A crypto investor lost $3 million in a phishing attack, a serious incident that once again highlighted the high risks of working with digital assets. The loss occurred because the user signed a malicious transaction without carefully checking the contract address before confirming the transaction on the blockchain. Analytics platform Lookonchain reported that the attacker lost $3.05 million in USDT due to one wrong click that completely emptied his wallet. Experts reminded that you should never sign transactions that you do not fully understand. block-chain24
Phishing attacks in the cryptosphere are social engineering schemes – attackers trick users to gain access to private keys and other sensitive data. In most cases, victims check only the first and last characters of the address, skipping the differences in the middle part, which can be hidden by interfaces for ease of display, which leads to loss of funds. kaspersky+2
Apart from the mentioned case, just a week ago another investor lost $900,000 in a complex phishing attack where the malicious transaction was signed almost 1.25 years ago but was only activated now. However, these cases are smaller in scale compared to the incident in May 2024 where wallet poisoning resulted in the loss of $71 million. In this major fraud case, the attacker later returned all the funds under pressure from international blockchain experts, demonstrating the unconventional outcome of this type of crime. block-chain24
According to CertiK, phishing has become the main security threat in the crypto industry in 2024. During the year, 296 attacks of this kind were recorded, which resulted in losses of more than $ 1 billion. Three of them exceeded $ 100 million in damage. A representative of CertiK emphasized that the actual losses may be higher, taking into account unreported cases of fraud. These statistics clearly indicate that phishing remains the most expensive attack vector in the crypto space. tadviser+1

To combat this growing problem, Binance’s security team has developed a special algorithm that has already identified around 15 million “poisoned” addresses — a term for fraudulent or compromised wallets and contracts designed to steal funds. The decision is a response to the growing wave of fraudulent schemes in the crypto space and is aimed at improving the protection of users and investors. block-chain24
Phishing techniques are constantly evolving: attackers create fake websites and forms that are extremely similar to legitimate ones, use fake domains with minor character changes that are difficult to notice with the naked eye, and also use social engineering methods to force victims to sign malicious transactions or reveal private keys. In the crypto environment, one of the common techniques is the use of fake websites under the guise of official services for checking so-called “airdrops” – rewards from projects. After connecting to such a crypto wallet site, funds are instantly withdrawn to the attackers’ address, and it is almost impossible to return them. ssldragon+2
Thus, the events described demonstrate the seriousness of the threats facing cryptocurrency investors and users. Despite the technological advantages of blockchain, the human factor — inattention or lack of awareness — remains a key link that attackers actively exploit. Modern security measures, including analytical platforms, fraud detection algorithms and international cooperation of experts, are important, but basic rules of caution: checking addresses, understanding the transactions being signed and distrust of suspicious links remain indispensable elements of protecting digital assets. kaspersky+2
How to avoid signing malicious transactions and verify the contract address
To avoid signing malicious transactions and to properly verify the contract address, it is necessary to follow the following important rules and use the available tools:
- Double check the contract address before signing a transaction. Be sure to check the full address, not just the first and last characters, as attackers often use similar characters in the middle to fool visual verification. gate
- Use official and verified sources to obtain smart contract addresses – these can be project websites, large exchangers, analytical platforms or services with contract auditing. timeweb+1
- Analyze the smart contract using specialized online services , such as Token Sniffer. Such services automatically check the contract code for malicious functions, evaluate the security of the token, and display transaction statistics to exclude scams timeweb
- Use browser companion extensions to verify transactions. They help you understand what exactly is being requested for signature and warn you about suspicious transactions in your wallets. kaspersky
- Activate and update reliable antivirus software on all devices used to work with cryptocurrencies to prevent malware infection. gate
- When working with transactions in wallets, carefully read all the data in the signature request , including the amount, recipient address, purpose and parameters of the transaction. Do not sign transactions that you doubt or do not understand. binance
- Use wallet security features such as risk warnings when signing and the ability to whitelist frequently used addresses to reduce the risk of accidentally transferring funds to fraudulent addresses. gate
- Never follow suspicious links or interact with unknown tokens or airdrops unless you are sure of their authenticity. If an unexpected token arrives in your wallet, it is best to ignore any attempts to interact with it. kaspersky+1
- If necessary, you can check the contract address and chain ID to make sure the transaction is happening on the correct blockchain network, as a mismatch may indicate a fraudulent transaction. gate

Following these recommendations and using specialized tools significantly reduces the likelihood of signing malicious transactions and losing funds in the crypto space.
Why Phishing Attacks Have Become the Crypto Industry’s Top Threat in 2024
Phishing attacks have become the main threat in the crypto industry in 2024 for several key reasons related to the peculiarities of the cryptosphere itself and the methods of attackers. Firstly, with the growth of technical protection of the cryptocurrency ecosystem, attackers have increasingly switched to exploiting the human factor through social engineering – that is, deceiving and manipulating users to gain access to private keys and funds. Secondly, modern phishing schemes have become very complex and sophisticated: attackers create fake websites imitating legitimate services, use fake domains with minor character changes and highly targeted messages, which makes it difficult for even experienced users to recognize the fraud.
