• Skip to primary navigation
  • Skip to main content
100MCrypto

100MCrypto

Crypto Marketing

  • Buy Pixels
    • How to Buy Pixels
  • Directory
  • About
  • Crypto News
    • Subscription
    • 100MCrypto GPT
    • Academy
    • Press
    • Blog
  • Contact

Avoid Crypto Scams

Crypto Scams: How to Spot and Avoid Them

The crypto world offers huge opportunities—but also attracts scams. If you’re just starting your crypto journey or already bought your first coins, learning to recognize and avoid scams is essential. This course will teach you how to protect your money, your data, and your confidence by identifying fake projects, misleading messages, phishing attacks, and more. You’ll learn through real-world examples, warning signs, and smart strategies so you can stay safe while navigating the world of digital assets.

Important Notice: This course is for educational purposes only and should not be construed as financial, investment, or legal advice. The cryptocurrency market is volatile and carries risks. Always conduct exhaustive due diligence and consult a qualified professional before making any investment decisions.

Modules

  • Module 1: Why Crypto Attracts Scammers
  • Module 2: The Most Common Crypto Scams
  • Module 3: Phishing Attacks & Fake Websites
  • Module 4: Social Media Scams & Fake Influencers
  • Module 5: Fake Airdrops and Giveaways
  • Module 6: Rug Pulls and Fake Tokens
  • Module 7: Ponzi Schemes & “Guaranteed Profit” Promises
  • Module 8: Fake Wallets and Apps
  • Module 9: Scam Emails, SMS & Browser Popups
  • Module 10: How to Research Before You Invest (DYOR)
  • Module 11: Staying Safe with Wallets and Exchanges
  • Module 12: What To Do If You’ve Been Scammed

Module 1: Why Crypto Attracts Scammers

The cryptocurrency space, with its rapid growth and technological innovation, unfortunately also creates a fertile ground for scammers. Understanding why is the first step to protecting yourself.

The Mix of Innovation and Anonymity

Crypto’s appeal lies in its decentralized, often pseudo-anonymous nature. While this offers financial freedom and privacy, it also makes it harder to trace illicit funds and identify scammers. The rapid pace of innovation means new terms, technologies, and projects emerge daily, making it difficult for even experienced users to keep up, let alone newcomers. This knowledge gap is often exploited.

Common Psychological Traps (Fear, Greed, Urgency)

Scammers are masters of human psychology. They prey on universal emotions:

  • Greed (FOMO – Fear Of Missing Out): Promises of “get rich quick,” “guaranteed returns,” or “once-in-a-lifetime opportunities” appeal to the desire for easy wealth. The fear of missing out on massive gains drives impulsive decisions.
  • Fear (FUD – Fear, Uncertainty, Doubt): Scammers may create fake news or exploit real market volatility to induce panic selling, aiming to buy cheap assets from scared investors.
  • Urgency: Time-sensitive offers (“invest now before it’s too late!”), limited-time bonuses, or immediate demands for action create pressure, leading victims to bypass critical thinking and due diligence.

Why Beginners Are Frequent Targets

Newcomers to crypto are often the most vulnerable. They may lack technical understanding, be unfamiliar with common scam tactics, or simply be overwhelmed by the complexity of the ecosystem. Scammers target them with simplified, appealing narratives that hide the underlying risks. Lack of familiarity with secure practices (like managing private keys or verifying contract addresses) also makes beginners easy prey.

Module 1 Quiz

1. What characteristic of crypto makes it attractive to scammers due to difficulty in tracing funds?





2. What psychological trap do scammers often use by promising “guaranteed returns” or “once-in-a-lifetime opportunities”?





3. Why are beginners often frequent targets for crypto scams?





Module 2: The Most Common Crypto Scams

Scammers employ a variety of tactics. Recognizing the most common types is your first line of defense.

