Federal investigators report a sharp uptick in cryptocurrency-related fraud, with victims losing billions of dollars last year. The FBI has published guidance outlining the common ploys scammers use and practical checks consumers can apply to spot and avoid schemes (source: https://www.news4jax.com/video/news/morning-show/2026/04/14/cryptocurrency-scams-on-the-rise-no-the-red-flags-to-watch-for/).
What investigators are seeing
- Scale and variety: losses are measured in the billions and span investment scams, fake exchanges/wallets, impersonation and giveaway schemes, romance fraud tied to crypto, rug pulls in token launches, and phishing campaigns that harvest keys.
- Speed and social vectors: scammers increasingly use social media, messaging apps, and fake endorsements to create urgency and credibility.
- Technical traps: malicious smart contracts, honeypot tokens that prevent selling, and counterfeit wallet apps that capture seed phrases are common.
Common red flags
- Guaranteed or unusually high returns with little risk.
- High-pressure tactics: “act now,” limited-time offers, or partner-only sales.
- Anonymous or unverifiable teams, no audit, or dodgy audit results.
- Locked liquidity claimed but no proof on-chain (or self-reported locks from unknown services).
- Contracts with hidden transfer functions, or renounced ownership announced without transparency.
- Requests for seed phrases, private keys, or to move funds to unknown wallets for “verification.”
- Fake endorsements, cloned social accounts, or messages from accounts with recent creation dates promoting investments.
- Complex tokenomics that reward only early participants or rely on predictable short selling windows without explaining countermeasures.
Practical checks before you move money
- Verify identities and claims off-platform: cross-check team members, corporate records, and credible third-party coverage.
- Inspect the smart contract on-chain: confirm source verification, read key functions (mint/burn, transfer restrictions), and look for common honeypot patterns.
- Confirm liquidity: check on-chain liquidity pools, who controls the LP tokens, and whether locks are verifiable on-chain.
- Require independent audits: treat unaudited projects or unclear audit reports as high risk.
- Use small test transactions first and monitor behavior (e.g., ability to sell).
- Never share seed phrases or private keys; use hardware wallets for custody where possible.
- Favor reputable platforms and custodians for large amounts; verify domain names and app signatures before installing wallets.
- Maintain operational security on social media: verified accounts can be cloned, so double-check sources for announcements.
Why this matters now Widespread losses erode consumer confidence in digital finance and create systemic reputational risk for legitimate projects and institutions. Scammers exploit both technical gaps and human psychology — understanding the patterns is the first defense.
If you believe you’ve been targeted or scammed, collect transaction records and contact your local FBI field office or report the incident to the Internet Crime Complaint Center (IC3).