In addition, the rise in popularity of cryptocurrencies has increased the number of potential victims, making phishing a very profitable direction for cybercriminals. In 2024 alone, 296 phishing incidents were recorded with total losses exceeding $1 billion, which is almost half of all funds stolen in the crypto sphere. The average damage from one incident in this category significantly exceeds the losses from other types of attacks.
It is also noted that phishing attacks easily bypass technical security measures, as they target a vulnerability – human psychology, which makes protection much more difficult. The methods used use applied social techniques and technical tricks to deceive even vigilant users.
Thus, phishing has become the main and most expensive attack vector in the crypto industry in 2024, combining a high level of threat, technical sophistication and exploiting the main vulnerable element – the human factor. okx+3
Why Human Factor Has Become the Main Vulnerability of 2024
The human factor has become the main vulnerability in 2024 because despite significant advances in technical protection and cybersecurity, the main weak link remains the human being – the employee or user. Human errors – accidental or deliberate – cause the majority of data breaches and cyber incidents, which often occur due to mishandling of confidential information, clicking on phishing links, using weak passwords and other behavioral errors. gendalf+2
Key reasons why the human factor is so significant:
- Modern security technologies can be completely neutralized by one wrong click or user error, so technologies protect data only when people follow security rules. incrussia+1
- Attackers actively use social engineering and psychological deception techniques – phishing, fake websites, emails, fake documents, deepfake calls – to gain the victim’s trust and force them to disclose critical data or sign malicious transactions. This is more difficult than technical hacks, but very effective, since it targets the main weak link – a person. it-world+2
- Many users and employees lack sufficient awareness and training in cybersecurity rules, which leads to common mistakes: storing passwords incorrectly, sending sensitive information to the wrong recipient, ignoring warnings. newsletter.radensa+1
- Statistics for 2024 show that about 68-70% of all cyber incidents and leaks are related to human factors, and the number of incidents is not decreasing, and the improvement of hacking and attack technologies only increases the burden on people who must recognize these attacks. securitymedia+2
Thus, in 2024, the human factor has become the main vulnerability, because it is the errors and manipulations of users that bypass technical protection methods and become the main entry point for cyberattacks. This highlights the importance of a comprehensive approach to user training and awareness, as well as the development of adaptive defense mechanisms that take into account the human factor. newsletter.radensa+1

Why Employee Errors Remain a Key Vulnerability for Cyberattacks
Employee errors remain the key vulnerable stage of cyber attacks, because it is the human factor that often bypasses technical protection measures and is the main entry point for criminals. The main reasons for this are:
- Human inattention and lack of awareness. Most incidents occur due to accidental employee errors – clicking on a phishing link, opening a malicious attachment, following a fraudster’s instructions without checking. According to statistics, over 80% of data leaks are related to human errors, and more than a third of successful attacks begin with the compromise of employee accounts. infars+1
- Use of social engineering by attackers. Hackers actively use methods of deception, forging letters, calls and websites to gain trust and force the victim to give access or sign malicious transactions. Protection from such attacks requires not only technical measures, but also a high level of attentiveness and knowledge of employees. infars
- Lack of systematic and regular training. One-off trainings do not provide sustainable skills – employees quickly forget the information. The lack of regular cyber exercises and personalized scenarios reduces the ability of employees to recognize and correctly respond to threats. infars
- Errors in access control and settings. Incorrect system configuration, excessive rights and weak controls are also associated with human errors, which makes it easier for attackers to penetrate and spread throughout the infrastructure. it-world+1
- Failure to respond to incidents at early stages. Often, employees do not know how and where to report suspicious activity, which allows attacks to develop further and cause serious damage. cisoclub+1
In general, the human factor is a weak link through which attackers gain access to corporate data and systems, despite the presence of technical means of protection. Improving cyber literacy, regular simulations of attacks and building a security culture in the organization significantly reduce the risks of successful attacks and employee errors. it-world+1
Let’s look at a selection of fresh and relevant articles on phishing attacks and fraud in the crypto industry in 2024–2025, revealing the scale of threats, attack methods, and protection tools:
- “Crypto Investor Loses $3M in Phishing Attack” – Details the incident of major losses due to signing a malicious transaction, the scale of phishing attacks in 2024, and Binance’s countermeasures. block-chain24+1
- “Cryptocurrency Scams: How to Avoid Becoming a Victim in 2024” – An overview of current scams, including fake websites and social engineering, with security tips cryptodesk
- “Crypto-Phishing Attacks Are Growing: Over $300 Million Stolen in Hacks in 2024” – An analysis of the growth of phishing attacks by number of victims and amounts, as well as a description of common methods of deception. binance
- “Biggest Crypto Scams of 2024” – A look at the biggest scams, including those that lost hundreds of millions of dollars due to social engineering and phishing. binance
- “Phishing Attacks Dominate Cryptocurrency Security Threats in 2024” — a report with a detailed analysis of the reasons for the rise of phishing and the characteristics of its methods. okx
- “Hackers and scammers stole more than $3 billion in cryptocurrencies in 2024” — an analytical report on the scale of thefts in the crypto industry, the share of fraud and the main trends. rbc
- “Hacken: Crypto Industry Losses Exceed $3 Billion in H1 2025” – Data on Continued Growth of Losses, Role of Phishing, and Access Control Vulnerabilities in Crypto Business. binance
These materials provide deep insight into the current state of phishing and fraud in the crypto space, reveal the mechanisms of attacks, and highlight the importance of comprehensive protection for users and investors. If you want, I can help with links to specific articles.