Overview of Common Scams

  • Phishing: Impersonating legitimate entities (exchanges, wallets, projects) to trick you into revealing sensitive information like login credentials or private keys.
  • Fake Giveaways/Airdrops: Promising to send you crypto if you first send a small amount to verify your wallet, or participate in a fake “promotion.”
  • Pump and Dump Schemes: Artificially inflating a token’s price through coordinated buying and hype, then selling off holdings to crash the price, leaving late investors with worthless assets.
  • Ponzi/Pyramid Schemes: Promising high, guaranteed returns to early investors from funds contributed by later investors, rather than from actual profit-generating activity. These schemes collapse when new money stops coming in.
  • “Rug Pulls”: In DeFi, developers build a project, attract investors, and then suddenly abandon the project, withdrawing all liquidity and leaving investors with unsellable tokens.

What They Promise vs. What They Deliver

Scams almost always promise: **high, guaranteed returns with little to no risk.** This is a major red flag. In reality, crypto is a volatile, high-risk asset class. If it sounds too good to be true, it is. What they deliver is usually a total loss of your funds, data theft, or identity compromise.

How They Operate Across Platforms

Scammers use a variety of platforms to reach potential victims:

  • Social Media: Twitter/X, Instagram, Telegram, Discord, YouTube are rife with fake accounts impersonating celebrities, project founders, or legitimate crypto entities.
  • Email & SMS: Phishing emails mimic official communications.
  • Fake Websites & Apps: Cloned websites of exchanges or fake wallet apps on app stores.
  • Messaging Apps: Unsolicited messages from strangers offering “investment opportunities.”

Understanding these channels helps you remain vigilant regardless of where you encounter crypto information.

Module 2 Quiz

1. Which scam involves artificially inflating a token’s price with hype, then selling off holdings to crash the price?





2. What is a key promise that is almost always a red flag for a crypto scam?





3. In a “Rug Pull,” what do developers typically do?





Module 3: Phishing Attacks & Fake Websites

Phishing is one of the oldest and most persistent cyber threats, adapted for the crypto world. It’s crucial to spot fake websites and malicious links.

How Phishing Emails, DMs, and Fake Exchanges Work

Phishing involves fraudsters impersonating a legitimate entity (like a crypto exchange, wallet provider, or even a blockchain project) to trick you into giving them sensitive information. They create fake emails, direct messages (DMs) on social media, or even entire websites that look identical to the real ones.

  • Fake Emails/DMs: They might send you an email claiming your account is locked, there’s a suspicious login, or a “special bonus” that requires you to click a link. This link leads to a fake login page.
  • Fake Exchanges/Wallet Sites: These are websites that mimic real crypto platforms. You might land on them through a malicious search ad, a bad link in an email, or even typos in the URL. Their goal is to capture your login credentials or private keys when you attempt to log in.

How to Spot Cloned Domains and Malicious Links

Vigilance is key:

  • Check the URL Carefully: This is the most important step. Scammers often use subtle misspellings (e.g., `coinhbase.com` instead of `coinbase.com`), extra characters (`binance-login.com`), or different top-level domains (`.net` instead of `.com`). Always verify the exact domain name before entering any information.
  • Look for HTTPS: Ensure the website uses HTTPS (indicated by a padlock icon in the browser address bar). While not foolproof (scammers can also get SSL certs), its absence is a definite red flag.
  • Inspect Email Headers/Sender: Check the full sender address, not just the display name. Look for discrepancies.
  • Hover Over Links: Before clicking a link in an email or message, hover your mouse over it (on desktop) to see the actual URL it points to. If it doesn’t match the expected domain, don’t click.
  • Poor Grammar/Spelling: While not always present, mistakes can be a sign of a scam.

Simple Rules to Avoid Traps

  • Always Type URLs Directly: Never click on links in emails or DMs for sensitive sites. Always type the official website address directly into your browser.
  • Bookmark Official Sites: Bookmark your crypto exchanges and wallet login pages and use only those bookmarks.
  • Use 2FA: Even if your password is stolen, 2FA can protect you (see Module 11).
  • Be Suspicious of Urgency: Scammers create urgency (“account will be suspended in 24 hours!”). This is a tactic to rush your decision-making.

Module 3 Quiz

1. What is the main goal of a phishing attack in crypto?





2. What is the MOST important step to take when you encounter a crypto website to avoid a fake one?





3. What is a recommended safe practice when navigating to a crypto exchange or wallet login page?





Module 4: Social Media Scams & Fake Influencers

Social media is a major vector for crypto scams, with fraudsters leveraging platforms like Telegram, Twitter/X, Discord, and Instagram to reach a wide audience.

