Phishing is the most common cause of cryptocurrency loss for individual users globally. More funds are lost to phishing than to exchange hacks, malware, or any other single attack vector. The reason: phishing bypasses technical security entirely by targeting human psychology rather than software vulnerabilities. A perfectly secured hardware wallet with a correctly stored seed phrase provides no protection if the user is tricked into entering the seed phrase on a fraudulent website. A well-configured exchange account with authenticator 2FA is compromised if the user hands over the 2FA code to a convincing impersonator.
Australian crypto investors are specifically targeted by phishing operations. The combination of relatively high crypto adoption, strong purchasing power, and documented participation in major platforms makes Australians attractive targets. The Australian Competition and Consumer Commission’s Scamwatch receives thousands of crypto-related scam reports annually, with phishing consistently among the leading categories.
This guide covers how crypto phishing works, every major phishing technique used against crypto users, the psychological manipulation tactics that make phishing effective, and the practical countermeasures that prevent phishing losses.
Phishing attacks impersonate trusted entities (exchanges, hardware wallet manufacturers, DeFi protocols, customer support services) to trick users into taking actions that compromise their security. The impersonation must be convincing enough to overcome the user’s scepticism, which is why phishing attackers invest heavily in visual accuracy and social context.
The goal of most crypto phishing is one of three things: obtaining your seed phrase or private key directly (which gives complete, permanent wallet access), obtaining your exchange account credentials and 2FA codes (which allows account access and withdrawal), or tricking you into approving malicious on-chain transactions (which drains your wallet without needing your credentials at all).
Each goal requires different attack methods. Seed phrase harvesting needs a fake wallet interface that prompts seed phrase entry. Exchange credential theft needs a fake exchange login page. Malicious transaction approval needs a fake DeFi interface or a compromised legitimate interface. Understanding which attack targets which security layer helps identify and resist each type.
Email phishing targets crypto users with emails impersonating exchanges, hardware wallet manufacturers, and crypto services. Common templates:
“Your account has been compromised”: Claims suspicious activity was detected, instructs you to click a link to “secure your account” immediately. The link leads to a fake login page that captures your credentials and 2FA code, or a fake wallet interface that asks you to “verify” by entering your seed phrase.
“Mandatory KYC upgrade”: Claims the exchange is updating its verification requirements and your account will be restricted unless you complete an upgrade. Links to a fake KYC page that collects identity documents and potentially login credentials.
“Hardware wallet firmware update”: Impersonates Ledger, Trezor, or other hardware wallet manufacturers with an urgent firmware update notice. The update link leads to a fake website that either installs malware or prompts seed phrase entry for “wallet migration.”
“Unclaimed airdrop”: Claims you are eligible for a token airdrop and must connect your wallet to claim. The “connection” actually requests broad permissions or direct seed phrase entry.
Countermeasure: Never click links in emails claiming to be from crypto services. Navigate directly to the service by typing the URL or using your bookmark. Check for notifications on the real website through a direct visit.
One of the most dangerous phishing vectors: attackers purchase Google and Bing search ads for crypto-related queries including the names of legitimate exchanges and wallets. When users search for “MetaMask,” “Ledger wallet,” “Binance login,” or similar, the first result may be a paid ad for a phishing site that looks identical to the legitimate one.
The visual similarity is near-perfect: phishing sites clone the design of legitimate sites pixel-accurately. The only giveaway is the URL: the domain will be slightly different (metamask.io vs metamask-app.io, ledger.com vs ledger-live.net, etc.).
Countermeasure: Never click search engine ads for crypto services. Scroll past the ad results to organic results, and verify the URL carefully. Better: use bookmarks for all crypto services and never search for them.
Phishing websites are clones of legitimate exchange interfaces, DeFi protocol frontends, hardware wallet management applications, and wallet interfaces. They are accessed via email links, search ads, social media links, and messages from compromised accounts.
The URL is the only technical giveaway: look for subtle differences including homoglyph attacks (using similar-looking characters from different Unicode sets, where “l” from the Cyrillic alphabet looks identical to the Latin “l”), extra words (binance-login.com vs binance.com), different TLDs (metamask.app vs metamask.io), or additional subdomains (login.coinspot-secure.com vs coinspot.com.au).
Countermeasure: Check the full URL in the address bar before entering any credentials or interacting with a wallet connection request. Use browser bookmarks set from verified sources as your navigation method for all crypto sites. If you notice you have navigated to a phishing site, close the browser tab immediately without interacting.
Crypto communities on Discord and Telegram are heavily targeted. Attack methods include:
Fake support DMs: When you post a question or problem in a public Discord server, fake “support” accounts DM you offering help. These are invariably scammers. Legitimate support from any project comes through official channels only, not unsolicited DMs.
Compromised announcement channels: Attackers compromise Discord servers (including those of legitimate DeFi protocols and NFT projects) and post malicious links as “announcements” from the official team. Always verify announcements through multiple official channels before acting.
Fake project servers: Scammers create Discord servers mimicking legitimate projects, invite people through social media, and run phishing operations inside the fake server.
Countermeasure: Never respond to unsolicited DMs offering crypto help. Disable “Allow DMs from server members” in Discord settings for crypto community servers. Verify any announcement through the project’s official Twitter/X, website, and multiple community sources before acting. Report phishing DMs using the platform’s reporting function.
