Lừa đảo tiền mã hóa & Web3
Scams exploiting blockchain technology, DeFi, NFTs, and cryptocurrency markets
Overview
This complete guide covers every variant of Lừa đảo tiền mã hóa & Web3 that ScamLens analysts have catalogued. Each entry below links to a detailed breakdown of tactics, identification signs, and step-by-step protection. Use the cross-reference to choose the most relevant scenario, or report a suspicious site directly through the verification box.
Risk Level Distribution
All Scam Types in This Category
Cross-Chain Bridge Exploits: Web3's Critical Threat
CriticalHackers exploit cryptocurrency bridge vulnerabilities to steal millions by manipulating token transfers between blockchains.
Crypto Romance Scams: Love, Lies & Lost Crypto
CriticalScammers pose as romantic interests to build trust, then pressure victims into cryptocurrency investments that vanish forever.
Fake Crypto Exchange Scams: How to Protect Your Assets
CriticalScammers impersonate legitimate cryptocurrency exchanges to steal deposits and private keys. Learn how to spot and avoid these sophisticated platforms.
Fake ICO/IDO Scams: How to Spot Crypto Investment Fraud
CriticalFraudsters create fake Initial Coin Offerings to steal millions from crypto investors through elaborate schemes that disappear after funding.
Fake Crypto Wallet Apps: Spotting Counterfeit Digital Wallets
CriticalScammers create identical-looking wallet apps to steal your cryptocurrency. Learn to identify and protect your digital assets from this critical threat.
Flash Loan Exploits: How DeFi Attacks Drain Millions
CriticalFlash loans enable attackers to borrow massive crypto amounts instantly with no collateral, then exploit price vulnerabilities to steal millions in seconds.
Honeypot Token Scams: How Scammers Lock Your Crypto
CriticalHoneypot tokens appear to be legitimate cryptocurrency investments but contain hidden code that prevents you from selling or withdraws your funds when you try to exit.
Rug Pull Scams: How Crypto Exit Fraud Works
CriticalRug pulls are cryptocurrency scams where developers abandon projects and steal investor funds, often within days of launch.
Seed Phrase Phishing: Crypto Wallet Security Guide
CriticalScammers trick cryptocurrency users into revealing their seed phrases, gaining complete control of digital wallets and stealing all assets.
Token Approval Exploit: How Scammers Drain Web3 Wallets
CriticalAttackers trick users into approving unlimited token transfers, then silently drain wallets without additional signatures.
Address Poisoning: The Crypto Wallet Scam
High RiskScammers flood your wallet with fake tokens to trick you into sending cryptocurrency to fraudulent addresses hidden in transaction histories.
Cloud Mining Scams: How Crypto Investment Fraud Works
High RiskCloud mining scams promise easy cryptocurrency profits through fake mining services, but steal your money instead.
Dusting Attacks: Unmasking Your Crypto Wallet
MediumScammers send tiny amounts of cryptocurrency to your wallet to trace your identity and steal funds or personal data.
Fake Airdrop Scams: How Criminals Steal Crypto
High RiskScammers pose as legitimate crypto projects offering free tokens to trick users into revealing private keys or sending funds.
Fake Crypto Mining Platforms: How to Spot & Avoid Them
High RiskScammers pose as legitimate cryptocurrency mining operations to steal deposits and personal data from unsuspecting investors.
MEV Sandwich Attacks: Crypto Trading Fraud Explained
High RiskScammers exploit blockchain transaction ordering to steal from traders by inserting their own transactions before and after victims' trades.
NFT Scams: How to Protect Your Digital Assets
High RiskNFT scams cost victims an average of $5,000 through fake marketplaces, rugpulls, and wallet drains. Learn how to identify and avoid them.
Crypto Staking Scams: How High-Yield Promises Turn to Losses
High RiskFraudsters lure crypto investors with guaranteed 50-200% annual returns on staking, then vanish with funds after 1-3 months.
Universal Protection Steps
- 1 Verify the domain or wallet address through ScamLens before paying or signing in.
- 2 Confirm the company's legal entity using government registries (SEC, Companies House, NAFMII, etc.).
- 3 Never share OTPs, seed phrases, or remote-access codes — no legitimate party will ask for them.
- 4 Slow down: every legitimate process tolerates a 24-hour cooling-off period.
- 5 If money has already moved, contact your bank, exchange, and local cybercrime unit within the first 6 hours.
Where to Report — Việt Nam
Cục An toàn thông tin (Bộ TT&TT)
Cổng tiếp nhận phản ánh tin nhắn rác, cuộc gọi rác và lừa đảo trực tuyến.
Bộ Công an - Cảnh báo lừa đảo
Trang cảnh báo và tiếp nhận tố giác lừa đảo của Bộ Công an.
Cục Cạnh tranh và Bảo vệ người tiêu dùng
Tổng đài bảo vệ người tiêu dùng — miễn phí cuộc gọi.
Ngân hàng Nhà nước Việt Nam
Báo cáo các trường hợp lừa đảo tài chính, ngân hàng, đầu tư bất hợp pháp.
Verify a website or wallet
Related Categories
Lừa đảo giả mạo & đánh cắp thông tin
18 scam types covered
Lừa đảo đầu tư & tài chính
20 scam types covered
Lừa đảo tình cảm & kỹ thuật xã hội
14 scam types covered
Lừa đảo mua sắm & thương mại điện tử
15 scam types covered
Lừa đảo việc làm & kinh doanh
14 scam types covered
Giả mạo cơ quan chính phủ
12 scam types covered