Why Scammers Use Telegram, Twitter/X, Instagram, Discord

These platforms offer direct messaging, large group chats, and the ability to quickly spread information (or misinformation). Scammers exploit:

  • Direct Access: They can send unsolicited messages directly to users.
  • Group Chats: They create or infiltrate large crypto-related groups to spread fake news, phishing links, or investment opportunities.
  • Impersonation: They create fake profiles of well-known crypto figures, celebrities, or project founders, capitalizing on their credibility.
  • Urgency & FOMO: Social media is perfect for creating a sense of urgency and fear of missing out, driving quick, unresearched decisions.

Deepfakes, Fake Accounts, and Impersonators

  • Fake Accounts: Scammers create profiles that look identical to legitimate ones, using stolen profile pictures, bios, and even old posts. They might just change a single letter in the username (`@binance_support` vs. `@binnance_support`).
  • Impersonators: They actively engage with real posts or respond to support requests, pretending to be official support or a respected individual, then directing victims to malicious sites or asking for crypto.
  • Deepfakes: Increasingly, AI-generated videos or audio (deepfakes) are used to create fake endorsements from celebrities or realistic-looking “live events” to promote scams.

How to Verify Real Identities and Profiles

  • Check Verified Badges: Look for official verification badges (e.g., blue checkmark on Twitter/X), but be aware these can sometimes be abused.
  • Examine Usernames Closely: Scammers often use subtle misspellings or extra characters. The official account will have the correct username.
  • Review Account History: New accounts with few posts, sudden activity spikes, or generic content are red flags. Legitimate accounts have a consistent history.
  • Cross-Reference Official Links: Always go to the official website of a project or exchange and check their *official* social media links directly from there. Do NOT trust links provided in DMs or posts directly.
  • Official Communication Channels: Most legitimate projects and exchanges will NOT ask for private keys, seed phrases, or initial deposits via DMs. Support should typically be through official website forms or verified channels.
  • Be Skeptical of Unsolicited DMs: Any unsolicited direct message offering investment opportunities or support is a major red flag.

Module 4 Quiz

1. Why are platforms like Telegram, Twitter/X, and Discord popular for crypto scammers?





2. What is a deepfake in the context of social media crypto scams?





3. What is a crucial step to verify a crypto project’s social media profile?





Module 5: Fake Airdrops and Giveaways

The promise of “free crypto” is a powerful lure, making fake airdrops and giveaways a pervasive scam tactic. Learn to distinguish between legitimate opportunities and dangerous traps.

The Classic “Send 1 ETH to Get 2 ETH Back” Trap

This is arguably the oldest and most persistent crypto scam. It involves a scammer, often impersonating a well-known figure (like Elon Musk, Vitalik Buterin), a major exchange, or a popular project, announcing a “giveaway” or “airdrop.” The trap: to participate, you must first send a small amount of crypto (e.g., 0.1 ETH or 0.01 BTC) to a specified address, with the promise of receiving a much larger amount back (e.g., 1 ETH or 0.1 BTC). **This is always a scam.** You will send your crypto, and you will receive nothing in return. They will simply take your funds.

Fake YouTube Live Streams with Fake Comments

Scammers often create fake YouTube live streams that appear to feature prominent crypto figures or company events. These streams typically run 24/7, playing old interviews or footage. In the chat, they use bots to post fake comments from “satisfied” users claiming to have received crypto from the giveaway. The video description or an overlay will contain the scammer’s crypto address and instructions for the “send-to-receive” trap. Always check:

  • Is it truly live? (often looped footage)
  • Are the comments genuine or repetitive/bot-like?
  • Does the channel seem legitimate (history, other videos)?
  • **Is anyone asking you to send crypto to get more back? If yes, it’s a scam.**

What Real Airdrops Look Like (If Any)

Legitimate airdrops (where projects distribute free tokens to users) do exist, but they are very different from scams:

  • No “Send First” Requirement: A real airdrop will NEVER ask you to send crypto first. If they need to verify your wallet, it’s typically by connecting your wallet (read-only) or asking for your public address.
  • Based on Activity/Holding: Real airdrops usually reward users for prior activity (e.g., using a specific dApp, holding certain tokens) or simply by being an active wallet on a specific blockchain.
  • Official Announcements: Legitimate airdrops are announced through official channels (project’s official website, verified social media accounts, reputable crypto news outlets), not random DMs or YouTube ads.
  • No Urgency/Pressure: There’s no pressure to act immediately.

