Protect yourself from fake ICOs, pump and dumps, wallet hacks, and celebrity impersonators. Learn crypto security essentials.
The wild west of finance attracts sophisticated scammers - know their tactics
Fraudulent Initial Coin Offerings for cryptocurrencies that don't exist or have no real utility, stealing millions from investors.
Professional websites, whitepapers, and fake team members. They disappear after collecting funds, leaving worthless tokens.
Coordinated buying to artificially inflate a coin's price, followed by mass selling that crashes the value.
Often organized in private groups promising "insider information" or "signals." You'll be left holding worthless coins.
Fake wallet applications that steal your private keys and seed phrases, giving scammers complete access to your funds.
Even official app stores have fake wallets. One typo in the app name could cost you everything.
Fake Elon Musk, Vitalik Buterin, or other celebrities promising to double your crypto if you send them coins first.
Live streams with deepfakes, hacked verified accounts, and sophisticated websites. No celebrity gives away free crypto.
Developers drain liquidity pools or use backdoors in smart contracts to steal all invested funds.
High APY promises and anonymous teams. Always check for audits and look for locked liquidity.
Fake exchange websites and wallet interfaces designed to steal login credentials and private keys.
Scammers buy ads for fake sites that appear above real ones in search results. Always verify URLs carefully.
Essential security practices for cryptocurrency users
Store significant holdings in hardware wallets like Ledger or Trezor. Never enter seed phrases online or in any app.
Double-check wallet addresses, website URLs, and smart contracts. Use bookmarks for exchanges and official sources.
Use authenticator apps (not SMS) for two-factor authentication on all exchange accounts. Consider using a dedicated device.
Check team backgrounds, read audits, verify partnerships. If it sounds too good to be true, it probably is.
Your private keys and seed phrases should never be shared with anyone, typed online, or stored digitally. Write them down offline.
Tools and practices to protect your digital assets
Require multiple approvals for transactions, preventing single points of failure in security.
Keep majority of funds offline in hardware wallets or paper wallets, away from internet threats.
Limit withdrawals to pre-approved addresses only, preventing unauthorized transfers.
Set withdrawal delays giving you time to cancel suspicious transactions before execution.
Professional code reviews that identify vulnerabilities before investing in DeFi protocols.
Verify transactions and check wallet histories before interacting with unknown addresses.
Act fast but understand crypto transactions are usually irreversible
If account is compromised, immediately transfer any remaining crypto to a new secure wallet.
Create New WalletIf scam involved an exchange, report immediately. They may freeze accounts or trace funds.
Exchange ContactsFile detailed report with FBI's Internet Crime Complaint Center including transaction hashes.
IC3.govScreenshot wallets, transaction IDs, communications, and website URLs for law enforcement.
Evidence GuideSome services trace stolen crypto. Consider professional help for significant losses.
Tracing ServicesTheft losses may be tax deductible. Consult a crypto-aware tax professional.
Tax ResourcesEssential tools and information for crypto security
Hardware wallets, authenticators, and security analysis tools for protecting your crypto.
Check smart contract audits, verify project teams, and research token legitimacy.
Report and check known scam addresses, websites, and projects before interacting.
Get the latest crypto scam alerts and security updates