Shepley Capital

RISKS & SCAMS

Risks and Scams - Cryptopedia by Shepley Capital

The Dangers of Phishing Scams in Crypto: Email and Social Media

Phishing is the single most prevalent form of cybercrime targeting crypto investors. It doesn’t require sophisticated technical knowledge to execute, it scales effortlessly across millions of targets simultaneously, and it exploits something that no security software can fully patch: human psychology. Every year, phishing attacks drain hundreds of millions of dollars from crypto investors who believed they were interacting with a legitimate platform, service, or person.

Understanding exactly how phishing works, what it looks like across different channels, and how to build habits that protect against it is not optional for anyone participating in the crypto space. It is a baseline survival skill.


What Is Phishing?

Phishing is a social engineering attack where a malicious actor impersonates a trusted entity to deceive a target into revealing sensitive information, clicking a malicious link, or taking an action that compromises their security or finances.

The term comes from the analogy of fishing: casting a wide net of deceptive messages and waiting for targets to take the bait. In the crypto context, the “bait” is typically a convincing imitation of a legitimate exchange, wallet provider, platform, or person. The “hook” is whatever action the attacker wants you to take: entering your credentials on a fake website, approving a malicious transaction, sending crypto to an attacker’s address, or revealing your seed phrase or private keys.

Unlike technical attacks that target software vulnerabilities, phishing targets you directly. Your judgement, your trust, and your emotional responses are the attack surface.


Email Phishing: How It Works

Email phishing targeting crypto investors is sophisticated, highly targeted, and increasingly difficult to distinguish from legitimate communications at first glance.

Spoofed sender addresses. Attackers send emails that appear to come from legitimate platforms. The display name might read “CoinSpot Security Team” or “Binance Support,” but the actual sending address, visible when you expand the sender details, is a completely different domain. Common techniques include using domains that look similar to the real one, for example “coinsp0t.com” instead of “coinspot.com,” or using subdomains that place the legitimate-looking name early in the address, such as “coinspot.security.maliciousdomain.com.”

Urgency and alarm triggers. Phishing emails almost universally create a sense of urgency or alarm to override analytical thinking. Common triggers include: “Your account has been compromised and will be suspended in 24 hours,” “Unusual login activity detected, verify your account immediately,” “Your withdrawal has been flagged, click here to confirm,” and “Your wallet requires an urgent security update.” The emotional response these triggers create, anxiety and urgency, is designed to push you toward clicking before you think.

Convincing visual design. Modern phishing emails are visually sophisticated. They use the correct logos, colour schemes, fonts, and formatting of legitimate platforms. They include footer text with legal disclaimers and contact information that looks genuine. At a visual glance, many phishing emails are indistinguishable from the real thing. The difference is in the sender address, the links, and the request being made.

Malicious links. The links in phishing emails lead to fake websites that look identical to the legitimate platform. When you enter your credentials on a fake exchange login page, those credentials are captured by the attacker in real time. When you click “verify your wallet” and connect your MetaMask to a fake site, a wallet drainer script may execute immediately.

Fake attachment malware. Some phishing emails include attachments described as security reports, transaction confirmations, or tax documents that are actually malware. Opening these attachments installs keyloggers, remote access trojans, or clipboard hijackers on your device as covered in our advanced crypto security resource.


Social Media Phishing: The Platforms and the Tactics

Social media phishing targeting crypto investors operates across every major platform and has become increasingly sophisticated in both targeting and execution.

Impersonation accounts. Attackers create social media accounts that impersonate prominent figures in the crypto space, including exchange CEOs, project founders, influencers, and support teams. These accounts copy profile pictures, display names, and bios to appear identical or near-identical to the real accounts. They then engage with the target’s posts, send direct messages, or post comments offering “exclusive opportunities,” “giveaways,” or “support.”

A common variant: you post a question or complaint about an exchange on Twitter or Reddit, and within minutes you receive a direct message from an account impersonating that exchange’s support team, offering to help resolve your issue. The “help” involves directing you to a phishing site or requesting your account credentials or seed phrase.