Be extremely skeptical of any “free crypto” offer, especially if it requires you to send money or provide private keys. If you encounter a suspicious link, use a service like VirusTotal to scan it before clicking.

Module 5 Quiz

1. What is the fundamental characteristic of the “Send 1 ETH to get 2 ETH back” crypto scam?





2. What is a common red flag for a fake YouTube live stream promoting a crypto giveaway?





3. What is a true characteristic of a legitimate airdrop?





Module 6: Rug Pulls and Fake Tokens

In the decentralized finance (DeFi) space, “rug pulls” and fake tokens are prevalent scams that can lead to significant financial loss.

What is a Rug Pull and How It’s Executed

A **rug pull** is a malicious maneuver in the cryptocurrency industry where developers abandon a project and run away with investors’ funds. It typically occurs in DeFi projects that attract liquidity by offering high returns or a seemingly innovative product. The execution usually involves:

  • Creating a Token: Developers create a new token with little to no actual utility.
  • Pairing with a Valuable Asset: They list the token on a decentralized exchange (DEX) by pairing it with a legitimate, valuable asset (e.g., Ethereum, a stablecoin) in a liquidity pool.
  • Hyping the Project: They heavily promote the project, often through social media and paid influencers, creating a sense of FOMO and attracting investors.
  • Draining the Liquidity: Once a significant amount of funds are in the liquidity pool, the developers suddenly withdraw all the paired valuable assets, leaving investors holding worthless tokens (as there’s nothing left to trade them for).
  • Disappearing: The developers then disappear, often deleting their social media presence.

How to Use Tools Like CoinMarketCap, Etherscan, etc.

These tools are vital for due diligence (DYOR) to spot red flags:

  • CoinMarketCap (or CoinGecko): Check a token’s ranking, market cap, trading volume, and circulating supply. Look for official links (website, social media). Be wary of tokens with very low liquidity, or projects with a sudden, unexplained price surge.
  • Blockchain Explorers (e.g., Etherscan for Ethereum, BscScan for BNB Chain, Solscan for Solana):
    • Liquidity Pool Check: On a DEX, check the liquidity pool for the token. Is it locked? Is there significant liquidity? If the liquidity isn’t locked (e.g., by a time-lock contract or burn address), developers can pull it.
    • Token Holder Distribution: See who holds the tokens. If a few addresses hold a very large percentage of the supply, it’s a centralization risk and a potential red flag for a rug pull.
    • Contract Code (for Developers): If you have technical skills, examine the smart contract code for suspicious functions that allow the creator to drain funds or manipulate supply.

Red Flags in New Tokens and DeFi Projects

  • Unusually High Returns: “Guaranteed 1000% APY” is almost always a scam.
  • No Locked Liquidity: If the liquidity in a DEX pool is not locked or burned, it’s a huge red flag.
  • Anonymous Team: While some legitimate projects start anonymously, it increases risk significantly for new projects.
  • Suspicious Tokenomics: A very large percentage of tokens held by the development team or a few wallets.
  • Poorly Designed Website/Whitepaper: Generic templates, grammar errors, lack of technical detail.
  • Pressure to Buy Now (FOMO): Aggressive marketing pushing immediate investment.
  • Limited Audit Information: Lack of external security audits, or audits from unknown/unreputable firms.

Module 6 Quiz

1. What is a “rug pull” in the crypto space?





2. What is a major red flag when checking a new token’s liquidity pool on a DEX?





3. On a blockchain explorer like Etherscan, what should you look for regarding token holder distribution to spot a potential rug pull risk?





Module 7: Ponzi Schemes & “Guaranteed Profit” Promises

Ponzi schemes are deceptive investment operations where returns are paid to earlier investors using money from new, incoming investors, rather than from actual profit-generating activities. In crypto, these often disguise themselves as legitimate projects.

