bait and switch scam

Phishing scams in Web3 typically exploit social connections, fraudulent links, or spoofed webpages to trick users into performing seemingly legitimate actions such as “connecting,” “signing,” or “authorizing” within their wallets. These deceptive prompts can grant scammers control over the victim’s assets. In Web3, accounts are managed by private keys and most transactions are executed via smart contracts, meaning a single mistaken authorization can result in funds being transferred automatically. Over the past six months, there has been a rise in fake airdrops and unsolicited messages from bots, making it increasingly important for users to recognize and defend against these threats.
Abstract
1.
Phishing scams involve fraudsters impersonating trusted entities, making false promises, or creating urgency to trick victims into transferring funds or revealing private keys.
2.
Common tactics include fake customer service, fraudulent airdrops, phishing websites, and social engineering attacks that exploit user trust or greed.
3.
In Web3, phishing scams often appear as high-yield investments, urgent security verifications, or limited-time offers designed to pressure users into quick decisions.
4.
Prevention tips: verify information sources, never trust strangers with sensitive data, secure private keys and seed phrases, and remain skeptical of unusually high returns.
bait and switch scam

What Is a Phishing Scam?

A phishing scam in Web3 refers to deceptive tactics and interface mimicry used to persuade users to voluntarily “connect, sign, or authorize” transactions in their wallets, ultimately granting scammers permission to access or manage their assets. Instead of direct account theft, phishing scams rely on social engineering to get users to perform critical actions themselves.

In the crypto space, many interactions are facilitated by smart contracts. Scammers often create fake websites that closely resemble legitimate project sites and use direct messages and community hype to make you believe it is an official event. As a result, users may unknowingly click that crucial confirmation within their wallet.

Why Are Phishing Scams Prevalent in Web3?

Phishing scams are particularly common in Web3 due to the irreversible nature of blockchain transactions, granular permission settings, and widespread user unfamiliarity with the significance of “signing” and “authorizing.” Once a transaction is broadcast on-chain, it usually cannot be reversed—scammers exploit this trait for rapid asset extraction.

Over the past six months, phishing scams related to airdrops, NFT minting, cross-chain activities, and bot DMs have risen sharply. The early stages of new blockchain ecosystems often feature an abundance of projects and severe information asymmetry, creating fertile ground for scammers.

Common Phishing Scam Techniques

Typical phishing scam methods include:

  • Fake airdrop links
  • Fake NFT minting pages
  • Impersonated customer support DMs
  • Fake cross-chain bridges
  • Fake plugin download/update prompts
  • “Urgent incidents” designed to pressure quick action

For example, scammers might post a “limited-time airdrop” on social media. The domain is only one or two letters off from the official site and asks you to connect your wallet and “verify eligibility.” The site then presents an authorization window that appears legitimate; once you approve, the contract can transfer your tokens.

Another tactic is fake customer support DMs claiming “account anomalies require verification,” directing you to a spoofed site that requests your mnemonic phrase or signature within your wallet. Since the mnemonic phrase is a human-readable form of your private key, revealing it almost always leads to asset theft.

How Do Phishing Scams Operate On-Chain?

The essence of on-chain phishing scams is the abuse of “signing and authorizing.” Signing allows your wallet to confirm messages or transactions; authorizing gives a contract or address the right to manage specific assets.

Step 1: The scammer persuades you to connect your wallet and sign an action, making the process seem like a legitimate registration. Step 2: The site presents an authorization request, allegedly for “eligibility verification,” but actually granting the contract permission to move your tokens. Step 3: The contract then exploits these permissions in the background, transferring your assets—often using multiple small transactions to obscure the flow.

Smart contracts act as automated sets of rules. Once granted permissions, they operate according to code without requiring further consent. This is why even “seemingly harmless authorizations” can result in asset loss.

How to Identify Phishing Scams

Key steps for identifying phishing scams involve checking both source and permissions.

  • First, verify domain names and official channels for consistency. Watch out for slight character substitutions or misspellings that mimic legitimate addresses.
  • Next, note if the website uses urgency tactics like “limited time” or “act now”—these are common pressure strategies.
  • Also, carefully review wallet pop-up content. If you’re prompted to “grant a contract control over your tokens” or give broad permissions, be extremely cautious. While signing is common, unreadable or excessively lengthy messages should raise suspicion.

