Crypto
Cryptocurrency-Linked Scams Surge in 2024 as Cybercriminals Shift Tactics – Brave New Coin
A new report from Chainalysis paints a troubling picture of the evolving landscape of cryptocurrency-related scams. The research reveals that crypto scams have become the dominant force in illicit digital asset activity in 2024, with a staggering 43% of these illicit inflows going to wallets that were activated this year alone.
This points to a worrying surge in new scams, particularly alarming when compared to 2022, the next highest year, where only 29.9% of year-to-date flows went to newly activated wallets. This dramatic rise signals that cybercriminals are aggressively adapting their strategies, creating a constant influx of new scams to ensnare unsuspecting victims. Anecdotally Brave New Coin can also confirm a marked increase in both the number of scams pitched to the company in 2024, and in their level of sophistication.
Shifting Tactics from Ponzi Schemes to Targeted Scams
While old favorites like ‘cloud mining’ scams are ongoing, the report also highlights a shift in scammer tactics, moving away from complex, long-running Ponzi schemes to shorter, more targeted campaigns. ‘Romance scams,’ where perpetrators build trust with victims online before defrauding them, stand out as particularly damaging. Chainalysis data suggests that this type of scam has exploded by 85x since 2020, with average payment sizes resulting in devastating financial and emotional impact on victims.
“From 2022 to 2024, just one such organization, a popular fraud shop, received $10.5 million from scammers known to perpetrate romance scams,” the report states. “With this shop selling ‘seasoned’ social media profiles for anything between $5 to $20 per account, scammers could have purchased between 525K and 2.1 million social media profiles they could then use to target victims.” This thriving black market of stolen or fake social media profiles provides scammers with the tools they need to build convincing online personas and prey on vulnerable individuals seeking connection.
Shorter Scam Lifespans Indicate Rapid Cybercrime Evolution
Further evidence of this shift towards shorter-term scams is seen in the shrinking average lifespan of such operations. The average duration of scams has dropped dramatically, from 271 days for scams initiated in 2020 to just 42 days for scams launched in 2024. This shortened timeframe suggests that scammers are prioritizing quick profits over building elaborate schemes, likely due to increased awareness and law enforcement efforts targeting large-scale operations.
“Taken together, these two data points strongly suggest that scammers are pivoting away from elaborate Ponzi schemes that cast a wide net, to more targeted campaigns like romance scams or address poisonings,” said Eric Jardine, Cybercrime Research Lead at Chainalysis. Jardine emphasizes that this evolution in tactics requires a corresponding evolution in security measures and awareness campaigns to effectively combat these new threats.
What Is Crypto Wallet Address Poisoning?
Address poisoning refers to a tactic used by scammers in which they send small, often worthless, transactions to a victim’s cryptocurrency wallet. These transactions are designed to ‘poison’ the wallet by creating a record that appears in the victim’s transaction history, often mimicking legitimate wallet addresses from an exchange or other entity a victim may be interacting with.
Scammers then hope that victims will accidentally copy the poisoned address from their transaction history when trying to send funds later. Since the malicious address looks similar to the legitimate one, victims may unknowingly send their cryptocurrency to the scammer’s address instead of their intended recipient’s address.
Investment Scams Continue to Dominate Crypto-Related Fraud
A recent FBI report notes a 45% surge in cryptocurrency-related fraud losses in the United States during 2023, reaching a staggering $5.6 billion. This spike coincided with a rally in cryptocurrency prices, attracting renewed attention from criminal actors eager to capitalize on the renewed public interest and potential for large financial gains.
Investment scams were the most prevalent and damaging type of crypto fraud, accounting for roughly $3.9 billion in losses. The FBI emphasized the decentralized and irreversible nature of cryptocurrency transactions as key factors exploited by scammers, enabling them to facilitate large-scale, cross-border transactions quickly and with relative anonymity. These characteristics, often touted as advantages of cryptocurrency, unfortunately also create opportunities for criminals to operate with reduced risk of detection and accountability.
