invest, they are led through a KYC process (naturally, it's a phishing scam) and asked to deposit funds into a fraudster-controlled exchange. This approach allows the criminals to simultaneously obtain both money and the user’s personal data.  

The victim then faces relentless psychological pressure. Phony analysts simulate significant price fluctuations (trading occurs on the manipulated platform), and exploit the investors through various means: they resort to blackmail (for instance, denying the withdrawal of assets from the exchange unless additional fees are paid), manipulate emotions, and create a sense of urgency (“time is running out”), pushing investors to make rushed and ill-considered decisions. All these tactics are designed to maximize the extraction of money.

Scheme #4: The Last Chance to Claim Your Airdrop  

his scam revolves around promoting a phishing link under the guise of receiving or verifying eligibility for an airdrop. Scammers create fake accounts, mimicking the profiles of legitimate projects, and then post links that lead to malicious software or websites.
These posts are often buried in the comments under posts from real projects. For instance, if ZKsync posts details about its tokenomics, a scammer might reply with something like, “Click the link to check your eligibility for the upcoming $ZK airdrop.” Once users click on the link, they are prompted to connect their wallets, grant access to their assets, and so on. Victims who follow these instructions end up handing over all their sensitive information to the scammers.

Scheme #5: Double Your Money Trap  

In 2022-2023, a new trend emerged in the industry—crypto arbitrage. This method involves increasing capital by exploiting price differences for the same assets across different platforms. Arbitrageurs identify discrepancies in token prices between centralized and decentralized exchanges, OTC markets, and offline exchangers, and they capitalize on these differences through quick trades.

The process (for example, converting ETH to USDT on DEX #1 → transferring USDT to CEX #2 → cashing out USDT via exchanger #3) is known as a “loop.” While this method is legitimate, scammers have learned to deceive users by promising to share or sell these loops (revealing the details for a fee).

The mechanics of an arbitrage loop. Source: capital.com

The mechanics of an arbitrage loop. Source: capital.com

The scam begins with the scammer identifying a target. This is often done through various means: promoting educational courses on arbitrage or advertising a job at a reputed arbitrage firm. The scammer then convinces the victim of the loop's profitability, using fake testimonials, polished social media content, and more.

Here are some additional popular scam schemes:

  • Fake loop sale: The scammer offers to sell their “highly secret loop,” but once they receive payment, they disappear without a trace.
  • Fund management scam: The victim entrusts their funds to the scammer under the guise of managing the loop's “secrecy” (claiming that the loop can't be sold, but the scammer can easily “turn over” the victim's deposit for a profit). Once the funds are transferred, the scammer vanishes, taking the money with them.
  • Profiting from service fees: The scammer proposes a partnership using their loop, asking only for a small commission (typically 5–10% of the profit). The catch lies in the tools the scammer provides to the victim for executing the trades. Let’s delve into this one further.

After agreeing to collaborate, the victim receives the loop and is encouraged to start with a small amount to build trust. A typical loop might involve buying USDT on a centralized exchange (CEX) → exchanging USDT for another token (usually a stablecoin) on a decentralized exchange (DEX) → and then transferring the funds back to the CEX with a profit.

The trick occurs at the DEX stage: the scammer directs the victim to a fake website designed to resemble a legitimate decentralized exchange, but it’s actually controlled by the scammer. Instead of executing a real trade, the victim ends up transferring their funds directly to the scammer’s wallet. This could be the end of the scam, but often the scammer continues to string the victim along.

After stealing the initial amount (say, $100 USDT), the scammer sends it back to the victim, adding an extra $5–$10 to create the illusion of profit. Convinced that the loop is working, the victim increases their investment, perhaps sending $1,000 instead of $100. But this time, the funds stay with the scammer for good.

Social engineering techniques are constantly evolving. As artificial intelligence advances, detecting these scams will become even more difficult; scammers will be able to mimic voices, create realistic faces, gather personal information about you, and more.

Remember, the best defense against scams is awareness. While it’s impossible to remember every trick, common sense is your most reliable tool. 

The content on The Coinomist is for informational purposes only and should not be interpreted as financial advice. While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, or reliability of any content. Neither we accept liability for any errors or omissions in the information provided or for any financial losses incurred as a result of relying on this information. Actions based on this content are at your own risk. Always do your own research and consult a professional. See our Terms, Privacy Policy, and Disclaimers for more details.

Articles by this author
APS Drops €3M on Tokenized Real Estate in Italy—First-Ever Blockchain Deal

APS Drops €3M on Tokenized Real Estate in Italy—First-Ever Blockchain Deal

With €12B in assets under management, APS just closed its first tokenization deal, snapping up fractional shares of two Italian real estate assets via blockchain.

Anton Kryshtal
Demand for Circle Shares Pushes IPO Valuation to $6.9B

Demand for Circle Shares Pushes IPO Valuation to $6.9B

USDC stablecoin issuer Circle Internet Group launches its IPO on the NYSE, increasing the offering to 34 million shares at $31 each and raising around $1.1 billion.