How Multi-Level Scams Spread

Ponzi schemes often have a **multi-level marketing (MLM)** or pyramid structure. Early investors are paid handsomely (sometimes with real profits initially, to build trust) and are incentivized to recruit new investors. This creates a deceptive illusion of success and sustainability. The scheme relies on a constant influx of new money; when recruitment slows or stops, the scheme collapses, and most late investors lose everything. The top tiers (founders and early recruiters) benefit at the expense of the vast majority at the bottom.

Language to Look Out For: “Guaranteed,” “Passive Income,” “No Risk”

Any crypto project or investment opportunity using these terms should immediately trigger a major red flag:

  • “Guaranteed Returns”: No legitimate investment in crypto (or any volatile market) can guarantee returns. The market is inherently unpredictable.
  • “Fixed/High Daily/Weekly/Monthly Returns”: Promises of unrealistically high, consistent percentages (e.g., “1% daily,” “20% weekly”) are characteristic of Ponzi schemes.
  • “Passive Income Without Risk”: While some legitimate crypto activities offer passive income (e.g., staking, lending), they always come with risks (smart contract risk, impermanent loss, market volatility). “No risk” is a lie.
  • “Referral Bonuses” / “Recruit to Earn”: Heavy emphasis on recruiting new investors for bonuses rather than on a tangible product or service.
  • “Secret Trading Algorithm”: Claims of a proprietary, infallible trading bot that generates consistent, high returns.

Examples of Famous Crypto Ponzi Failures

  • BitConnect: A notorious crypto Ponzi scheme from 2017-2018. It promised high returns through a “trading bot” and lending platform, heavily relying on a referral system. It collapsed in early 2018, causing billions in losses.
  • OneCoin: A massive alleged cryptocurrency Ponzi scheme that operated from 2014-2017, promising huge returns but lacking a real blockchain. It too involved a multi-level marketing structure and defrauded billions globally.
  • SQUID Game Token: Not strictly a Ponzi, but a “play-to-earn” game token that quickly became a rug pull. It promised high returns from gameplay but had anti-sell mechanisms for initial investors. It collapsed when developers sold off, leaving others unable to sell.

Always question how profits are generated. If the answer is vague or relies on new investors, it’s a scam.

Module 7 Quiz

1. How do Ponzi schemes typically pay early investors?





2. Which phrase is an IMMEDIATE red flag for a crypto Ponzi scheme?





3. What happens to a Ponzi scheme when the recruitment of new investors slows down or stops?





Module 8: Fake Wallets and Apps

Your crypto wallet is your gateway to your funds. Scammers often create fake wallet apps or browser extensions to trick you into revealing your private keys or seed phrase.

Malicious Apps in App Stores or Shared via Links

Scammers often try to get fake wallet apps or malicious versions of legitimate apps onto official app stores (Google Play Store, Apple App Store). These apps may look identical to the real ones, with similar logos and even positive-looking fake reviews. Once installed, they typically do one of two things:

  • Steal your Seed Phrase: When you try to import your existing wallet using your seed phrase, the app sends your seed phrase directly to the scammer.
  • Generate Fake Wallets: The app generates a new wallet for you, but the private key is known to the scammer, allowing them to drain any funds you deposit.

Beware of links to download apps shared in unsolicited DMs, emails, or on social media. Always assume such links are malicious.

What Permissions Are Dangerous

When installing a new app, especially on Android, review the permissions it requests. A legitimate wallet app will need permissions related to internet access and possibly storage. However, be suspicious of apps requesting excessive or unusual permissions, such as:

  • Access to your contacts.
  • SMS messages.
  • Call history.
  • Camera or microphone (unless it’s for KYC or specific features like scanning QR codes for addresses).

If an app requests permissions that seem unrelated to its core function (e.g., a wallet app requesting access to your camera for anything other than QR codes), it’s a major red flag.

