top of page

Community Intelligence

To combat cybercrime effectively, a community effort is essential. Your role is crucial in this shared responsibility; we encourage you to report any instances of cryptocurrency scams or hacking incidents that may come to your attention. Through open communication and a united front, we can work together to create a safer and more secure crypto space for everyone.

Crypto Scam Tracking

Crypto Scam Tracker 

The information in this tracker is based on input provided by individuals on various platforms. It's important to note that Token Trace has not independently verified the reported scams. To keep the community informed and safeguarded, Token Trace will update this list with the recent trending scams.   

Scam Type Glossary

Scam Type Glossary

Phishing - Is a fraudulent attempt to obtain sensitive information, such as private keys/12 word phrases or login credentials, from individuals involved in cryptocurrency transactions. Typically, scammers use deceptive tactics, such as fake websites or emails, to trick users into disclosing their confidential information, which is then exploited to gain unauthorized access to their cryptocurrency holdings.

​

Investment - Involves enticing individuals to invest in fraudulent or nonexistent cryptocurrency ventures by making false promises of significant returns. These scams typically employ deceptive marketing strategies, such as fake endorsements or misleading information about the investment opportunities. Once victims invest their funds, the scammers disappear or fabricate obstacles, ultimately causing investors to suffer financial losses with little to no chance of recovering their money.

​

Online Work -  Fraudulent schemes that offer individuals opportunities to earn cryptocurrency through remote work or online tasks. Scammers often deceive victims by promising lucrative earnings, but in reality, the victims either receive little to no compensation for their work or end up being directed to fake platforms designed to steal their personal information or funds.

​

ICO -  Uses deceitful practices where organizers launch a fraudulent Initial Coin Offering, enticing investors with false promises of high returns on a non-existent or poorly executed cryptocurrency project. These scams often result in financial losses for investors who contribute funds to the fake ICO.

​

Impersonation -  When malicious actors impersonate legitimate entities, such as exchanges, projects, or influencers, in the cryptocurrency space. These scammers use deceptive tactics, such as creating fake websites or social media profiles, to trick individuals into providing sensitive information or sending funds, leading to financial harm or loss of funds.

​

Recovery -  Involves fraudsters posing as individuals or organizations that claim to help victims recover funds lost in previous cryptocurrency scams or transactions. These scammers typically request upfront fees or personal information, exploiting the victims' desperation and ultimately leaving them with further financial losses and no actual recovery assistance.  

​

Giveaway -  Are schemes where scammers falsely claim to organize giveaways of cryptocurrencies or tokens, often impersonating well-known figures or projects in the crypto space. Victims are lured into sending a certain amount of cryptocurrency to participate, only to realize that there is no actual giveaway, resulting in financial losses for those who fall for the scam.

​

Blackmail -  Perpetrators typically exploit individuals by threatening to reveal sensitive or embarrassing information about them unless a ransom is paid in cryptocurrency. The scammer may claim to have compromising data, such as personal photos or private messages, and demand payment in a specific cryptocurrency to prevent the release of the information. Victims are often coerced into transferring funds to the scammer's wallet, with the promise that once payment is received, the incriminating material will be deleted or kept confidential.

bottom of page