Cryptocurrency Scams

SCAM WARNING: REACT does not provide recovery services, nor endorses any company that claims it will recover your funds. If you receive communication from anyone claiming to work on our behalf, please contact your local law enforcement agency or report incident to IC3.gov.

A cryptocurrency scam is a fraudulent scheme that uses cryptocurrency as a tool to deceive individuals or institutions, often involving promises of high returns or the use of fake platforms or investments. These scams can manifest in various forms, including investment fraud, fake Initial Coin Offerings (ICOs), phishing attacks, and pig butchering schemes. 

The most common crypto scams include imposter scams, where scammers impersonate legitimate entities to gain access to user information, and pig butchering scams, where scammers build relationships to manipulate victims into investing. Phishing scams, giveaway scams, and romance scams are also prevalent, with scammers using fake profiles, promising free crypto, or luring victims into investments with the promise of high returns. Rug pulls, where developers abandon projects and steal investors’ money, are another common type, particularly in decentralized finance. 

Here’s a more detailed breakdown of the most common crypto scams:

1. Imposter Scams:

  • Scammers impersonate legitimate businesses, government agencies, or well-known figures to gain trust and access to sensitive information like private keys or passwords.
  • They may create fake websites, emails, or social media profiles to trick victims into revealing personal information or sending cryptocurrency.

2. Pig Butchering Scams:

  • Scammers build a relationship with victims, often through social media or dating apps, to gain their trust and confidence.
  • They then gradually introduce fake investment opportunities, promising high returns, and manipulate victims into sending cryptocurrency. 

3. Phishing Scams:

  • Scammers send fake emails, texts, or messages that look legitimate but are designed to steal login credentials, passwords, or crypto wallet keys. 
  • They may use fake websites or links that redirect victims to malicious sites to capture their personal information. 

4. Giveaway Scams:

  • Scammers promise to give away free cryptocurrency or match investments, often using fake celebrity endorsements or social media promotions.
  • They may require victims to send cryptocurrency to a specific address, promising to return a larger amount, which is never delivered. 

5. Romance Scams:

  • Scammers build fake romantic relationships with victims, often on dating apps or social media, to gain their trust and confidence.
  • They then manipulate victims into investing in cryptocurrency, promising high returns, and eventually steal the funds. 

6. Rug Pulls:

  • Scammers create a new cryptocurrency project, often in DeFi, and aggressively promote it to attract investors. 
  • Once the project gains traction and the price of the token increases, the scammers withdraw all the liquidity, causing the price to crash and leaving investors with worthless tokens. 

7. Pump and Dump Schemes:

  • Scammers artificially inflate the price of a cryptocurrency by spreading misleading information or rumors.
  • They then sell their holdings at a profit, causing the price to plummet and leaving other investors with significant losses. 

8. Investment Group Scams:

  • Scammers use private messaging groups (like WhatsApp or Telegram) to promote fraudulent investment opportunities.
  • They may promise high returns with low risk, but the investment is a scam and the victims lose their money. 

9. Fake Charitable Donation Scams:

  • Scammers create fake websites that appear to be legitimate charities to solicit cryptocurrency donations.
  • They may use emotional appeals to trick victims into sending cryptocurrency, which they then steal. 

10. Blackmail Scams:

  • Scammers claim to have compromising photos or videos of victims and demand payment in cryptocurrency to prevent their release.
  • They may threaten to share photos or videos with others if the victims do not comply. 

How to Protect Yourself

  • Be wary of unsolicited messages or requests for cryptocurrency payments. 
  • Research any investment opportunity thoroughly before sending cryptocurrency. 
  • Be skeptical of promises of guaranteed returns or low risk. 
  • Use strong passwords and enable two-factor authentication on your crypto wallets. 
  • Report any suspicious activity to the authorities or the relevant platform.