How to Verify and Install a Real Wallet

To ensure you’re installing a legitimate crypto wallet:

  • Official Sources ONLY: Always download wallet apps directly from the **official website** of the wallet provider. The official website will typically have links to their legitimate app store listings or direct downloads.
  • Check Developer Name: In app stores, double-check the developer’s name. Scammers often use very similar names.
  • Read Reviews (with caution): While helpful, be aware of fake reviews. Look for consistency and detail in legitimate reviews.
  • Verify Checksums (Advanced): For desktop wallet downloads, experienced users can verify the cryptographic checksum of the downloaded file against the one provided on the official website. This ensures the file hasn’t been tampered with.
  • Start Small: When trying a new wallet, always send a very small test amount first to confirm it works as expected before sending larger funds.

Your wallet is your key to your crypto. Treat its security with the utmost care.

Module 8 Quiz

1. What is a common way malicious crypto wallet apps steal your funds?





2. Which permission request from a wallet app would be a major red flag?





3. Where should you ALWAYS download a crypto wallet app from?





Module 9: Scam Emails, SMS & Browser Popups

Scammers constantly adapt traditional phishing methods to target crypto users, often through deceptive emails, SMS messages, and malicious browser popups.

Real-life Phishing Examples (Coinbase, Binance Lookalikes)

Phishing emails and SMS messages are designed to look exactly like official communications from popular exchanges (like Coinbase, Binance, Kraken) or wallet providers (e.g., MetaMask, Trust Wallet). They might:

  • Claim Security Breaches: “Your account has been compromised! Click here to secure it.”
  • Announce Fake Bonuses/Airdrops: “You’ve won a reward! Claim it here.”
  • Warn of Account Suspension: “Your account will be suspended if you don’t verify your identity now.”
  • Fake Transaction Alerts: “A large withdrawal was just sent from your account. If this wasn’t you, click here to cancel.”

The goal is always to create urgency or fear, prompting you to click a malicious link that leads to a fake login page. Once you enter your credentials on the fake page, the scammers capture them.

Dangerous Links in Emails, and How to Scan Them

Even if an email looks legitimate, NEVER click on links in unexpected or suspicious emails, especially if they relate to your crypto accounts. Instead:

  • Hover First: On a desktop, hover your mouse cursor over the link. The true URL will appear, often in the bottom-left corner of your browser. If it doesn’t exactly match the official domain (e.g., `coinbase.com`), it’s a scam.
  • Type Directly: Always manually type the official website address into your browser’s address bar.
  • Use Link Scanners: If you’re unsure and want to verify a link without clicking it, you can use online tools like **VirusTotal** (virustotal.com) or **URLVoid** (urlvoid.com). Simply copy the suspicious link and paste it into their scanner. They will analyze it for known malware or phishing attempts.

Browser Extensions and Popups That Steal Info

Malicious browser extensions can pose a significant threat:

  • Fake Wallet Extensions: Some extensions pretend to be legitimate crypto wallets (e.g., fake MetaMask). They steal your seed phrase during setup or drain funds from your transactions.
  • Clipboard Hijackers: Extensions that monitor your clipboard. When you copy a crypto wallet address, they silently replace it with the scammer’s address, leading you to send funds to the wrong place.
  • Phishing Popups: Some extensions inject fake login popups or warnings on legitimate websites, tricking you into entering credentials.

To avoid these:

  • Download Extensions from Official Sources: Only download crypto wallet extensions from the official website of the wallet provider (e.g., metamask.io).
  • Review Permissions: Be cautious of extensions requesting excessive permissions.
  • Keep Extensions Minimal: Only install extensions you absolutely trust and need. Regularly review and remove unused extensions.
  • Always Double-Check Addresses: Before sending crypto, always double-check the recipient’s address character by character, especially if copied and pasted.

Module 9 Quiz

1. If you receive an email from a crypto exchange asking you to click a link to “verify your account immediately,” what is the safest action?





2. What is a key indicator that a link in an email might be malicious, even if it looks legitimate?





3. What is the risk associated with a “clipboard hijacker” browser extension?





Module 10: How to Research Before You Invest (DYOR)

The most powerful tool against crypto scams and bad investments is **Do Your Own Research (DYOR)**. This means critically evaluating a project before putting your money into it.