How cryptocurrency scams differ in 2024 from previous years
Cryptocurrency scams in 2024 are more sophisticated than in previous years, with new deception technologies and more complex social engineering. The main differences are:
- The use of phishing and social engineering is on the rise , with scammers creating fake websites, apps, and emails that mimic well-known crypto platforms to steal logins, passwords, and private keys. The threats have also become more sophisticated, with fake domains with minor changes, complex deception scenarios, and phishing via Zoom video conferences with malware installed. cryptodesk+1
- The emergence of new types of fraud, such as honeypot token scams – tokens with software protection against sale that artificially increase the price to attract investors, but do not allow withdrawal of funds, which is especially popular in 2024. vc
- The active use of deepfakes to advertise fraudulent crypto projects that create the impression of legitimacy and trust in potential victims. This technology is becoming increasingly accessible and widespread among criminals. f6
- A combination of several social engineering tactics — for example, fraudsters call on behalf of mobile operators, block victims’ accounts, create fake technical support numbers and convince them to transfer money into cryptocurrency for their “safety.” This scheme has emerged and developed in recent years, making the deception even more complex. tadviser
- Shift in focus of attacks from decentralized services (DeFi) to centralized platforms – in 2024, hacks of centralized crypto exchanges and services increased significantly, with damages amounting to hundreds of millions of dollars, and compromising private keys remained the main method of theft. tadviser
- Increase in the volume of stolen funds due to the growth in the number and quality of attacks – in 2024, the theft amounts reached record levels (more than $3 billion), which is 15-21% more than in previous years. rbc+1
Thus, crypto fraud in 2024 is characterized by high technical complexity of attacks, deep use of human factors and new deception technologies (deepfakes, complex social scenarios), as well as a shift towards attacks on large centralized platforms. It is important for users to be especially careful, use multi-factor authentication and check addresses and sources before making transactions. cryptodesk+4
In 2024-2025, crypto fraud is set to reach record levels, with high losses, more attacks, and more sophisticated methods used by criminals. Below is a comprehensive and reliable article covering the key facts and details on the topic:
Cryptocurrency Scams in 2024–2025: Massive Losses, New Schemes, and Increased Countermeasures
Over the past two years, the crypto industry has faced an unprecedented growth in fraudulent schemes, significantly increasing the financial damage to investors and users. According to various analytical sources and law enforcement agencies, in 2024 alone, total losses from cryptocurrency thefts and frauds exceeded $3 billion globally. The most vulnerable area remains phishing attacks, which have become the main and most expensive vector of crimes in the crypto space. tadviser
Key facts and statistics
- In 2024, American users lost about $9.3 billion as a result of theft and fraud with cryptocurrency, which is 66% more than in 2023. The focus is increasingly on people over 60 years old, who suffered losses of over $2.8 billion. tadviser
- Globally, in 2024, the combined cost of hacks and fraud was approximately $3.01 billion, of which $2.15 billion was due to hacker attacks and $834.5 million was due directly to fraud, including phishing and social engineering. tadviser
- According to Chainalysis, there were 303 major cyber incidents in 2024, exceeding the statistics of previous years. The hacks of centralized crypto exchanges — such as DMM Bitcoin with losses of over $300 million and WazirX with damages of $235 million — became a sign of a shift in attacks from DeFi services to larger centralized platforms. tadviser
- Separately, losses from crypto scams reached a record $2.1 billion in the first half of 2025 , surpassing the record figures of 2022. At the same time, the number of new schemes and the complexity of attacks continue to grow rapidly, with the use of advanced technologies – deepfakes, cloned votes, malicious smart contracts and “fraud as a service”. yellow
Types of Fraudulent Schemes in the Crypto Space
- Phishing attacks remain the most common technique, in which attackers create copies of legitimate websites, fake applications, and use fake domains with minimal character changes to trick users into revealing private keys or signing malicious transactions.
- Sophisticated social engineering , including calls and messages from supposedly legitimate support services, fake mobile operators, and financial advisors. These methods instill trust and make victims voluntarily hand over access to crypto wallets or transfer funds to fraudulent addresses.
- Ransomware uses phishing and vulnerabilities to infect users’ devices, encrypting files and demanding ransom in cryptocurrency. Such attacks caused more than $1.1 billion in losses in 2024.
- Crypto pyramids and scam projects with promises of high profits, often supported by deepfake videos and voice clones to create the illusion of trust.
