Back to blogs
Written by
Alex Babits
Published on
January 14, 2025

How to Avoid Crypto Scams and Not Lose Money in Web3: Part 1

Learn how to protect yourself from crypto scams in web3. This guide covers phishing, malware, wallet security, and private key management to safeguard assets.

Table of Contents

Web3, land of the free. Home of the scammed, rugged, and hacked. 

Cryptocurrency has brought the spirit of the Wild West to finance. Many newcomers, OGs, and builders alike venture through the dark forest of blockchains, unprepared to defend against the monsters - phishing, malware, and other scams - that lie in wait.

A mysterious forest under a full moon, with a lone figure holding a torch on a stone path.

The danger and freedom of crypto exist because there is no distance between balance sheet changes and user actions. 

In traditional finance, transactions are mediated through layers of abstraction. Instead, in web3, users interact directly with raw calldata. For many, this can feel like piloting a recently invented spaceship with no license.

Unfortunately, this financial autonomy, combined with novel technology, has resulted in some of the most devastating financial events in history.

Billions of dollars have fled from the pockets of projects and users into the hands of sophisticated criminals. You don't have to look far to see the magnitude and consistency of the destruction. Just skim through DeFiLlama’s database of hacks, Kacherginsky's weekly blockchain threat reports, and the rekt leaderboard

In this multi-part series, we’ll start our journey to web3 safety and help you avoid crypto scams. In this first segment, we’ll explore token ownership fundamentals and examine common threats like phishing, and address poisoning that plague the industry. 

But before diving into the specifics, it’s crucial to understand the cornerstone of web3 security.

Ownership and private key management

Your tokens are stored at the location of your public address. Anyone with access to the private key associated with that public address is considered the owner of the tokens.

Think of your private key as a powerful 32-byte digital pen that allows you to sign transaction data to interact directly with blockchains.

Your private key is secured by a seed phrase, a list of 12 or 24 words generated during wallet creation. Since it can be used to recover your private key, anyone with access to it gains the same control and authority as if they had the private key itself. 

So, how do you manage it securely?

Wallets are the interface for your private key, enabling you to interact with your assets. Different wallet types offer various ways to maintain control over your tokens.

  • Custodial accounts are typically managed by centralized exchanges. They hold your tokens using their private keys, much like a traditional bank. This is where the phrase “not your keys, not your coins” comes from because you do not own your tokens. Exchanges like Coinbase, Binance, and Kraken own the tokens because they control the private key. 
  • Hot wallets are browser and app-based solutions, always connected to the internet. With these wallets, you have custody of your private key and thus own your tokens directly. Popular examples include MetaMask, Rabby, and Phantom.
  • Cold wallets are hardware devices designed to store tokens offline. They are generally considered safer than hot wallets because they are not connected to the internet except during transactions. The private key is stored securely on the device, and executing transactions requires physically pressing buttons to confirm details. Trezor and Ledger are two commonly used examples.
  • Multi-sig wallets allow you to require signatures from multiple private keys to execute a transaction. These wallets are considered extremely safe as long as the private keys are stored in a sufficiently decentralized and secure manner. Features like timelocks further enhance their utility. Gnosis Safe has become synonymous with multi-sig wallet technology.  
  • Social recovery wallets operate similarly to normal wallets with a single key. However, if your key is compromised and needs to be replaced, your appointed guardians (trusted friends or institutions) can help recover or replace the compromised key. Timelocks and daily limits are often used in conjunction with these wallet types. Popular options include Argent and Loopring.

For a deeper discussion on wallet types, check out this full guide

Regardless of how you store your tokens, certain core tenets are essential for safeguarding your assets.

Token custody best practices

  • Keep your private key and seed phrase hidden and off your devices at all times. Do not allow them to touch the internet. Store your seed phrase on metal plates and commit it to memory, or at least write it down on a secret piece of paper. Controlling your seed phrase ensures you can recover a lost wallet to any compatible frontend wallet.
  • If you suspect your private key or seed phrase has been exposed, assume your wallet is compromised and move your assets into another wallet with a new private key. 
  • If you are a developer, never use your real private keys in .env files. Instead, use a developer key that never holds real funds, as scripts can scrape GitHub for sensitive information like private keys and API keys. 
  • Avoid disclosing your net worth in public. If someone knows your public address, they can view your transaction history and holdings.
  • Only purchase cold wallets directly from the manufacturer. Assume third-party vendors will maliciously tamper with the wallet's software.
  • Use browser extensions for hot wallets to help prevent theft from common attack vectors.some text
    • MetaMask offers wallet customization through snaps like blockfence that warn you when interacting with unverified smart contract source code or suspected phishing URLs.
    • Web3 Antivirus offers protection against malicious signatures and phishing URLs for popular EVM chains.
    • Scam Sniffer alerts users to malware, compromised frontends, and hacked accounts across X. It currently supports EVM chains, Solana, BTC, TON, and Tron.