How to Protect Against Phishing Scams

Protecting yourself from phishing scams starts with account management and safe operational habits.

  1. Layered Asset Management: Use wallets with small balances for everyday interactions; store larger amounts in more secure environments with strong authentication.
  2. Default to Not Clicking Unknown Links: Only access activity information via official project websites or pinned links on verified social media. Avoid links from ads or unsolicited DMs.
  3. Minimize Authorizations: In your wallet or DApp, authorize only necessary tokens and amounts—avoid “unlimited” approvals. Regularly review and revoke permissions for unused contracts.
  4. Utilize Exchange Security Features: On platforms like Gate, enable withdrawal address whitelisting and secondary confirmations so withdrawals are only possible to pre-approved addresses. Always verify notifications about unusual logins or withdrawals and pause operations if suspicious.
  5. Adopt a “Pause Before Acting” Habit: If asked to sign or transfer immediately, stop and verify the request in community groups or via official channels first.

What To Do If You Fall Victim to a Phishing Scam

If you encounter a phishing scam, act quickly with these steps to minimize losses:

  1. Immediately disconnect your wallet from suspicious sites and stop any further signing or authorizing.
  2. Revoke permissions using wallet management features or third-party tools to remove access from suspicious contracts.
  3. Transfer remaining assets under your control to a secure address or temporarily safeguard them on an exchange like Gate.
  4. Preserve evidence—save chat logs, transaction hashes, screenshots—and report incidents to the platform and local law enforcement. Seek help from professional security teams if necessary.
  5. Warn the community by posting risk alerts in project groups or on social media to help others avoid falling victim.

How Do Phishing Scams Differ from Traditional Scams?

The key differences are automated permissions and irreversibility. On-chain authorizations allow smart contracts to execute actions automatically without further contact from scammers—unlike traditional scams that depend on ongoing communication and transfer instructions.

Additionally, phishing scams are more globalized and cross-platform, spreading rapidly with high sophistication in design. After an attack, stolen funds are often quickly dispersed across multiple chains and mixing services, making them harder to trace.

High-Risk Scenarios for Phishing Scams

Recent high-risk scenarios include:

  • Fake airdrops from new projects
  • Counterfeit sites for popular NFT minting events
  • Bot-generated links in Telegram groups
  • Impersonated customer support on social platforms
  • Search ads leading to fake cross-chain bridges
  • Fake browser extension or wallet update prompts
  • Fake governance pages inducing urgent signatures for “emergency votes”

In these cases, scammers exploit narratives of “limited time, high rewards, easy operation,” combined with similar domains and official-like visuals, causing users to overlook verification of permissions and sources.

Key Takeaways on Phishing Scams

The core principle: never treat “signing and authorizing” as risk-free clicks. Any unverified link or pop-up could grant contracts access to your assets. By verifying sources, minimizing authorizations, regularly revoking unused permissions, managing funds in layers, and enabling security features like withdrawal whitelists and secondary confirmations (as on Gate), you can significantly reduce risk. Prioritize asset safety above all—maintaining a cautious “pause before action” approach can help avoid most losses.

FAQ

How do scammers typically obtain my private key or mnemonic phrase in phishing scams?

Scammers often impersonate official support or technical staff—or create a sense of urgency (such as account issues requiring verification)—to trick you into sharing sensitive information. They may claim they need your private key to “restore your account” or “unlock funds,” but legitimate teams will never request this information. Once obtained, scammers can directly control your wallet.

If I’ve shared my wallet address with a scammer, are my funds at risk?

Sharing only your wallet address carries relatively low risk since addresses are public on-chain information. However, if you also reveal your private key, mnemonic phrase, or answers to security questions, your funds are at extreme risk. Check your transaction history immediately; if you notice suspicious activity, notify blockchain security agencies and preserve evidence for investigation.

What is an “authorization transfer” in phishing scams, and why is it dangerous?

Authorization transfer refers to being tricked into signing smart contract approvals that seem harmless (such as allowing queries) but actually grant scammers the right to move your assets. This tactic is more covert than directly requesting your private key, as the transaction interface may look completely legitimate. Always verify the contract address on a block explorer before signing—never approve unclear requests.

Can assets sent out after a phishing scam be recovered?

