🔍How to spot a Web3 / Crypto Scams
Crypto scams are prevalent in the Web3 and cryptocurrency industry, causing users to lose significant amounts of funds. To protect yourself and stay safe, it's essential to be aware of the various types of scams and know how to spot and report them. This tutorial will guide you through identifying and reporting common crypto scams, such as phishing scams, crypto rug pulls, malicious airdrops, malware attacks, spoofing, and other deceptive tactics. Additionally, we will explore how the Vigilance DAO Chrome extension can assist you in identifying and reporting scams effectively.
Phishing Scams: Phishing scams aim to trick users into revealing their private keys or seed phrases. Here are common phishing techniques to watch out for: a. Seed Phishing Through Ads: Scammers promote fraudulent websites via Google Ads, urging users to submit their seed phrases. Never share your private keys or seed phrases with anyone or any platform. Legitimate Web3 and cryptocurrency platforms will never ask for this information. b. Ice Phishing: Scammers tamper with smart contract platforms, replacing the receiver's address with their own. Double-check the sender's address both in the receiver's address box and the confirmation screen to protect against this type of attack. c. Social Media Phishing: Scammers target users on social platforms like Discord, Telegram, and Twitter. They may share fraudulent links, ask for funds, or promise higher returns. Never share your private keys, click on suspicious links, and enable two-factor authentication (2FA) on all your social accounts. d. Employer Phishing: Scammers impersonate senior figures or employers of Web3 and crypto companies, asking employees to send funds or share wallet addresses. Be cautious and verify the authenticity of emails by checking the domain name and contacting your company's official team.
Malicious Airdrops: Scammers create fake promotions using the names of celebrities or crypto projects to entice users into providing their private information. Always verify the URLs and usernames of channels offering airdrops, and cross-check with official channels. Genuine projects will not ask for your private keys or seed phrases.
Crypto Rug Pulls: Rug pulls occur when founders of a crypto project abandon the project and disappear with investors' funds. To avoid rug pulls: a. Research the project thoroughly, including authenticating team members' backgrounds. b. Be skeptical of exaggerated promises or claims. c. Prioritize thorough research before investing in any project.
Malware: Malware poses a significant threat to crypto users. Scammers can replace wallet addresses, tricking users into sending funds to the wrong address. Protect yourself from malware: a. Enter the receiver's address by scanning the QR code. b. Triple-check each character of the receiver's address. c. Start with smaller transactions and confirm with the receiver before making significant transfers. d. Keep your devices protected with antivirus software and avoid clicking suspicious links.
Spoofing: Spoofing involves scammers impersonating legitimate URLs, websites, emails, or text messages. Be cautious of: a. Checking URLs, email addresses, and any links you access. b. Never share your seed phrases and be aware that crypto projects will not ask for them. c. Mark suspicious emails as spam to help protect others.
Other Scam Tactics: Apart from the aforementioned scams, scammers may resort to tactics such as blackmail, ransomware, pumps and dumps, Ponzi schemes, or emotional manipulation. Stay vigilant and avoid engaging with unknown individuals or suspicious activities.
Last updated