Heightened Vigilance and Collaboration Needed to Combat Scams
The FBI urges individuals to exercise caution and vigilance when dealing with cryptocurrency investments and to be wary of unsolicited offers promising unrealistic returns. Red flags to watch out for include high-pressure sales tactics, requests for personal information, and demands for payment in cryptocurrency. “Scams targeting investors who use cryptocurrency are skyrocketing in severity and complexity,” said FBI Director Christopher Wray. “The best way to help stop these crimes is for people to report them,” he added, emphasizing the need for public awareness and cooperation to combat the growing threat of crypto-related scams. Reporting suspicious activity, even if no financial loss occurred, can help law enforcement agencies track trends and develop strategies to combat these evolving scams.
Crypto
North Korean hackers allegedly stole record $2.02 billion of cryptocurrency in 2025. Here’s how they did it | Stock Market News
North Korea remains dominant threat to cryptocurrency security in 2025, even while confirmed incidents have decreased, according to a report by blockchain analytics company Chainanlysis.
Hackers from the Democratic People’s Republic of Korea (DPRK) allegedly stole a record $2.02 billion of crypto this year — a 51% jump compared to 2024, and taking their all-time total to $6.75 billion, it added.
The analysis further found that the DRPK is achieving larger thefts with fewer incidents, using unique methods to gain access and pull off their heists.
North Korea’s alleged crypto heists: Here’s how they did it
As per the report, these hacks were often carried out in unique fashion by embedding IT workers inside crypto services or using sophisticated impersonation tactics targeting executives.
Embedding IT workers
This is among the DPRK’s “principal attack vectors”, the report said. It added that the hackers secured jobs inside crypto services to gain privileged access and enable high‑impact compromises.
“Part of this record year likely reflects an expanded reliance on IT worker infiltration at exchanges, custodians, and web3 firms, which can accelerate initial access and lateral movement ahead of large‑scale theft,” it noted.
Fake jobs
Further, taking the IT worker model and “flipping it on its head”, the analysis said that DPRK-linked operators are also increasingly impersonating recruiters for prominent web3 and AI firms. This way, they orchestrate fake hiring processes that culminate in “technical screens” designed to harvest credentials, source code, and VPN or SSO access to the victim’s current employer.
“At the executive level, a similar social‑engineering playbook appears in the form of bogus outreach from purported strategic investors or acquirers, who use pitch meetings and pseudo–due diligence to probe for sensitive systems information and potential access paths into high‑value infrastructure,” it added.
Higher- value attacks
Over the years, DPRK-linked operators are increasingly undertaking significantly higher-value attacks compared to other threat actors. “This pattern reinforces that when North Korean hackers strike, they target large services and aim for maximum impact,” the report added.
It noted that “this year’s record haul came from significantly fewer known incidents”, including the massive $1.5 billion Bybit hack in February 2025.
DPRK’s distinctive laundering patterns
Not just the hacking process, the laundering of stolen funds is also distinctive, the report said. It noted that more than 60% of laundering was of volume concentrated below $5,00,000 transfer value tranches, despite the total stolen amounts being larger.
“Even while the DPRK consistently steals larger amounts than other stolen fund threat actors, they structure on-chain payments in smaller tranches, speaking to the sophistication of their laundering,” it added.
Crypto
Coinbase Security Impersonation Scheme Exposed as Authorities Claim Nearly $16M Was Siphoned
Crypto
Unmasking the Cryptocurrency Phishing Crisis – OneSafe Blog
What if I told you that a single case could encapsulate the chaotic vulnerabilities of the cryptocurrency world? Enter Ronald Spektor, a figure now infamous for allegedly masterminding a phishing operation that siphoned away a staggering $16 million from naive Coinbase users. The fallout from this scheme plunges deep into the unsettling implications of trust in an era dominated by digital currencies—a stark reminder that the promise of crypto can quickly turn into a nightmare if we’re not careful.