Countermeasures and initiatives in the industry
In response to growing threats, leading crypto companies and security platforms are developing more effective technologies and security algorithms. For example:
- Binance has implemented an algorithm to identify approximately 15 million “poisoned” addresses – fraudulent and compromised wallets – which has significantly improved monitoring and theft prevention [from the previous conversation].
- Blockchain analytics companies like PeckShield and CertiK are stepping up their monitoring of anomalous transactions and phishing schemes, sharing reports with the industry and law enforcement [from previous conversation].
- US law enforcement agencies (FBI) and international organizations regularly publish warnings and statistics, strengthening the fight against crypto scams and educating users about the risks.
Summary and recommendations for users
2024–2025 have shown that the human factor remains the key vulnerability in the field of cryptosecurity : inattention, lack of knowledge, and excessive trust in suspicious sources. To reduce risks, experts recommend:
- Always check contract addresses and reference sources carefully.
- Do not sign transactions whose meaning is unclear or raises doubts.
- Use multi-factor authentication and secure hardware wallets.
- Regularly update your software and use antivirus solutions.
- Train yourself and your employees in the basics of cybersecurity and how to recognize phishing schemes.
Thus, despite technological progress in protecting crypto assets, fraudsters are constantly improving their methods, expanding the arsenal of social engineering and technical techniques. Only joint efforts of the industry, users and law enforcement agencies can reduce the scale of losses and increase the security of digital finances in a rapidly changing world.
What new scams have emerged in the crypto industry in 2024
In 2024, the crypto industry saw the emergence of several new and improved scams that are highly technical and heavily rely on social engineering. Key new scams include:
- Fake crypto exchanges and scam tokens. Fake exchanges with full functionality – deposits, withdrawals, trading and referrals – are created, simulating real work in order to mislead users and steal their money. The classic scam token scheme is adapted and remains widespread. f6
- Deepfakes used to promote scams. Scammers use deepfake technology to create fake videos and audio to make their startups and schemes appear legitimate and trustworthy to victims. f6
- Phishing attacks using fake websites, apps, and messages. Fraudsters create clones of popular crypto platforms and send malicious links that they use to gain access to users’ private keys, logins, and seed phrases. The deception is often based on minor changes in website addresses, and users often don’t notice the fakes. cryptodesk+1
- Fake airdrops: Promising free tokens with the requirement to reveal private keys or seed phrases is one of the common tricks. cryptodesk
- Drainers are malware designed to steal funds. This specialized software for automatically draining funds from victims’ wallets caused damage to hundreds of thousands of users in the amount of about $295 million in 2023-2024. f6
- Fake hardware and software crypto wallets. Selling or distributing fake hardware wallets and apps that steal user data, including seed phrases and private keys. They are distributed with fake updates or via phishing sites. fintech-retail
- Attacks via fake video conferences (Zoom): Fraudsters invite victims to fake online conferences, after which malware is installed to steal data and access crypto wallets. rbc
- Crypto Dating Romance Scams: Using Fake Crypto Dating Profiles to Gain Trust and Extort Money or Access to Digital Assets cisoclub
Overall, 2024 scams are characterized by a combination of high-tech techniques (deepfakes, malware, fake devices) and complex social engineering (fake exchanges, video conferences, “gifts”, etc.), making them especially dangerous for cryptocurrency users.
What methods do scammers use to steal from fake crypto exchanges?
Fraudsters, creating fake crypto exchanges, use a number of methods to steal users’ funds. The main techniques include:
- Creating fake websites that imitate popular exchanges. These websites often copy the design of real platforms (e.g. Binance, Coinbase) to create an illusion of trust and security in the victim. Often, fake exchanges promise very favorable conditions – no commissions, high profitability and ease of use to attract more victims. coinkyt
- Promise of high yield and quick profits. Fraudsters advertise fabulous profits when investing cryptocurrency, provoking users to make ill-considered investments and create accounts on a fake platform, after which the funds are withdrawn by the fraudsters. fpa+1
- Use of social engineering. Fraudsters may use influencer ads, fake forums, and Telegram channels to instill trust, as well as offer “successful strategies” for making money using a fake exchange. fpa+1
- Imitation of real trades and balance. Inside the platform, fraudulent trades are manually faked so that the user sees a supposedly growing balance and successful trades, which keeps him on the site and pushes him to new investments. In fact, the cryptocurrency has already been transferred to the scammers’ wallets. coinkyt
- Withdrawal delays and blocking. When the victim tries to withdraw funds, the scammers report that the assets are “frozen” or “blocked,” and offer to pay fees or make additional deposits to unblock them. This is a classic extortion scheme to get even more money. coinkyt
- Phishing links and fake apps. Fraudsters send malicious links via email and messengers, pushing users to register on fake exchanges or download malicious apps that steal account data and private keys. cryptomus+1
- Use of deepfakes and fake recommendations. To create trust, fraudsters can fake videos and statements of famous people confirming the “reliability” of the platform. kaspersky+1
Thus, fake crypto exchanges operate according to the typical “invest and lose” scheme, using psychological methods of influence, technical imitation of the work of a real exchange and delays in withdrawal in order to keep the victims’ money as much as possible. The deception is based on a combination of external similarity to real services, promises of high profits and manipulation of trust.
