Добавить новость

Министерство науки РФ пересмотрит платный приём в вузы к 2025 году.

Путин созвонился с лидерами Ирана и Израиля

Норвежская федерация лыжных видов спорта снизит расходы в связи с убыточным чемпионатом мира

В МИД РФ призвали к политико-дипломатическому решению иранского вопроса



Новости сегодня

Новости от TheMoneytizer

What is social engineering in crypto (and how to protect yourself)?

Social engineering in crypto, explained

In the world of cryptocurrency, security goes beyond just protecting your wallet with a password or private key. One of the most deceptive and increasingly dangerous threats to crypto users today is social engineering.

While you might think of cyberattacks as highly technical affairs, social engineering manipulates the most vulnerable aspect of security: human nature. 

At its core, social engineering refers to the act of manipulating people into divulging confidential information or granting unauthorized access to systems. 

Unlike traditional hacking, which typically exploits technological vulnerabilities, social engineering targets the human element. Attackers rely on deception, psychological manipulation and trust-building tactics to deceive their victims. By exploiting psychological weaknesses, attackers can trick individuals into giving up their private information, credentials or funds. 

In the world of crypto, this kind of manipulation is especially dangerous because transactions are irreversible, and the decentralized nature of cryptocurrencies can make it even harder to recover lost funds. Once funds are transferred or access is granted, it’s almost impossible to reverse the action. This makes crypto users a prime target for social engineering attacks.

Did you know? In 2024, phishing and spoofing topped the US Federal Bureau of Investigation’s list of reported cybercrimes, with victims also losing over $6.5 billion to crypto-related investment fraud, according to the Internet Crime Complaint Center.

Anatomy of a social engineering attack: Step by step

Social engineering attacks trick crypto users by gaining trust, creating urgency, and then stealing sensitive info to drain their wallets.

Step 1: The setup — Scouting for targets

Scammers start by lurking on social media platforms such as X, Discord, Telegram and Reddit.

They look for:

  • Newbies asking for help
  • People showing off their gains or NFTs
  • Users who accidentally leak wallet addresses or emails.

The more info they gather, the easier it is to craft a personalized attack.

Step 2: The approach — Gaining trust

Next, they reach out, pretending to be:

  • A helpful support agent (e.g., from MetaMask, Binance)
  • A famous crypto influencer
  • A friend or community manager.

They copy profile pictures, usernames (sometimes with slight changes), and even fake verification badges to seem real. This is all about lowering your guard.

Step 3: The hook — Creating urgency or fear

Now they trigger your emotions with urgent, scary or tempting messages:

  • “Your wallet is at risk — act now!”
  • “Exclusive airdrop ending in 5 minutes!”
  • “We detected suspicious activity — please verify your account!”
  • They use fear, excitement and time pressure to force you into quick action without thinking.

Step 4: The ask — Extracting sensitive info

This is where the real trap springs. They ask you to:

  • Share your private key or seed phrase (a big red flag)
  • Click a link to a phishing site that looks like MetaMask, Phantom or OpenSea
  • Approve a suspicious smart contract that drains your wallet
  • Send a small amount of crypto to “verify your account” or “unlock” funds.

If you fall for this step — game over.

Step 5: The heist — Draining your crypto

Once they get your sensitive info or get you to sign a malicious transaction, they:

Victims usually realize the theft too late; sadly, funds are gone forever in most cases.

Did you know? Onchain analyst ZachXBT uncovered an additional $45 million stolen from Coinbase users in early May 2025 through social engineering scams — a tactic he says is uniquely prevalent on the platform compared to other crypto exchanges.

Common types of social engineering scams in crypto

Scammers target crypto users via phishing, impersonation, giveaway and romance scams, and fake investment platforms.

Phishing

Phishing remains one of the most prevalent forms of social engineering in the crypto world. This can take several forms but typically involves fake websites, apps or emails designed to look legitimate.