The Dark Art of Cryptocurrency Phishing
Phishing has morphed into a sophisticated form of cybercrime, particularly within the cryptocurrency realm. Spektor’s alleged tactics involved posing as a trusted agent from Coinbase, using clever manipulation to lure unsuspecting users into handing over their hard-won crypto assets. The sheer audacity of exploiting trust is what amplifies the horror.
Picture this: victims, believing they’re engaging with legitimate support personnel, unwittingly become pawns in a malicious game. Spektor’s strategy revolved around deceptive communications that felt alarmingly real—a blend of phone calls and texts designed to strip away defenses. This situation underscores a grim reality: even the latest breakthroughs in blockchain technology cannot entirely shield users from the ploys of manipulative attackers. With reports indicating a relentless rise in account takeovers, the FBI urges continuous vigilance against such deceptions.
Emotional Toll on Victims
Beyond the dollar signs lies emotional wreckage. Victims of Spektor’s alleged scheme endured more than financial losses; their trust was shattered. The narrative here is compelling: years of labor invested in cryptocurrency can vanish in moments of misplaced faith. The ramifications are staggering—over 5,100 reported cases of account takeover fraud in 2025 alone, with losses soaring over $262 million. These numbers highlight a chilling truth—cybercriminals are thriving, particularly preying on those who lack the savvy to spot danger ahead.
A Glimmer of Hope Amid Regulatory Scrutiny
The escalating tide of cryptocurrency fraud thrusts platforms like Coinbase into the spotlight, facing mounting scrutiny over their security measures. As they work closely with law enforcement to reclaim stolen assets, tough questions about their safety protocols emerge. To navigate the ever-shifting landscape of crypto, exchanges must elevate their defensive stances in alignment with groundbreaking technologies.
Regulatory institutions are now taking an active role—pursuing comprehensive strategies to halt the proliferation of scams. This proactive approach extends beyond transaction verification; it’s also about nurturing user awareness and education. Financial institutions are encouraged to enhance protective measures for cryptocurrency users, crafting clearer guidelines to prevent fraud and restoring trust in tumultuous waters.
Innovative Approaches to Security
With evolving threats in the industry, experts call for a paradigm shift that prioritizes cybersecurity education alongside robust frameworks. Imagine harnessing real-time, AI-enhanced phishing detection mechanisms, especially for nascent Web3 startups. The key to protection? Cultivating a culture of awareness where users become savvy enough to recognize telltale signs and verify any critical communication through trusted sources, a necessity in an age where impersonation reigns.
The Road Ahead: A Call to Action
Spektor’s story serves as more than an isolated cautionary tale; it echoes a broader, systemic vulnerability interwoven within the cryptocurrency ecosystem. As technology advances, so do the methods of cybercriminals, reinforcing a critical insight: human error remains the weak link in this chain.
As we steer into the future, it is imperative that both investors and regulators understand and prioritize the safeguarding of security protocols across all platforms. To thrive, cryptocurrency exchanges must harmonize user-friendly transactions with unwavering security measures, crafting an environment where criminal operations struggle to take root.
Conclusion
The saga of Ronald Spektor signals an urgent call to arms against the pervasive threats encircling the cryptocurrency landscape. Strengthening security protocols and empowering an enlightened user base are not just advisable; they’re essential for survival. By championing vigilance and investing in advanced technological defenses, we stand a better chance of shielding investors and stabilizing the innovative yet fragile cryptocurrency market. As we confront the shadows cast by cybercrime, let us resolve to forge a more secure financial future that empowers rather than exploits.
-
Iowa6 days agoAddy Brown motivated to step up in Audi Crooks’ absence vs. UNI
-
Iowa1 week agoHow much snow did Iowa get? See Iowa’s latest snowfall totals
-
Maine4 days agoElementary-aged student killed in school bus crash in southern Maine
-
Maryland6 days agoFrigid temperatures to start the week in Maryland
-
Technology1 week agoThe Game Awards are losing their luster
-
South Dakota7 days agoNature: Snow in South Dakota
-
New Mexico4 days agoFamily clarifies why they believe missing New Mexico man is dead
-
World1 week agoCoalition of the Willing calls for transatlantic unity for Ukraine