Key Tools for Research

  • Token Info Sites (CoinMarketCap, CoinGecko):
    • Check Market Cap & Volume: Healthy projects have consistent trading volume relative to their market cap.
    • Circulating vs. Max Supply: Understand the tokenomics.
    • Official Links: Verify the links to their website, whitepaper, and social media from here.
  • Project Website:
    • Professionalism: Does it look professionally designed? Are there grammar/spelling errors?
    • Content: Is the information clear, detailed, and technically sound?
    • Roadmap: Does it have a clear, realistic roadmap for future development?
  • Team:
    • Publicly Doxxed vs. Anonymous: While some legitimate projects start anonymously (like Bitcoin), most serious projects have publicly known teams with relevant experience. Research their backgrounds on LinkedIn.
    • Advisors: Are the advisors real and reputable?
  • Social Media & Community (e.g., Telegram, Discord, Twitter/X, GitHub):
    • Engagement: Is the community active and genuinely engaged, or is it filled with bots and generic comments?
    • Activity: Is the team regularly providing updates and engaging with questions?
    • GitHub: For tech projects, check their GitHub for active code development. Lack of recent activity is a red flag.
  • Whitepaper:
    • Read it: Understand the problem it solves, the technology, and the token’s utility.
    • Clarity & Detail: Is it well-written and technically sound, or full of buzzwords and vague promises?

How to Spot Copy-Paste Websites and Fake Whitepapers

  • Reverse Image Search: Use Google Images or TinEye to check if images on the website or whitepaper are stolen from other projects.
  • Plagiarism Check: Copy sections of text from the whitepaper into a search engine to see if they appear elsewhere, especially from unrelated projects.
  • Generic Templates: Look for generic website templates that are commonly used by scam projects.
  • Vague Language: Whitepapers with lots of buzzwords but no clear technical details or real-world application.
  • “Roadmap” Only: A project with only future plans and no past achievements or a working product (even in beta) can be a red flag.

Trust Indicators vs. Warning Signs

  • Trust Indicators: Publicly known and experienced team, detailed and unique whitepaper/tech docs, active and organic community, regular code updates on GitHub, successful independent security audits, clear utility for the token, realistic promises.
  • Warning Signs: Anonymous team (for projects beyond Bitcoin/Monero), guaranteed returns, pressure to buy, unsolicited DMs, excessive marketing with no substance, vague whitepaper, no locked liquidity, low trading volume relative to hype, inability to sell (for new DeFi tokens).

Module 10 Quiz

1. When researching a crypto project, what is a key reason to check its GitHub repository?





2. What is a red flag if a project’s whitepaper is mostly copied text from other sources?





3. Which of the following is a strong “trust indicator” for a crypto project?





Module 11: Staying Safe with Wallets and Exchanges

Beyond identifying scams, proactive security measures for your wallets and exchange accounts are your ultimate defense.

Setting Up 2FA, Secure Passwords, Hardware Wallets

  • Two-Factor Authentication (2FA): Always enable 2FA on *every* crypto account you own—exchanges, wallets, and even your dedicated crypto email. Authenticator apps (Google Authenticator, Authy) are preferred over SMS 2FA due to SIM-swapping risks.
  • Unique, Strong Passwords: Use a unique, complex password for every crypto service. Never reuse passwords. Use a password manager to generate and store them securely.
  • Hardware Wallets (Cold Storage): For any significant amount of crypto, transfer it off exchanges and into a hardware wallet (e.g., Ledger, Trezor). This keeps your private keys offline and provides the highest level of security against online hacks.
  • Multi-signature Wallets (Advanced): For very large holdings, consider multi-sig wallets which require multiple private keys (held by different people or devices) to authorize a transaction.

Never Storing Seed Phrases Online

This cannot be stressed enough: **Your seed phrase (recovery phrase/mnemonic phrase) is the master key to your crypto.** If someone gets it, they own your crypto. Therefore:

  • Physical Storage ONLY: Write it down on paper. Do NOT take photos, store it on your computer, phone, cloud storage, email, or in a password manager.
  • Multiple Secure Locations: Store multiple copies in different, secure physical locations (e.g., fireproof safe, bank safety deposit box).
  • Test Recovery: For peace of mind, perform a test recovery on a new device with a small amount of crypto to ensure your seed phrase is correct and readable.
  • Never Share: No legitimate entity (exchange, wallet support, project team) will ever ask for your seed phrase. Anyone who does is a scammer.