  • Fake wallet apps: Scammers create fake versions of popular wallet apps like MetaMask or Trust Wallet. They trick users into downloading these apps, which then steal the private keys and funds stored within them.
  • Fake exchanges: Similarly, attackers might impersonate well-known cryptocurrency exchanges. Victims are sent a link to a phishing site that looks identical to a legitimate platform, such as Binance or Coinbase. Once users log in and input their details, the attacker gains access to their funds.
  • Fake MetaMask pop-ups: One common trick involves fake pop-ups that prompt MetaMask users to enter their seed phrase or private keys, thereby giving scammers control over their wallets.

Impersonation

Impersonation scams occur when attackers pose as legitimate figures — whether that’s support staff, crypto influencers or even friends — to convince victims to hand over their information or funds.

  • Fake support staff: In many cases, scammers will impersonate customer support agents for popular crypto wallets or exchanges. They might reach out to users claiming there’s an issue with their account and ask for sensitive information, such as a password or seed phrase.
  • Influencers and friends: Attackers might pretend to be well-known crypto influencers or friends, asking for funds or convincing victims to participate in a scam. In some cases, attackers even go as far as to hijack a social media account of a crypto personality, offering fake giveaways or investment opportunities.

Giveaway scams

“Send 1 ETH, get 2 ETH back” — this is the classic giveaway scam that has made its rounds throughout the crypto community. Scammers pose as trusted entities, often mimicking celebrities like Elon Musk or official crypto exchanges, claiming they’re running a giveaway.

The catch? The scammer asks you to send cryptocurrency to a specified wallet address in exchange for a larger amount of crypto that you’ll receive “later.” Once the funds are sent, they disappear.

Romance and friendship scams

Romance and friendship scams, often known as pig butchering, occur when an attacker builds an emotional connection with the victim through messaging platforms like Telegram or even dating apps. Over time, the scammer gains the victim’s trust and then lures them into a fake investment opportunity, often involving cryptocurrency.

Victims are manipulated into sending funds to what they believe is a secure investment, only to lose all their money when the scammer disappears.

Fake investment platforms

Fake investment platforms promise extremely high returns with minimal risk — too good to be true. These scams might mimic legitimate crypto investment platforms, promising high returns on crypto investments or passive income streams. 

Once users deposit their funds, the platform either disappears or the scammer stops responding to communication.

Why social engineering works so well in crypto

Social engineering attacks thrive in the cryptocurrency world because they take advantage of certain vulnerabilities that are unique to the space. The combination of psychological manipulation, technical complexity and the irreversible nature of crypto transactions makes crypto users particularly susceptible to these types of scams. 

Below are the key factors that explain why social engineering is so effective in the crypto environment:

  • Fear and urgency: Crypto scams often create a sense of urgency to pressure victims into acting quickly. Common examples include emails or messages stating, “Your account is locked!” or “You need to verify your identity to avoid losing access to your funds!” These messages push users to make impulsive decisions that they later regret.
  • Greed: Social engineering tactics often prey on a person’s desire to make quick, easy money. Scammers might promise users huge returns on investment or offer “exclusive” crypto deals that seem too good to pass up. This appeals to the greed of crypto investors, making them more likely to act impulsively.

  • Lack of crypto security knowledge: Many crypto users, especially beginners, may not fully understand how crypto security works. This makes them more susceptible to attacks like phishing, where they might unknowingly give up their private keys or passwords. Scammers take advantage of this lack of knowledge to manipulate and deceive.

How to protect yourself from social engineering attacks

While social engineering is hard to prevent entirely, staying vigilant, using 2FA, verifying links and practicing strong security habits can significantly reduce your risk.

Several steps you can take to minimize your risk include:

  • Be skeptical of unsolicited messages: Always be cautious when you receive unsolicited messages, whether by email, SMS or social media. If someone contacts you out of the blue asking for sensitive information or money, verify the authenticity of the message before acting.
  • Enable two-factor authentication (2FA): Always use 2FA whenever possible. This adds an extra layer of security to your accounts, making it harder for attackers to gain access — even if they manage to obtain your password.
  • Verify links and URLs: Before clicking on any link, hover your cursor over it to see where it leads. If the URL looks suspicious or doesn’t match the official site, don’t click it. Always double-check URLs for legitimacy, especially when dealing with crypto transactions.
  • Educate yourself and others: The best defense against social engineering is knowledge. Stay informed about common scams and share this knowledge with others. The more you know, the less likely you are to fall for a scam.
  • Use strong security practices: Consider using hardware wallets for storing your crypto assets, as these are considered much safer than keeping them on exchange platforms or software wallets. Always keep your private keys and seed phrases secure and never share them with anyone.

