Social engineering in crypto is the use of psychological manipulation and deception to trick people into revealing sensitive information (like private keys or seed phrases), authorizing malicious transactions, or sending funds directly to scammers.
Unlike technical hacks that exploit vulnerabilities in code, social engineering bypasses security by exploiting human psychology, such as trust, fear, curiosity, and the sense of urgency. Because blockchain transactions are generally irreversible, once an attacker has access to a victim's assets, they are often permanently lost.
Common Social Engineering Scams in Crypto
- Scammers use various tactics to target crypto users:
- Phishing Attacks: Scammers send fraudulent emails, text messages (smishing), or direct messages (DMs) that appear to be from legitimate crypto exchanges, wallet providers, or projects to lure users to fake websites. These sites trick victims into entering login credentials, private keys, or seed phrases, which the attacker then steals.
- "Giveaway" Scams: This involves fake social media accounts (often impersonating celebrities or influencers) promising to send back a larger amount of crypto than the user sends in first.
- Impersonation and Tech Support Scams: Attackers pose as customer support, IT staff, or project team members on platforms like Discord or Telegram, offering to help with a problem, such as a compromised account or a software upgrade. They then pressure the victim to install malware or hand over credentials.
- Fake Startups and "Game" Lures: Attackers create professional-looking websites, GitHub repositories, or game demos to trick users into downloading malicious software that is designed to steal wallet data.
- Blind-Signing & Approval Phishing: Scammers trick users into connecting their wallets to malicious dApps (decentralized applications) and "blind-signing" transactions that grant the attacker unlimited spending rights over the user's tokens.
- AI-Powered Deepfake Scams: Utilizing AI to clone voices or create deepfake videos of colleagues or family members to create a sense of emergency and pressure victims into making urgent fund transfers.
How to Protect Yourself
- Verify Information: Always cross-check announcements or requests through at least two separate, official channels. Do not use links provided in suspicious messages.
- Be Skeptical: If an offer seems "too good to be true," it probably is. Be wary of unsolicited offers or urgent requests that pressure you to act without thinking.
- Secure Accounts: Use strong, unique passwords and enable multi-factor authentication (MFA) on all accounts. Hardware security keys (like FIDO2) are more secure than SMS-based MFA.
- Never Share Keys: Legitimate projects, exchanges, or support staff will never ask for your private keys or recovery/seed phrase.
- Use Hardware Wallets: For storing significant amounts of cryptocurrency, use a hardware wallet and ensure you understand exactly what you are approving before confirming any transactions.
- Use Official Sources: Manually type official URLs into your browser or use saved bookmarks instead of clicking links in messages or search ads.