Final conclusion on the state and trends of fraud in the crypto industry in 2024-2025
2024 and early 2025 have become significant stages in the development and evolution of fraudulent schemes in the cryptocurrency industry. Despite numerous technological innovations and improvements in security measures, problems with crypto fraud have reached an unprecedented level, demonstrating a combination of high technical sophistication of attackers and vulnerability of the human factor.
The core of today’s threats is the aggressive growth of phishing and social engineering. Phishing attacks have become the main and most expensive vector of crime in the crypto space, as evidenced by data on hundreds of successful attacks with damages in the billions of dollars in 2024 alone. Fraudsters use complex fake websites, applications, malicious smart contracts and deceptive methods that are successfully disguised as legitimate services. Many victims lose funds due to carelessness, insufficient understanding of security and hasty trust – which emphasizes the key role of the human factor as the main vulnerability.
Fraud schemes have become more complex and technically sophisticated. New methods have emerged, from the use of deepfakes in advertising and video messages, fake crypto exchanges with simulated trades, to malware for automatic draining of funds and fake hardware wallets. Attackers combine technical methods with social manipulation, from official-style calls and messages to enticing “airdrops” and “gifts”, which dramatically increases the risk for ordinary users and investors.
A significant portion of attacks are directed at centralized platforms and services, reflecting a shift away from DeFi protocols and toward larger exchanges and infrastructure projects. Losses from hacks of centralized crypto exchanges have already reached hundreds of millions of dollars, with sophisticated fraudulent transactions and hidden malware contributing to the growing scale of thefts.
Countermeasures and security technologies are gradually improving, but so far they are only ahead of some of the threats. Industry leaders like Binance and CertiK are implementing advanced algorithms to identify compromised addresses and warn users of risks. International expert groups and law enforcement agencies are stepping up the fight against crypto fraud and publishing educational materials to raise user awareness.
The key lesson to be learned from the current situation is to continually improve cyber literacy and strictly adhere to basic security rules. Users need to be especially careful when checking smart contract addresses, not signing unfamiliar transactions, using multi-factor authentication and hardware wallets, and avoiding suspicious links and sites. Technical tools and algorithms are no substitute for attentiveness and common sense — it is the combination of technology and awareness that will help minimize risks.
Thus, the scale, complexity, and financial impact of crypto fraud in 2024–2025 demonstrate the critical importance of a comprehensive approach to security that includes technological measures, educational initiatives, and interagency cooperation. Only by combining the efforts of the industry, users, and law enforcement can we hope to sustainably reduce damage and increase trust in digital assets in the future.
- https://cryptomus.com/ru/blog/most-popular-cryptocurrency-scams—guide-on-how-to-avoid-them
- https://fpa.ru/info/moshennicheskie-shemy-s-kriptovaljutoj/
- https://www.kaspersky.ru/resource-center/definitions/cryptocurrency-scams
- https://www.anti-malware.ru/analytics/Technology_Analysis/How-to-protect-digital-assets-from-fraud
- https://coinkyt.com/article/fejkovye-kriptobirzhi-i-obmenniki-kak-ne-stat-zhertvoj-v-2024-godu
