Fake applicationsCounterfeit versions of wallets like
Ledger Live or
Ledger’s official warning. Once installed, such apps ask for the seed phrase or steal data directly.
Communities and influencersFake Telegram channels, Discord groups, YouTube streams, and Twitter accounts impersonating brands or thought leaders. They promote “exclusive offers” and “giveaways.” One notorious example:
Group-IB reported $1.6M stolen in just three days. This was also confirmed by
BankInfoSecurity.
2. Theft MechanicsData theft — the victim enters a seed phrase, private key, or password into a fake form or application.
Signature phishing — the victim is persuaded to sign a transaction “to confirm security” or “to join an airdrop.” In reality, the signature gives the attacker technical permission to drain tokens.
Real Phishing Cases$3.13M lost with one clickA user connected a wallet to a phishing site, signed a transaction — and lost $3.13M in WBTC.
More details — our Telegram breakdown.
When the hacker becomes a victimIn February 2025, a hacker stole 2,930 ETH ($5.4M) from zkLend and tried to launder it through Tornado Cash. But he ended up on a
phishing clone of Tornado Cash, active for over five years. Other fraudsters took his funds.
More details — our post.
Fake apps in the App StoreIn 2025, a counterfeit Ledger Live app for Mac appeared in the App Store. Users installed it, entered seed phrases, and lost funds.
YouTube streams with Musk and ButerinIn 2022, a series of fake live streams using images of Elon Musk and Vitalik Buterin brought scammers over $1.6M in just three days.
Phishing by the NumbersAccording to
ScamSniffer, in the first half of 2025 there were 43,628 victims who collectively lost $39.33M (average loss ~$902). Compared to H1 2024, phishing activity decreased significantly.
How to Recognize Phishing- The website URL differs by just one character.
- “Customer support” messages you first.
- The message promises doubled deposits, free tokens, or “too good to be true” offers.
- They ask for a seed phrase or private key — that’s 100% fraud.
How to Protect Yourself- Always check the site address and only install apps from official sources.
- Never enter seed phrases, private keys, or passwords on third-party sites.
- Use 2FA through authenticator apps or hardware keys, not SMS.
- Avoid clicking links in emails, ads, or random messages.
- Bookmark the official sites of the services and exchanges you use.
- For asset management, use a separate browser or even a dedicated device.