Top Trends in Crypto Scams in 2025
By Linas Kmieliauskas | July 3, 2025

As global cryptocurrency adoption continues to surge, 2025 has seen an escalation in cybercriminal tactics targeting both new and seasoned investors. Reports from leading crypto security firms SlowMist and Elliptic reveal a sophisticated landscape of scams, highlighting the urgent need for vigilance and robust digital security practices.
Record Levels of Crypto Crime
According to SlowMist’s Q2 MisTrack stolen funds analysis, the firm received 429 stolen funds reports in just three months, assisting in the freezing or recovery of $12 million in digital assets. This surge follows a global trend: Chainalysis reported $8.2 billion in crypto-related fraud in 2024, with 2025 poised to exceed that figure as scammers deploy AI, deepfake technology, and social engineering at unprecedented scales.
Notably, despite regulatory tightening and advancements in on-chain analytics, anonymous and decentralized transactions continue to make tracking and freezing illicit funds a challenge for both authorities and victims.
Top Scam Tactics in 2025
Elliptic’s comprehensive 2025 “State of Crypto Scams” report outlines the 11 most common fraud vectors currently plaguing the ecosystem:
- Address Poisoning: Scammers send zero-value transactions from addresses that closely mimic legitimate contacts, tricking victims into copying and sending funds to a thief.
- Phishing & Ice Phishing: Classic scams via emails, messaging apps, or malicious links that trick users into sharing private keys or signing fraudulent transactions.
- Fake Hardware Wallets: Bad actors deliver compromised wallets—often as giveaways or discounted purchases via unofficial channels—that feature pre-installed malware to siphon user funds.
- Malicious Browser Extensions: Extensions posing as useful crypto tools steal wallet credentials and drain assets once installed.
- ATM & QR Code Swapping Scams: Criminals physically or digitally alter ATMs or QR codes to redirect crypto funds to their own wallets.
- Deepfake Authorization Scams: Scammers use AI-generated video or audio to impersonate trusted parties and trick victims during video identification or KYC processes.
- Pig Butchering: Elaborate, months-long romance or investment scams where victims are groomed before large-scale theft occurs.
- Giveaway & Investment Incentive Scams: Impostor platforms and social profiles promise outsized returns, often mimicking celebrities or influencers to lure funds.
- Ponzi & Rug Pulls: Fraudulent projects or “memecoin” launches that pull investor liquidity and vanish overnight.
- Sextortion & Blackmail: Scams leveraging stolen personal data or fabricated content to extort cryptocurrency payments.
- Recovery Scams: Criminals target previous scam victims with offers to recover lost assets—for a fee—which simply results in further loss.

Cutting-Edge Attack Vectors
Some of the most alarming new threats include “deepfake authorization” attacks. With AI-powered facial and voice synthesis tools now widely available, scammers can convincingly impersonate bank representatives, exchange personnel, or even friends and family over video calls. Reports of such social engineering attacks have tripled since late 2024, particularly targeting high-net-worth individuals and business accounts using video-based KYC.
Similarly, “address poisoning” has surged, especially on networks like Ethereum and Solana, where transaction addresses can appear similar. Big exchanges, including Binance and Coinbase, now caution users to confirm all wallet addresses manually—particularly for large or recurring transactions.
Hardware: From Safe to Snafu
While hardware wallets like Ledger and Trezor remain the gold standard for self-custody, fakes and tampered devices proliferate online marketplaces. The 2025 SlowMist report notes that users duped by counterfeit devices lost an average of $77,000 per incident, underscoring the need to purchase only from authorized retailers, scrutinize packaging for tampering, and set up hardware wallets using the official software.
Additionally, “airdrop”-style giveaway scams frequently advertise free hardware wallets that serve as trojan horses for malware—another trend on the rise through social media platforms and unofficial Telegram groups.
Social Engineering & Impersonation
Traditional phishing campaigns have evolved. In 2025, attacks increasingly leverage compromised social media, WeChat, and messaging apps, often using hacked accounts to impersonate real contacts. Cybersecurity authorities in both the US and EU estimate that over 38% of crypto scam victims first engage with scammers via a social platform, cementing the importance of multi-factor authentication and skeptical engagement with any unsolicited investment pitches.
Impersonation goes beyond individuals; scammers also create fake support pages and customer service lines for major platforms—sometimes achieving high search engine rankings that trap unwary users.
Staying Safe: New Best Practices
- Verify all transactions and addresses: Always double-check every address, especially when copying and pasting from messaging platforms or emails. Hide zero-value transactions to avoid confusion caused by address poisoning.
- Be wary of browser extensions: Only install tools from trusted sources or official vendor sites. Avoid anything recommended by strangers or unofficial communities.
- Guard personal information: Never share seed phrases or private keys. Treat every authorization request as unlocking a vault—be certain of the party on the other side.
- Implement identity safeguards: For video calls, watch for unnatural blinking, lip sync issues, or an unwillingness to show side profiles. Use safe words or multiple forms of verification before proceeding with sensitive actions.
- Stay skeptical: Question investments that promise guaranteed returns, time-limited offers, or use trending buzzwords without verifiable details.
- Source hardware wisely: Only purchase hardware wallets directly from official manufacturers or distributors—avoid third-party marketplaces.
Both SlowMist and Elliptic further urge users to maintain up-to-date anti-virus and anti-malware solutions and to leverage the latest advancements in multi-signature wallets and transaction alerts for added security.
The Road Ahead: Regulation and Resilience
As regulatory frameworks evolve in the EU, UK, US, and APAC, exchanges and wallet providers are ramping up security measures; however, the burden remains on individuals to scrutinize every digital interaction. Emerging technologies such as AI-driven scam detection, on-chain analytics, and biometric verification are critical allies in combating threats, but education and skepticism remain the first line of defense.
In summary, the crypto space in 2025 is both more promising and perilous than ever. Staying a step ahead of scammers means combining technology with timeless caution—because in crypto, every transaction is final and every mistake costly.