Fake giveaway scams. “Send 1 Bitcoin and receive 2 back” is perhaps the most well-known crypto social media scam, but its variants continue to evolve and continue to work because they target new entrants to the space who haven’t seen them before. These scams are typically run from impersonation accounts of high-profile individuals and are amplified by networks of bot accounts that post fake testimonials in the comments.

No legitimate giveaway, airdrop, or promotion ever requires you to send crypto first. This is an absolute rule with no exceptions.

Compromised legitimate accounts. Attackers who gain access to legitimate, high-follower social media accounts use those accounts to post fraudulent promotions, fake giveaways, and malicious links to their followers. The post appears to come from a trusted source because it does, in a sense, the account is real, only the post is fraudulent. This is why verification and follower count are insufficient indicators of legitimacy.

Discord and Telegram phishing. These platforms are the primary community hubs for crypto projects and are heavily targeted by phishing operations. Common tactics include: fake admin or moderator accounts direct messaging new members with “exclusive” opportunities, fake bot announcements that mimic legitimate project communications, compromised community accounts used to post malicious links, and fake support channels that solicit seed phrases from users experiencing problems.

In both Discord and Telegram, no legitimate admin, moderator, or support person will ever direct message you first with an offer or request. Legitimate support in these communities operates in public channels.


Spear Phishing: When You’re Specifically Targeted

Standard phishing casts a wide net. Spear phishing is targeted specifically at you, using personal information gathered from social media, data breaches, and other sources to craft a highly convincing, personalised attack.

A spear phishing attack might reference your name, your recent transactions, your exchange accounts, or other specific details that make the message appear to come from a source with genuine knowledge of your situation. The personalisation dramatically increases the likelihood that you’ll believe the message is legitimate and act on it.

Crypto investors who are publicly visible, whether through social media presence, community participation, or known involvement in high-value transactions, are at higher risk of targeted spear phishing attacks. The more information you make publicly available about your crypto activity, the more material attackers have to craft convincing targeted attacks.

This is one of the reasons that operational security, being thoughtful about what you share publicly regarding your crypto holdings, the exchanges you use, and the wallets you hold, is a meaningful risk reduction measure. As covered in our advanced crypto security resource, reducing your visible attack surface reduces your risk exposure.


The Seed Phrase Request: The Universal Red Flag

Across every phishing vector, email, social media, Discord, Telegram, fake support sites, and phone calls, the endgame of most crypto phishing attacks is the same: getting you to reveal your seed phrase or private keys.

The framing varies. “We need to verify your wallet ownership.” “Our system requires your recovery phrase to restore access.” “Enter your seed phrase to claim your airdrop.” “Our support team needs your recovery words to investigate your issue.” Every one of these requests, regardless of how it is framed, regardless of who appears to be asking, is a scam.

No legitimate platform, exchange, wallet provider, support service, or individual ever needs your seed phrase or private keys for any legitimate purpose. These credentials exist only in your possession and should never leave it under any circumstances.

If you receive any request for your seed phrase or private keys through any channel, the correct response is to immediately disengage from the communication and report it to the platform being impersonated.

Our resources on seed phrase storage and how to secure your MetaMask wallet reinforce this principle consistently because it is the most important single security rule in crypto.


How to Verify Before You Click

Building a habit of verification before taking any action in response to a crypto communication is the most practical protection against phishing across all channels.

For emails: never click links in emails from exchanges, wallet providers, or any crypto platform. Navigate directly to the platform by typing the URL into your browser or using a saved bookmark. Log in through your normal process and check whether the notification or alert referenced in the email actually appears in your account. If it doesn’t, the email was fraudulent.

Check the sender’s email address in full, not just the display name. Expand the sender details and look at the actual domain. Compare it character by character to the legitimate domain. A single character difference, a transposed letter, a number substituted for a letter, or an added word, is a fake.

Set up anti-phishing codes on every exchange that offers them. A personal code that appears in every legitimate email from that platform makes fraudulent emails immediately identifiable.

For social media: verify accounts through multiple signals before engaging, including verification badges where available, follower count relative to the real account, posting history, and account creation date. Be deeply sceptical of any direct message offering help, an opportunity, or a giveaway from an account you didn’t initiate contact with.