In a crypto world full of scammers, your best defense is vigilance, education and strong security practices — because even the smartest tech can’t protect you from a well-crafted con.

Читайте на 123ru.net


Новости 24/7 DirectAdvert - доход для вашего сайта



Частные объявления в Вашем городе, в Вашем регионе и в России



Smi24.net — ежеминутные новости с ежедневным архивом. Только у нас — все главные новости дня без политической цензуры. "123 Новости" — абсолютно все точки зрения, трезвая аналитика, цивилизованные споры и обсуждения без взаимных обвинений и оскорблений. Помните, что не у всех точка зрения совпадает с Вашей. Уважайте мнение других, даже если Вы отстаиваете свой взгляд и свою позицию. Smi24.net — облегчённая версия старейшего обозревателя новостей 123ru.net. Мы не навязываем Вам своё видение, мы даём Вам срез событий дня без цензуры и без купюр. Новости, какие они есть —онлайн с поминутным архивом по всем городам и регионам России, Украины, Белоруссии и Абхазии. Smi24.net — живые новости в живом эфире! Быстрый поиск от Smi24.net — это не только возможность первым узнать, но и преимущество сообщить срочные новости мгновенно на любом языке мира и быть услышанным тут же. В любую минуту Вы можете добавить свою новость - здесь.




Новости от наших партнёров в Вашем городе

Ria.city

В Подмосковье подтопило трассы во время сильного дождя

Никиту Кологривого, Федора Бондарчука и Викторию Исакову эвакуировали из Ирана

«Βοюeм ɜa вcex»: гοмοceκи οттοптaлиcь в цeнтpe Κиeвa

Собянин сообщил об открытии обновленной поликлиники

Музыкальные новости

Лукашенко навел порядок с картошкой просто положив наручники на стол, а мы платим по 200 рублей за кг, делая вид что это - нормально

Готовец продлил контракт с «Динамо»

Концертный ТУР для Певцов, Артистов, Музыкантов.

Дугенцова раскритиковала метод Маска шлепать детей для воспитания гениев

Новости России

Лавров осудил силовую акцию Израиля против Ирана

Не усидели на стуле: туристы в Италии сломали музейный экспонат

В МИД РФ призвали к политико-дипломатическому решению иранского вопроса

От фасада до ИТ-полигона: как модернизируется образовательная инфраструктура в Рязанском районе

Экология в России и мире

Микробиология в медицине: новые исследования и достижения

В лесах Подмосковья и Владимирской области развелись золотистые шакалы: из каких дальних стран они пришли?

Стало известно о нахождении в Иране 51 российского артиста

«SKINNY»: ice Lo и Gayana спели дуэтом в новом треке

Спорт в России и мире

Экс-первая ракетка мира оценил шансы Елены Рыбакиной выиграть Уимблдон-2025

Хромачева стала победительницей парного турнира в Хертогенбосе

Захарова войдет в топ-90 мирового рейтинга WTA после турнира в Лондоне

Шнайдер извинилась перед британскими болельщиками после победы над Бултер на турнире WTA

Moscow.media

Российский рынок ПО: будущее за совместными проектами

"Золотой Гаишник" сидел в аквариуме как загнанный зверёк: Судья одним ударом молотка решила его судьбу

На трассе Р-132 в Смоленской области начинается ремонт моста через реку Любушка

«Любовь придумали в России»: VITA CHIKOVANI представила заводной трек в преддверии лета











Топ новостей на этот час

Rss.plus






Прилепин высказался по поводу обращения Пермякова, который попытался покончить с собой

Mash: рэперы Lil Pump и SmokeРurpp провели ночь в элитном клубе Москвы

В МИД РФ призвали к политико-дипломатическому решению иранского вопроса

Володин начал проводить опрос по вопросу доступности массового спорта для детей