How to Detect If a Platform Is Legit

Before using any crypto platform:

  • Official Website: Always access platforms by typing their official URL directly into your browser or using a trusted bookmark. Never click links from external sources unless you have thoroughly verified them.
  • Reputation & Reviews: Research the platform’s history, read reputable reviews (not just isolated positive ones), and check for any reported hacks or controversies.
  • Security Measures: Look for clear information on their security practices (e.g., cold storage percentage, insurance funds, bug bounty programs).
  • Regulatory Compliance: Check if they are registered or licensed with relevant financial authorities in their jurisdiction (if applicable).
  • Customer Support: Test their customer support. Is it responsive and helpful?
  • Third-Party Audits: For DeFi protocols, check if their smart contracts have been audited by reputable blockchain security firms (e.g., CertiK, ConsenSys Diligence).

Module 11 Quiz

1. What is the most secure method for storing your private keys for long-term crypto holdings?





2. What is the critical rule for storing your seed phrase (recovery phrase)?





3. When assessing if a crypto exchange is legitimate, what should you primarily do?





Module 12: What To Do If You’ve Been Scammed

Even with the best precautions, scams can happen. Knowing what to do immediately can mitigate losses and help others.

Steps to Take Immediately

Time is critical in crypto scams. Act fast:

  1. Stop All Activity: Immediately cease any further interaction with the scammer or fraudulent platform.
  2. Secure Remaining Assets: If only a portion of your funds was compromised, move remaining crypto to a new, secure wallet address immediately.
  3. Change Passwords & Enable 2FA: Change passwords for all affected accounts (exchange, email, social media) and enable (or re-enable) 2FA using an authenticator app.
  4. Disconnect Wallet: If you connected your wallet to a suspicious dApp, go to your wallet (e.g., MetaMask) settings and revoke permissions/disconnect from that site.
  5. Gather Evidence: Collect all possible information: transaction IDs, wallet addresses involved, screenshots of conversations, emails, website URLs, timestamps. This evidence is crucial for reporting.

Reporting to Platforms and Authorities

  • Report to the Platform: If funds were stolen from an exchange account, contact the exchange’s support immediately. They may have limited ability to recover funds, but they can investigate and potentially flag scammer accounts.
  • Report to Law Enforcement: File a report with your local police and relevant national authorities (e.g., FBI’s Internet Crime Complaint Center (IC3) in the US, Action Fraud in the UK, national cybersecurity agencies). While crypto recovery by law enforcement is rare, reporting helps track scammers and protects future victims.
  • Report to Blockchain Analytics Firms: Some firms specialize in tracking stolen crypto (e.g., Chainalysis, Elliptic). They might be able to help identify the scammer’s wallet movements, but often work with law enforcement/exchanges.
  • Alert Community/Project: If the scam involves a specific token or project, alert their official community channels to warn others.

Realistic Chances of Recovery and Protecting Others

The unfortunate reality is that **recovering stolen crypto is very difficult, and often impossible**, especially due to the irreversible nature of blockchain transactions and the pseudo-anonymity of wallets. Law enforcement often lacks the resources or expertise for crypto-specific investigations.

However, reporting is vital even if recovery seems unlikely:

  • It creates a record that might help in future investigations or legal action against scammers.
  • It helps authorities and platforms understand emerging scam tactics, potentially leading to better preventative measures.
  • It can prevent others from falling victim to the same scam.

The best defense against scams is always prevention through education, vigilance, and strict security practices. Your experience, though painful, can become a lesson for others.

Module 12 Quiz

1. What is the MOST immediate action to take if you realize you’ve been scammed and some crypto is still in your wallet?





2. What type of information is crucial to gather as evidence if you’ve been scammed?





3. What is the realistic chance of recovering stolen crypto funds after a scam?





Course Completed!

Congratulations! You have successfully completed the “Crypto Scams: How to Spot and Avoid Them” course. You are now equipped with critical knowledge to identify and protect yourself from common crypto scams.

Remember, vigilance is your best defense. Stay informed, be skeptical, and prioritize your digital security to navigate the crypto world safely.

Join Our Newsletter

About · White Paper · Purchase Conditions
Legal · Privacy Policy · Cookies Policy
100MCrypto
Copyright © 2026

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}