What is a Crypto Scam?
Last reviewed by Moderation API
A crypto scam is any fraud that exploits cryptocurrency rails to steal funds, including fake exchanges, celebrity giveaway schemes, wallet drainers, approval phishing, and fraudulent token launches.
Unlike card fraud, where chargebacks and issuer reversals give victims a fighting chance, the irreversibility of on-chain transactions makes recovery extraordinarily difficult once assets have moved through even a single hop. That structural asymmetry, combined with pseudonymous wallets and near-instant cross-border settlement, has made crypto the preferred payout rail for organized fraud networks worldwide.
Why fraudsters favor crypto rails
Three properties make cryptocurrency uniquely attractive to criminals. First, irreversibility: a confirmed on-chain transfer cannot be clawed back without the recipient's cooperation. Second, pseudonymity: wallets do not require legal identity, so laundering trails can be obscured through mixers, chain-hopping, and nested exchanges. Third, speed: funds can move from a victim in one jurisdiction to a cash-out desk in another within minutes.
According to Chainalysis's Crypto Crime Report series, tens of billions of dollars in on-chain value flowed to illicit addresses at the 2022 market peak, and scams and stolen funds have remained among the largest subcategories in the years since.
Stablecoins, especially USDT on Tron, have become the dominant denomination for scam flows because they offer dollar-equivalent value without the volatility of BTC or ETH.
Major categories of crypto fraud
Crypto scams cluster into a handful of recurring playbooks that trust and safety teams should recognize:
- Pig butchering: long-con romance or friendship grooming that ends on a counterfeit trading app
- Fake exchanges and cloned broker sites that mirror legitimate platforms down to the login flow
- Wallet drainers and approval phishing kits that trick users into signing malicious token-approval transactions
- Fake airdrops promoted through spoofed project accounts and poisoned NFT transfers
- Impersonation scams using deepfaked or hijacked accounts of figures such as Vitalik Buterin and Elon Musk promising to double any ETH sent
- Celebrity QR-code giveaway streams that hijack YouTube channels to broadcast fake double your crypto events
- Fraudulent ICOs and token launches with no working product, often built on plagiarized whitepapers
Laundering infrastructure and enforcement response
Once stolen, funds typically move through a predictable laundering stack. Tornado Cash, an Ethereum mixer sanctioned by the US Treasury's OFAC in August 2022, became a focal point of enforcement debate after researchers showed it had been used to launder proceeds from major North Korean-linked hacks. ChipMixer was seized in March 2023 by a coordinated DOJ and Europol operation.
In October 2025, US authorities announced a roughly $15 billion seizure tied to Cambodia-based Prince Group and its principal Chen Zhi, one of the largest crypto-related forfeitures ever disclosed and a turning point in the global response to industrial-scale pig-butchering compounds. The FBI's Operation Level Up has proactively notified thousands of identified pig-butchering victims, and the DOJ's National Cryptocurrency Enforcement Team (NCET) coordinates cross-agency cases with the SEC and CFTC.
Platform countermeasures
Defending users requires layered controls.
Exchanges use KYC and transaction monitoring powered by tools such as Chainalysis Reactor and TRM Labs to screen deposits against known scam clusters and sanctioned addresses. Wallets increasingly integrate transaction-simulation warnings that flag malicious setApprovalForAll calls. Social platforms have to complement on-chain screening with off-chain signals: impersonation detection, link-risk scoring against scam-domain feeds, and classifiers trained on giveaway-scam language. Moderation API is one of the services teams use to identify promotional patterns tied to known crypto scam playbooks before they reach users.
Combined with fast takedown workflows and user-facing warnings, these countermeasures meaningfully reduce the window in which a victim can act on a fraudulent prompt, which is the single most effective intervention given that on-chain losses, once settled, are rarely recoverable.