Now that we understand token ownership, let's explore common crypto scams and attacks targeting your assets and how to defend against them.

Malware

Malware is malicious software that infects your device and attempts to steal your sensitive data or assets.

Most modern malware is difficult to detect because it rarely slows down your computer and may not appear as a visible task in your task manager. It can lay dormant for long periods, waiting for an opportunity to act, or even operate within your system’s memory to evade detection.

The most common types of malware that can compromise your device include:

  • Remote access trojans (RATs) allow attackers to control a victim's machine remotely, enabling them to steal sensitive information or transfer funds.
  • Keyloggers record your keystrokes to identify passwords and other sensitive information.
  • Clipboard hijackers intercept copied data. For example, if you copy an Ethereum address, an attacker can swap it out for their malicious address.
  • Spyware silently collects passwords, seed phrases, and other sensitive data that may be stored on your computer.

So, how do you stay safe?

How to prevent malware attacks

  • Do not store sensitive information on any device connected to the internet. 
  • Interact cautiously with unknown online content.
  • Keep your crypto interactions and finances on a dedicated device that only connects to the internet to execute transactions. Be aware that any connected malicious physical devices (e.g. USB drives) can still introduce malware.
  • If your device is infected with a RAT, disconnecting the internet will sever the attacker’s connection. However, the malware will remain on the device and must be removed.

This is only half the battle. Equally important is recognizing phishing and drainer scams, which often serve as the entry point for malware or direct asset theft.

Phishing and drainer scams

A close-up of a fishing hook suspended against a blurred blue sky background.

Phishing involves deceptive content designed to appear legitimate, tricking victims into downloading malicious payloads or divulging sensitive information

The content can take many forms, including malicious files and attachments (.exe, .zip, .pdf) or imitations of legitimate Zoom links, websites, apps, browser extensions, QR codes, airdrops and giveaways, arbitrage bots, and more.

The payload (harmful code or data) can come in various forms of malware like RATs, keyloggers, spyware, and more.

The sensitive information includes passwords, seed phrases, private keys, and personal details that attackers can exploit for unauthorized access or financial theft.

Spear phishing is a targeted form of phishing where an attacker gathers information on a target and tailors their interactions to create the illusion of being a legitimate actor. Social media and blockchain’s transparency often help craft and execute highly personalized attacks against individuals or companies.

Social engineering techniques are used throughout all phishing scams to increase the likelihood of victims interacting with fake content. Common tactics involve:

  • Paying bots or individuals to produce fake comments, likes, and shares. 
  • "Playing the long game" with a target, building up a rapport before attempting an exploit.
  • Direct impersonations of prominent figures, companies, or websites.

But in blockchain, there is more.

Approval phishing

In web3, approval phishing websites mimic legitimate Decentralized Applications (dApps) and are one of the most consistent tools criminals use to steal tokens. 

Drainers are the underlying smart contracts behind phishing dApps. They steal user funds by generating malicious approve() or permit() data. When signed, the data grants the drainer unlimited access to the user’s tokens.

Cold wallets do NOT protect you against crypto drainer scams because you willingly sign over access to your coins. This means the attacker bypasses the need for private key or seed phrase access. 

Sophisticated crypto drainers use purely numerical addresses to bypass the default EIP-712 formatted data that wallets attempt to display. This makes the signature data unreadable and prevents users from understanding the content. 

Attackers exploit the CREATE2 opcode, which allows developers to determine the address of a newly deployed contract before actually deploying it. They use it to pre-compute and generate unique contract addresses, making each malicious signature appear distinct and harder to detect. 

Attackers also use multicall contracts to bundle several operations into a single transaction, bypassing standard security alerts that might flag individual actions.

In just a few years, notorious crypto drainers like Pink Drainer, Inferno Drainer, and AngelX have stolen over $100 million.

Yet, phishing attacks come in many forms, often imitating legitimate services or opportunities.

Other examples of phishing attacks

Fake Zoom links

At the time of writing, zoom links are always formatted as: [subdomain].zoom.us/j/[meeting-id]

Common region subdomains: usXX (USA), euXX (Europe), ukXX (United Kingdom), jpXX (Japan), auXX (Australia).

So, correct Zoom links display like:

  • georgetown.zoom.us/j/[meeting-id]: Institution-specific subdomains
  • us04.zoom.us/j/[meeting-id]: Region-based subdomains 
  • us02web.zoom.us/j/[meeting-id]: May contain a web postfix after the region

Incorrect Zoom links might display like:

  • zoom.us50web.us/j/[meeting-id]: Zoom and subdomain are swapped
  • us50web-zoom.us/j/[meeting-id]: Hyphen instead of period
  • us04-zoom.us/j/[meeting-id]: Hyphen instead of period

Fake giveaways and crypto airdrop scams

Impersonators on social media will attempt to leverage fake engagement to encourage users to donate tokens, or sign up for fake airdrops and giveaways that lead to phishing websites. The goal is always to scam you out of your tokens. Below are just a few examples.