- https://www.tadviser.ru/index.php/%D0%A1%D1%82%D0%B0%D1%82%D1%8C%D1%8F:%D0%9C%D0%BE%D1%88%D0%B5%D0%BD%D0%BD%D0%B8%D1%87%D0%B5%D1%81%D1%82%D0%B2%D0%BE_%D1%81_%D0%BA%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D0%B2%D0%B0%D0%BB%D1%8E%D1%82%D0%BE%D0%B9
- https://nyccrimelawyer.com/ru/rasprostranennye-vidy-moshennichestva-s-kriptovaljutami-i-bitkoinami/
- https://www.rbc.ru/crypto/news/60b9f3b99a794781174e3114
- https://t-j.ru/short/criptoscams/
- https://cryptodesk.ru/blog-cryptodesk/stati-pro-mayning/shemy-moshennikov-v-kriptovalyute-kak-ne-stat-zhertvoy-v-2024-godu/
- https://www.f6.ru/blog/cryptoscam-2024/
- https://fpa.ru/info/moshennicheskie-shemy-s-kriptovaljutoj/
- https://fintech-retail.com/2025/03/10/kiberbez-24-25/
- https://www.rbc.ru/crypto/news/677fd4149a794763facf621a
- https://www.tadviser.ru/index.php/%D0%A1%D1%82%D0%B0%D1%82%D1%8C%D1%8F:%D0%9C%D0%BE%D1%88%D0%B5%D0%BD%D0%BD%D0%B8%D1%87%D0%B5%D1%81%D1%82%D0%B2%D0%BE_%D1%81_%D0%BA%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D0%B2%D0%B0%D0%BB%D1%8E%D1%82%D0%BE%D0%B9
- https://plusworld.ru/journal/2025/plus-3-323-2025/kiberugrozy-kriptobiznesa-trendy-2024-2025/
- https://kredita.net/spravochnik/moshennichestvo-s-kriptovalyutoj/
- https://cisoclub.ru/kiberprestupniki-stali-ispolzovat-romanticheskij-vid-moshennichestva-kriptovaljuty/
Sources:
Yellow.com. “Cryptocurrency Fraud Reaches Record Growth in 2025” (2025) yellow
TAdviser. “Cryptocurrency Fraud Statistics and Trends 2024–2025” (2025) tadviser
Fintech-Retail.com. “Crypto Business Cybersecurity 2024–2025” (2025) fintech-retail
- https://yellow.com/ru/research/%D0%BA%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D0%B2%D0%B0%D0%BB%D1%8E%D1%82%D0%BD%D0%BE%D0%B5-%D0%BC%D0%BE%D1%88%D0%B5%D0%BD%D0%BD%D0%B8%D1%87%D0%B5%D1%81%D1%82%D0%B2%D0%BE-%D0%B2-2025-%D0%B3%D0%BE%D0%B4%D1%83-%D0%B4%D0%BE%D1%81%D1%82%D0%B8%D0%B3%D0%B0%D0%B5%D1%82-%D1%80%D0%B5%D0%BA%D0%BE%D1%80%D0%B4%D0%BD%D0%BE-%D0%B2%D1%8B%D1%81%D0%BE%D0%BA%D0%BE%D0%B3%D0%BE-%D1%83%D1%80%D0%BE%D0%B2%D0%BD%D1%8F-%D0%BE%D1%82-%D0%B4%D0%B8%D0%BF%D1%84%D0%B5%D0%B9%D0%BA%D0%BE%D0%B2-%D0%BD%D0%B0-youtube-%D0%B4%D0%BE-%D0%B0%D1%84%D0%B5%D1%80-%D1%81-%C2%AB%D1%80%D0%B0%D0%B7%D0%B4%D0%B5%D0%BB%D0%BA%D0%BE%D0%B9-%D1%81%D0%B2%D0%B8%D0%BD%D0%B5%D0%B9%C2%BB
- https://www.tadviser.ru/index.php/%D0%A1%D1%82%D0%B0%D1%82%D1%8C%D1%8F:%D0%9C%D0%BE%D1%88%D0%B5%D0%BD%D0%BD%D0%B8%D1%87%D0%B5%D1%81%D1%82%D0%B2%D0%BE_%D1%81_%D0%BA%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D0%B2%D0%B0%D0%BB%D1%8E%D1%82%D0%BE%D0%B9
- https://fintech-retail.com/2025/03/10/kiberbez-24-25/
- https://www.comnews.ru/content/240569/2025-08-07/2025-w32/1008/cifrovye-faraony-moshenniki-stroyat-kriptopiramidy
- https://www.rbc.ru/crypto/news/67f7eaf89a7947c83bc6c426
- https://www.intellectpro.ru/press/commenters/moshenniki_ohotyatsya_za_kriptovalyutoy/
- https://www.tadviser.ru/index.php/%D0%A1%D1%82%D0%B0%D1%82%D1%8C%D1%8F:%D0%9C%D0%BE%D1%88%D0%B5%D0%BD%D0%BD%D0%B8%D1%87%D0%B5%D1%81%D1%82%D0%B2%D0%BE_%D1%81_%D0%BA%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D0%B2%D0%B0%D0%BB%D1%8E%D1%82%D0%BE%D0%B9_%D0%B2_%D0%A0%D0%BE%D1%81%D1%81%D0%B8%D0%B8
- https://cryptodesk.ru/blog-cryptodesk/stati-pro-mayning/shemy-moshennikov-v-kriptovalyute-kak-ne-stat-zhertvoy-v-2024-godu/
- https://www.f6.ru/blog/cryptoscam-2024/
- https://vc.ru/crypto/1521950-skam-patrul-kak-ne-stat-zhertvoi-kriptomoshennikov-v-2024-godu
- https://www.tadviser.ru/index.php/%D0%A1%D1%82%D0%B0%D1%82%D1%8C%D1%8F:%D0%9C%D0%BE%D1%88%D0%B5%D0%BD%D0%BD%D0%B8%D1%87%D0%B5%D1%81%D1%82%D0%B2%D0%BE_%D1%81_%D0%BA%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D0%B2%D0%B0%D0%BB%D1%8E%D1%82%D0%BE%D0%B9
- https://www.rbc.ru/crypto/news/677fd4149a794763facf621a