Search for the real account directly through the platform’s search rather than following links or clicking on accounts that appear in your notifications. Impersonation accounts rely on slight differences that are easy to miss when you’re not looking for them.

For Discord and Telegram: check the actual username carefully, not just the display name. Attackers use display names identical to legitimate admins but with subtly different usernames. In Discord, check the four-digit discriminator number at the end of the username if visible. Legitimate admins are identifiable through verified roles in the server, not through direct messages.


Protecting Your Accounts Against Phishing Consequences

Even with the best habits, the volume and sophistication of phishing attempts means that perfect vigilance at all times is unrealistic. Structural protections reduce the damage if a phishing attempt ever succeeds in part.

Two-factor authentication using an authenticator app on every exchange and email account means that a stolen password alone is insufficient to access your account. An attacker who captures your login credentials through a phishing site still cannot complete login without your second factor.

Withdrawal address whitelisting on your exchanges means that even full account access cannot be used to drain your funds to an unauthorised address. As covered in our how to avoid exchange hacks resource, whitelisting is one of the most effective protections against account compromise regardless of how it occurs.

Self-custody of long-term holdings means that exchange account compromises cannot affect assets held in your own hardware wallet. As covered extensively in our resource on the risks of keeping crypto on an exchange, assets you control directly in self-custody are not accessible through exchange account phishing regardless of the outcome of the attack on the exchange account.

A dedicated email address for crypto accounts that is not publicly associated with your identity reduces the targeting surface for email phishing. Attackers who compile email lists from data breaches, social media, and other sources cannot target your crypto exchange accounts if the email address used for those accounts is not publicly known.


What to Do If You’ve Been Phished

If you realise you’ve clicked a phishing link, entered credentials on a fake site, or connected your wallet to a malicious site, act immediately.

For compromised exchange credentials: log in to the real exchange immediately through your bookmarked URL and change your password. Revoke any active sessions. Check your withdrawal history for any unauthorised transactions. Contact the exchange’s security team through official channels.

For a wallet connected to a malicious site: immediately revoke all token approvals using a tool like Revoke.cash. Transfer any remaining assets from the compromised wallet to a fresh wallet generated on a clean device. Do not reuse the compromised wallet for anything.

For a revealed seed phrase: this is the worst case scenario. Move all assets from the compromised wallet to a new wallet generated from a new seed phrase on a clean device as fast as possible. Once a seed phrase is known by another party, the wallet it generates must be considered permanently compromised. There is no partial remedy. Every asset must be moved immediately.

Speed is everything in all of these scenarios. The window between a phishing compromise and an attacker acting on it can be very short.


Key Takeaways

Phishing attacks impersonate trusted entities through email and social media to steal credentials, seed phrases, private keys, and crypto assets. They work by triggering urgency, alarm, and trust responses that bypass analytical thinking. Email phishing uses spoofed sender addresses, urgent alarm triggers, and convincing visual design. Social media phishing uses impersonation accounts, fake giveaways, and compromised legitimate accounts. Spear phishing targets you specifically using personal information to craft convincing attacks.

No legitimate platform or person ever needs your seed phrase or private keys. Never click links in crypto emails; navigate directly to platforms through bookmarks. Verify accounts through multiple signals before engaging. Use two-factor authentication, withdrawal whitelisting, and self-custody to limit the damage of any successful attack. And if you are phished, act immediately.

Phishing works because it targets human psychology rather than technical systems. Building habits that insert verification between stimulus and action is the most effective protection available.

For everyday investors building strong security habits and learning to navigate the risks of the crypto space safely, our Runite Tier Membership provides the education and frameworks to do it right. For serious investors who want a comprehensive, personalised security and risk framework built around their specific situation, our Black Emerald and Obsidian Tier Members receive dedicated specialist support covering every dimension of crypto security. Find out more at shepleycapital.com/membership.

WRITTEN & REVIEWED BY Chris Shepley

UPDATED: MARCH 2026

Choose your next topic from our Cryptopedia​