Once a blockchain transaction is confirmed, it cannot be reversed—but recovery isn’t impossible if funds reach an exchange. Report immediately (for example, to Gate) and request an account freeze. Preserve all chat records and transaction hashes; file a police report locally and consider seeking help from blockchain security firms for asset tracing. The sooner you act, the better the chances of success.

How can I verify if a project team or wallet address is legitimate and avoid phishing?

Legitimate projects typically provide multiple verification methods: official websites, social media accounts, and contract labels on block explorers. Reverse-verify any unsolicited contacts by checking official sources—never trust links provided directly by strangers. Use labeling features on platforms like Gate to mark suspicious addresses as “scam”; blocklist them and avoid any interaction.

A simple like goes a long way

Share

Related Glossaries
Commingling
Commingling refers to the practice where cryptocurrency exchanges or custodial services combine and manage different customers' digital assets in the same account or wallet, maintaining internal records of individual ownership while storing the assets in centralized wallets controlled by the institution rather than by the customers themselves on the blockchain.
Define Nonce
A nonce is a one-time-use number that ensures the uniqueness of operations and prevents replay attacks with old messages. In blockchain, an account’s nonce determines the order of transactions. In Bitcoin mining, the nonce is used to find a hash that meets the required difficulty. For login signatures, the nonce acts as a challenge value to enhance security. Nonces are fundamental across transactions, mining, and authentication processes.
Rug Pull
Fraudulent token projects, commonly referred to as rug pulls, are scams in which the project team suddenly withdraws funds or manipulates smart contracts after attracting investor capital. This often results in investors being unable to sell their tokens or facing a rapid price collapse. Typical tactics include removing liquidity, secretly retaining minting privileges, or setting excessively high transaction taxes. Rug pulls are most prevalent among newly launched tokens and community-driven projects. The ability to identify and avoid such schemes is essential for participants in the crypto space.
Decrypt
Decryption is the process of converting encrypted data back to its original readable form. In cryptocurrency and blockchain contexts, decryption is a fundamental cryptographic operation that typically requires a specific key (such as a private key) to allow authorized users to access encrypted information while maintaining system security. Decryption can be categorized into symmetric decryption and asymmetric decryption, corresponding to different encryption mechanisms.
Anonymous Definition
Anonymity refers to participating in online or on-chain activities without revealing one's real-world identity, appearing only through wallet addresses or pseudonyms. In the crypto space, anonymity is commonly observed in transactions, DeFi protocols, NFTs, privacy coins, and zero-knowledge tools, serving to minimize unnecessary tracking and profiling. Because all records on public blockchains are transparent, most real-world anonymity is actually pseudonymity—users isolate their identities by creating new addresses and separating personal information. However, if these addresses are ever linked to a verified account or identifiable data, the level of anonymity is significantly reduced. Therefore, it's essential to use anonymity tools responsibly within the boundaries of regulatory compliance.

Related Articles

False Chrome Extension Stealing Analysis
Advanced

False Chrome Extension Stealing Analysis

Recently, several Web3 participants have lost funds from their accounts due to downloading a fake Chrome extension that reads browser cookies. The SlowMist team has conducted a detailed analysis of this scam tactic.
2024-06-12 15:30:24
Analysis of the Sonne Finance Attack
Intermediate

Analysis of the Sonne Finance Attack

The essence of this attack lies in the creation of the market (soToken), where the attacker performed the first collateral minting operation with a small amount of the underlying token, resulting in a very small "totalSupply" value for the soToken.
2024-06-13 00:35:30
What is a Crypto Card and How Does it Work? (2025)
Beginner

What is a Crypto Card and How Does it Work? (2025)

In 2025, crypto cards have revolutionized digital payments, with Gate Crypto Card leading the market through unprecedented innovation. Now supporting over 3000 cryptocurrencies across multiple blockchains, these cards feature AI-powered exchange rate optimization, biometric security, and customizable spending controls. Gate's improved reward structure offers up to 8% cashback, while integration with major digital wallets enables acceptance at 90 million merchants worldwide. The enhanced user experience includes real-time transaction tracking, spending analytics, and automated tax reporting. With competitive advantages over other platforms, Gate Crypto Card demonstrates how the bridge between traditional finance and digital assets has strengthened, making cryptocurrency more accessible and practical for everyday use than ever before.
2025-05-29 02:35:39