- https://fpa.ru/info/moshennicheskie-shemy-s-kriptovaljutoj/
- https://kredita.net/spravochnik/moshennichestvo-s-kriptovalyutoj/
- https://www.binance.com/ru/square/post/10886907686410
- https://www.kaspersky.ru/blog/trump-memecoins-cybersecurity-advice/39060/
- https://www.tadviser.ru/index.php/%D0%A1%D1%82%D0%B0%D1%82%D1%8C%D1%8F:%D0%9C%D0%BE%D1%88%D0%B5%D0%BD%D0%BD%D0%B8%D1%87%D0%B5%D1%81%D1%82%D0%B2%D0%BE_%D1%81_%D0%BA%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D0%B2%D0%B0%D0%BB%D1%8E%D1%82%D0%BE%D0%B9_%D0%B2_%D0%A0%D0%BE%D1%81%D1%81%D0%B8%D0%B8
- https://www.block-chain24.com/news/novosti-bezopasnosti/kriptoinvestor-poteryal-3-mln-v-rezultate-fishingovoy-ataki
- https://hashtelegraph.com/fishingovaja-ataka-oboshlas-kriptoinvestoru-v-3-mln-v-odin-klik/
- https://cryptodesk.ru/blog-cryptodesk/stati-pro-mayning/shemy-moshennikov-v-kriptovalyute-kak-ne-stat-zhertvoy-v-2024-godu/
- https://www.binance.com/ru/square/post/10424006491321
- https://www.binance.com/ru/square/post/22108396885842
- https://www.okx.com/ru/learn/phishing-attacks-crypto-security-2024
- https://www.rbc.ru/crypto/news/677fd4149a794763facf621a
- https://www.binance.com/ru/square/post/27543411183953
- https://www.comnews.ru/content/240569/2025-08-07/2025-w32/1008/cifrovye-faraony-moshenniki-stroyat-kriptopiramidy
- https://www.tadviser.ru/index.php/%D0%A1%D1%82%D0%B0%D1%82%D1%8C%D1%8F:%D0%9C%D0%BE%D1%88%D0%B5%D0%BD%D0%BD%D0%B8%D1%87%D0%B5%D1%81%D1%82%D0%B2%D0%BE_%D1%81_%D0%BA%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D0%B2%D0%B0%D0%BB%D1%8E%D1%82%D0%BE%D0%B9
- https://www.intellectpro.ru/press/commenters/moshenniki_ohotyatsya_za_kriptovalyutoy/
- https://www.f6.ru/blog/cryptoscam-2024/
- https://securelist.ru/spam-and-phishing-report-2024/111743/
- https://www.rbc.ru/crypto/news/6788d1249a7947c7393ae148
- https://ptsecurity.com/ru-ru/research/analytics/aktualnye-kiberugrozy-iv-kvartal-2024-goda-i-kvartal-2025-goda/
- https://plusworld.ru/journal/2025/plus-3-323-2025/kiberugrozy-kriptobiznesa-trendy-2024-2025/
- https://habr.com/ru/companies/jetinfosystems/articles/893838/
- https://www.itsec.ru/news/krazha-uchiotnih-dannih-oboshla-fishing-v-spiske-sposobov-nachalnogo-proniknoveniya-za-2024
- https://www.block-chain24.com/news/novosti-bezopasnosti/kriptovladelec-poteryal-908-tysyach-v-rezultate-izoshchrennoy-fishingovoy
- https://sbersova.ru/sections/protection/top-5-moshennichestv-v-kriptomire
Sources:
- Cyber exercises as a tool for raising awareness — Infars.ru
- Internal information security for business in Russia — IT-World.ru
- Cyberattacks 2024–2025: Causes and Recommendations — IT-World.ru
- Information Security Threats in 2025 — OBIT.ru
- https://infars.ru/blog/kiberucheniya-kak-gotovit-sotrudnikov-k-realnym-ugrozam/
- https://www.it-world.ru/security/gvn4gavcapwg8sg4cgk00ogcks4ggck.html
- https://www.tadviser.ru/index.php/%D0%A1%D1%82%D0%B0%D1%82%D1%8C%D1%8F:%D0%98%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%86%D0%B8%D0%BE%D0%BD%D0%BD%D0%B0%D1%8F_%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C_%D0%B2_%D0%BA%D0%BE%D0%BC%D0%BF%D0%B0%D0%BD%D0%B8%D0%B8
- https://www.it-world.ru/security/3mjq9sep4pq8wkk0sskssgw8gcokckg.html
- https://www.alp-erp.ru/news/kiberatakam-boy-kak-kompanii-zashchishchayut-dannye-klientov-v-epokhu-tsifrovykh-ugroz
- https://obit.ru/blog/informatsionnaya-bezopasnost/ugrozy-informatsionnoy-bezopasnosti-v-2025-godu-kak-izbezhat/
- https://cisoclub.ru/kak-predotvratit-ataku-klassa-apt-i-vovremja-obnaruzhit-zloumyshlennika-vnutri-infrastruktury/
- https://ddos-guard.ru/blog/plan-reagirovaniya-na-incidenty-kiberbezopasnosti
- https://rezbez.ru/article/osnovnye-proczessy-kiberbezopasnosti