Dmytro Psevdonimenko
Morning Digest: Key News on Ethereum Foundation, JPMorgan & the Fed

Morning Digest: Key News on Ethereum Foundation, JPMorgan & the Fed

JPMorgan weighs Bitcoin ETF-backed lending, Ethereum Foundation updates treasury strategy, Michelle Bowman appointed as Fed overseer. Details in the article.

Dmytro Psevdonimenko
Pakistan to Launch Bitcoin Reserve Using 2,000 MW of Excess Power

Pakistan to Launch Bitcoin Reserve Using 2,000 MW of Excess Power

Islamabad eyes a national Bitcoin reserve powered by 2,000 MW of surplus electricity—framing crypto as a hedge against inflation and macroeconomic volatility.

Anton Kryshtal
Robert Kiyosaki and the Debt-Fueled Prophecy

Robert Kiyosaki and the Debt-Fueled Prophecy

Robert Kiyosaki says the end is here. With $1.2B in U.S. debt and a $1M Bitcoin prediction, the Rich Dad author is turning collapse into his ultimate performance.

Elina Moskovchuk
Stani Kulechov and the Quiet Architecture of Web3 Ambition

Stani Kulechov and the Quiet Architecture of Web3 Ambition

Not loud, not flashy, but a quietly influential crypto builder. With Aave and Lens, Stani Kulechov designed the rails for a decentralized internet—one lending market, one social graph at a time.

Elina Moskovchuk
Who Is Scott Bessent? From Wall Street to Crypto Advocacy

Who Is Scott Bessent? From Wall Street to Crypto Advocacy

Soros ally, Wall Street billionaire, and crypto reform advocate at the helm of the U.S. Treasury—can Scott Bessent shift the rules of the crypto market?

Yara Zornell
Are Crypto IPOs Overhyped? A Closer Look at the Boom

Are Crypto IPOs Overhyped? A Closer Look at the Boom

Crypto IPOs are booming, driven by market optimism and clearer regulations. But are they a sign of industry maturity or just another wave of hype? We take a closer look.

Anahit Avetisyan
What Is Milady? Inside Ethereum’s Most Controversial NFT Cult 

What Is Milady? Inside Ethereum’s Most Controversial NFT Cult 

Milady is a prominent NFT collection often seen as social media profile pictures, but its complex story extends far beyond mere aesthetics.

Anahit Avetisyan
Strategic Bitcoin Reserve: What the U.S. Is Really Planning

Strategic Bitcoin Reserve: What the U.S. Is Really Planning

In March 2025, the U.S. officially announced a strategic Bitcoin reserve, becoming the first nation to incorporate a digital asset into its national reserve policy.

Vlad Vovk
What Is Aztec Network? 2025 Milestones and the Path to Mainnet

What Is Aztec Network? 2025 Milestones and the Path to Mainnet

Aztec is a privacy network on Ethereum, designed to allow developers to build privacy-focused decentralised applications without compromising transparency.

Anahit Avetisyan
zkEVM Explained: A New Way to Scale Ethereum Without Breaking It

zkEVM Explained: A New Way to Scale Ethereum Without Breaking It

Solving Ethereum’s congestion, zkEVM tech supports native bytecode and familiar dApps — but slashes gas fees, accelerates confirmation, and adds embedded privacy layers.

Vlad Vovk
Ethereum Layer 2 Solutions: Who’s Winning the Race for Mass Adoption in 2025?

Ethereum Layer 2 Solutions: Who’s Winning the Race for Mass Adoption in 2025?

In 2025, Ethereum Layer 2 solutions are in fierce competition. Which platform — Optimism, Arbitrum, or the emerging ZK-rollup stack — is best positioned for mainstream use?

Daryna Nesterenko
Bitcoin Price Crashes to $103K After China Ban and Trump’s Threats Roil Markets

Bitcoin Price Crashes to $103K After China Ban and Trump’s Threats Roil Markets

A double blow from China’s crypto crackdown and Trump’s trade threats caused Bitcoin price to plunge to $103K, sparking concern among investors.

Anton Kryshtal
Bitcoin Price Falls to $105K as Traders React to Tariff Confusion and Volatility

Bitcoin Price Falls to $105K as Traders React to Tariff Confusion and Volatility

With uncertainty clouding U.S. tariff rulings and speculative pressure mounting, Bitcoin price retreated to the $105,000 support mark.

Anton Kryshtal
MORE
Burnout in the Bull Run—Why Even Success in Crypto Can Be Dangerous

Burnout in the Bull Run—Why Even Success in Crypto Can Be Dangerous

Bull markets typically signal success. However, surging account balances often conceal burnout, anxiety, and shattered work-life boundaries.

Iaroslava Kramarenko
What Motivates Crypto Billionaires to Keep Working?

What Motivates Crypto Billionaires to Keep Working?

They’ve made billions — yet keep grinding 24/7. Why do crypto entrepreneurs, after building massive fortunes, choose to stay in the game, launching new ventures and donating to medicine and education?

Iaroslava Kramarenko
MORE