Fake SpaceX crypto giveaway promising $100,000,000 to lure victims into scams.

Fake Polkadot airdrop scam promoting 3 million $DOT tokens with malicious intent.

Fake websites and malicious Google ads

Scammers can successfully place phishing websites at the top of Google search results that look identical to the official website. Be especially careful of fake decentralized exchanges that drain your wallet by replacing standard trading data with malicious approval requests. Always take your time and confirm the URL is correct. 

Fake Phantom wallet Google ad linking to a fraudulent website for phishing.

Fake support emails from crypto apps

Wallet providers like MetaMask and Ledger will never send an email requesting your seed phrase or asking you to perform cancellation or setup actions. If you ever receive one, it is definitely a crypto scam. Here's a detailed list of subtle phishing emails to reference.

Phishing email mimicking Ledger support to steal user credentials through a malicious link.

Fake QR codes

QR codes can contain links that download malicious payloads to your device. Do not click on a link if you think it may be malicious. Below is an example of a malicious QR code from a fake giveaway.

Fraudulent QR code directing users to a scam website, disguised as a life-changing offer.

Fake browser extensions

Fake browser extensions usually ask for your seed phrase or inject malware onto your computer. To avoid these kinds of crypto scams, take your time to thoroughly review any extension you install and ensure they are connected to an official website.

Fake Ledger Live Chrome extension designed to steal user credentials.

Fake crypto arbitrage bots

Videos promoting ridiculous passive income from generic crypto trading scripts are always scams. If you deploy the contract and "fund" it, you are simply giving your tokens to the attacker. 

There are hundreds of video examples of this type of crypto scam. Here are a few that use a similar malicious contract and nearly identically crafted scripts.

Misleading ad falsely claiming ChatGPT helped earn 168 ETH in crypto.
Scam promotion alleging $1,000 passive income in 24 hours using ChatGPT and Ethereum.
Fraudulent claim of a ChatGPT AI bot generating 27 ETH using MetaMask, aiming to deceive viewers.

How to prevent phishing attacks and avoid scams

  • Take your time when performing actions. It only takes one click to lose everything.
  • Offers that appear too good to be true are always scams.
  • Verify you are interacting with a legitimate dApp or website by checking the URL is correct and associated with an official company.
  • Use the previously mentioned anti-phishing wallet extensions.
  • Attempt to verify the data you are signing. Ideally, everyone could parse raw transaction data to avoid signing anything malicious.
  • For builders, implement EIP-712 to make transaction data more readable for users, reducing the risk of malicious approvals.
  • Take Tincho’s phishing boot camp and learn to detect even subtle phishing scams.
  • If you suspect you have granted approval to a drainer, revoke your approvals immediately in case the attacker failed to access your tokens immediately. This frontend can help you with that.

As we wrap up our discussion on web3 safety, it's important to address a lesser-known but highly effective tactic.

Address poisoning crypto scam

Tangential to web3 phishing is a simple and devious attack called address poisoning. Over $123 million have been stolen using this method, which works as follows:

  1. An attacker notices Bob always sends his tokens to an exchange address 0x1337bfAe3Bd5Cc4aF8dE2bA6fC3eD9aB4cFc6969.
  2. The attacker uses CREATE2 to generate an address close to the exchange address, like 0x13378dCf2Ab4eA9cB5fD1aE7bF3cA6dE4fB26969. Notice how the first and last four characters are identical to the exchange address. Since many wallet applications only display these characters, the two addresses appear identical.
  3. The attacker then sends tokens to Bob, so their malicious address appears in his wallet history.
  4. When Bob later deposits tokens to the exchange, he mistakenly copies the malicious address from his history, sending all his tokens to the attacker.

How to prevent address poisoning attacks

  • Take your time when sending transactions to avoid hasty errors. 
  • Use small test transactions to confirm tokens are being sent to the correct address.
  • Do not rely only on your transaction history for accurate addresses. 
  • Double-check all the characters in a destination address before clicking send.
  • Consider using a wallet that supports whitelisting or bookmarked addresses. 

Conclusion

This concludes the first part of our two-part series on web3 safety. If you want to combat even more advanced attacks, check out part 2

Secure your protocol today

Join some of the biggest protocols and companies in creating a better internet. Our security researchers will help you throughout the whole process.
Stay on the bleeding edge of security
Carefully crafted, short smart contract security tips and news freshly delivered every week.