- https://cisoclub.ru/nepreryvnoe-skanirovanie-ujazvimostej-kak-vystroit-jeffektivnyj-process-v-kompanii/
- https://gendalf.ru/news/zpdn/chelovecheskiy-faktor-68-utechek-dannykh/
- https://newsletter.radensa.ru/archives/6363
- https://incrussia.ru/news/samoj-bolshoj-uyazvimostyu-v-kiberbezopasnosti-okazalis-sami-lyudi/
- https://securitymedia.org/info/kiberbezopasnost-na-perekrestke-2024-i-2025-godov-chto-nas-zhdet.html
- https://www.it-world.ru/security/gvn4gavcapwg8sg4cgk00ogcks4ggck.html
- https://rg.ru/2024/09/17/reg-szfo/vot-tak-fokus.html
- https://www.anti-malware.ru/news/2024-09-24-121598/44234
- https://ptsecurity.com/ru-ru/research/analytics/aktualnye-kiberugrozy-iii-kvartal-2024-goda/
- https://ya.ru/neurum/c/drugoe/q/pochemu_chelovecheskiy_faktor_ostaetsya_glavnoy_4b990077
- https://www.okx.com/ru/learn/phishing-attacks-crypto-security-2024
- https://www.tadviser.ru/index.php/%D0%A1%D1%82%D0%B0%D1%82%D1%8C%D1%8F:%D0%9C%D0%BE%D1%88%D0%B5%D0%BD%D0%BD%D0%B8%D1%87%D0%B5%D1%81%D1%82%D0%B2%D0%BE_%D1%81_%D0%BA%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D0%B2%D0%B0%D0%BB%D1%8E%D1%82%D0%BE%D0%B9
- https://hashtelegraph.com/fishingovaja-ataka-oboshlas-kriptoinvestoru-v-3-mln-v-odin-klik/
- https://www.block-chain24.com/news/novosti-bezopasnosti/kriptoinvestor-poteryal-3-mln-v-rezultate-fishingovoy-ataki
- https://plusworld.ru/journal/2025/plus-3-323-2025/kiberugrozy-kriptobiznesa-trendy-2024-2025/
- https://forklog.com/news/hudshee-polugodie-industriya-poteryala-ot-skama-i-hakerov-3-1-mlrd
- https://www.anti-malware.ru/analytics/Threats_Analysis/Crypto-Exchange-attacks-in-2024
- https://securelist.ru/spam-and-phishing-report-2024/111743/
- https://www.anti-malware.ru/analytics/Technology_Analysis/How-to-protect-digital-assets-from-fraud
- https://forklog.com/exclusive/ataki-stali-slozhnee-ataki-stali-bolee-produmannymi
- https://www.kaspersky.ru/blog/what-is-a-crypto-wallet-drainer/36920/
- https://timeweb.com/ru/community/articles/kak-proverit-smart-kontrakt-na-skam
- https://www.bybit.com/ru-RU/help-center/article/How-to-Avoid-Crypto-P2P-Scams
- https://www.gate.com/ru/learn/articles/airdrop-scam-prevention-guide/4514
- https://www.kaspersky.ru/resource-center/preemptive-safety/how-to-avoid-nft-scams
- https://www.binance.com/ru/square/post/15877021836585
- https://www.ledger.com/ru/academy/%D0%9A%D0%B0%D0%BA-%D0%BA%D1%80%D0%B0%D0%B4%D1%83%D1%82-%D0%BA%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D0%B2%D0%B0%D0%BB%D1%8E%D1%82%D1%8B-%D0%B8-%D0%BA%D0%B0%D0%BA-%D1%8D%D1%82%D0%BE%D0%B3%D0%BE-%D0%B8%D0%B7%D0%B1%D0%B5%D0%B6%D0%B0%D1%82%D1%8C
- https://www.sberbank.ru/ru/person/kibrary/investigations/skhemy-obmana-predprinimatelej
- https://www.gate.com/ru/learn/articles/a-deep-dive-into-the-erc-20-authorization-model-how-permit-and-permit2-work-their-risks-and-key-differences/8707
- https://www.kaspersky.ru/resource-center/definitions/cryptocurrency-scams
- https://www.ssldragon.com/ru/blog/what-is-phishing-attack/
- https://www.block-chain24.com/news/novosti-bezopasnosti/kriptoinvestor-poteryal-3-mln-v-rezultate-fishingovoy-ataki
- https://academy.kp11.ru/mod/book/view.php?id=76643&chapterid=184
- https://www.tadviser.ru/index.php/%D0%A1%D1%82%D0%B0%D1%82%D1%8C%D1%8F:%D0%9C%D0%BE%D1%88%D0%B5%D0%BD%D0%BD%D0%B8%D1%87%D0%B5%D1%81%D1%82%D0%B2%D0%BE_%D1%81_%D0%BA%D1%80%D0%B8%D0%BF%D1%82%D0%BE%D0%B2%D0%B0%D0%BB%D1%8E%D1%82%D0%BE%D0%B9
- https://www.rbc.ru/crypto/news/6654699e9a79474d6f5f1aef
- https://cisoclub.ru/moshenniki-maskirujut-fishingovye-ataki-pod-vozvrat-komissij-ethereum-i-kradut-dannye-ot-kriptokoshelkov/
- https://www.coinbase.com/ru/security/phishing-attacks
- https://plusworld.ru/articles/65478/
- https://ptsecurity.com/ru-ru/research/analytics/kakimi-budut-fishingovye-ataki-v-blizhaishem-buduschem/