Attackers send unexpected tokens or NFTs to your wallet address (visible on-chain because your address is public). They then create websites claiming to be the official portal for claiming or interacting with these assets. Visiting the portal and connecting your wallet triggers a transaction request: approving it grants the contract unlimited token spending permissions or directly transfers assets.
“Drainer” smart contracts are designed specifically for this: they request approvals that appear to be for one purpose but are structured to allow the attacker to drain all tokens of specific types from your wallet.
Countermeasure: Never interact with unexpected airdropped tokens or NFTs without thoroughly verifying the project through official, trusted sources. Be specifically suspicious of high-value airdropped assets: the higher the apparent value, the more likely it is an attempt to lure you into an interaction. See airdrop scams for detailed coverage.
Recovery phrase scams specifically target users who are experiencing (or believe they are experiencing) wallet problems. The attacker presents as technical support, asks the user to describe their problem, and then “diagnoses” a problem that requires the user to enter their seed phrase on a provided website to “verify wallet ownership” or “perform a blockchain sync.”
This is the single most direct form of seed phrase theft: the user voluntarily enters their seed phrase because they believe they are fixing a problem. The “fix” immediately drains the wallet using the harvested seed phrase.
The critical rule: no legitimate service, ever, needs your seed phrase. Hardware wallet manufacturers do not need it for support. Software wallet providers do not need it. Exchanges do not use seed phrases at all. Any request for your seed phrase from any source is a scam.
Understanding why phishing works helps resist it. Attackers use well-documented psychological manipulation techniques:
Authority: Impersonating trusted organisations (the ATO, ASIC, major exchanges, hardware wallet manufacturers) to exploit the natural tendency to comply with authoritative figures. Counter: verify identity through official contact details, not contact details provided in the communication.
Urgency and fear: “Your account will be suspended in 24 hours,” “unusual activity detected on your wallet,” “your funds are at risk.” These create emotional states that impair careful decision-making. Counter: deliberately slow down when urgency is created. Legitimate organisations do not typically demand immediate responses to security threats.
Scarcity and opportunity: “Limited time airdrop,” “exclusive early access,” “last chance to claim.” Creates FOMO that overcomes caution. Counter: high-value unexpected opportunities are almost always scams. Apply the principle of FOMO and FUD in crypto: if it creates fear of missing out, slow down and verify more carefully.
Social proof: “10,000 users have already connected their wallets,” “verified by Binance,” “official partner.” Counter: verify any claimed endorsement through the endorsing entity’s own channels, not through the entity claiming endorsement.
Exchange accounts: Enable authenticator app 2FA (not SMS), use a strong unique password, enable withdrawal address whitelisting, enable login alerts, and use a hardware security key if the exchange supports it. For high-value accounts, consider a dedicated email address used only for that exchange. See crypto security best practices for full exchange security guidance.
MetaMask and browser extension wallets: Use a dedicated browser profile for DeFi, minimise extensions, bookmark all DeFi sites, never click links from Telegram/Discord to DeFi sites, read every transaction before approving. The MetaMask security guide covers browser extension wallet phishing protection in detail.
Hardware wallets: The device itself is phishing-resistant: the seed phrase is on physical media, not accessible to phishing sites. The phishing risk for hardware wallet users is being convinced to enter the seed phrase into a computer for any reason. See how hardware wallets work to understand why seed phrase entry should never be required online.
If you suspect you have entered your seed phrase, private key, or exchange credentials into a phishing site, act immediately:
For seed phrase compromise: The wallet associated with that seed phrase is permanently compromised: the attacker has full access and can drain it at any time. Create a new wallet immediately on a clean device, generate a completely new seed phrase, and transfer all funds from the compromised wallet to the new wallet as quickly as possible. The speed matters: you are racing against the attacker draining the wallet.
For exchange credential compromise: Immediately change your password and disable the compromised 2FA method. Contact exchange support through official channels to flag the compromise. Check transaction history for any unauthorised withdrawals and report them. Enable a withdrawal freeze if the exchange offers it.
For malicious transaction approval: If you approved a token approval to a malicious contract, revoke it immediately using a token approval management tool. Check your token balances to see what has already been drained. Move remaining approved tokens to a new wallet address before the attacker sweeps them.
Report the incident to ACCC Scamwatch and your local police for record-keeping, though fund recovery from on-chain theft is generally not possible.
Phishing is the most common cause of individual crypto loss: it bypasses technical security by targeting human psychology. Common attack methods include email impersonation, search engine ads for fake sites, Discord and Telegram fake support DMs, wallet drainer NFT airdrops, and recovery phrase scams. Core countermeasures: bookmark all crypto sites and never follow links, use authenticator app 2FA (not SMS) on all exchange accounts, never enter your seed phrase into any website or device for any reason, read every transaction before approving in MetaMask or any wallet. If you have been phished: act immediately to transfer funds from compromised wallets to new wallets on clean devices and freeze exchange accounts. Report to Scamwatch and police. Apply comprehensive crypto security practices to prevent all phishing attack vectors.
WRITTEN & REVIEWED BY Chris Shepley
UPDATED: MARCH 2026