Theme
Home Reviews Resources About Contact Get Help
← Back to Resources

Scam Terminology Dictionary

Essential Vocabulary for Protection

Mastering scam terminology forms your initial line of defense against fraudsters. This dictionary decodes the language commonly used in digital asset fraud operations.

A - D

Address Poisoning
A cunning technique where attackers dispatch tiny transactions from addresses mimicking authentic ones, enticing victims to mistakenly copy fraudulent addresses for later transfers.
Airdrop Deception
Fabricated token distributions requiring targets to link wallets to malicious portals or remit fees to obtain worthless digital tokens.
Boiler Room
Aggressive telemarketing centers where criminals utilize high-pressure sales methods to coerce targets into funding fraudulent investment propositions.
Clone Phishing
Fabricating perfect duplicates of legitimate websites or communications to mislead users into providing credentials or processing payments.
Crypto Dusting
Transferring microscopic cryptocurrency amounts to wallets for surveillance purposes and potentially exposing wallet proprietors for targeted exploitation.

E - H

Exit Scam
When crypto venture administrators or exchange management vanish unexpectedly with user assets, halting all services without warning.
FOMO Exploitation
A psychological manipulation approach fraudsters employ to generate artificial urgency, pushing targets toward impulsive financial decisions.
Front Running
Capitalizing on advance transaction intelligence to profit at the detriment of others, especially common within decentralized finance protocols.
Honeypot Trap
Deceptive smart contracts constructed to appear profitable while containing hidden mechanisms that prevent users from selling or extracting their holdings.

I - L

Impersonation Attack
Scammers disguising themselves as public figures, popular influencers, or help desk representatives to deceive targets into sending crypto or divulging private information.
ICO Scam
Fraudulent initial coin offerings where founders collect investor money for fictional or abandoned projects, abandoning investors with worthless tokens.
Liquidity Pool Fraud
Sham DeFi services promising attractive returns for liquidity provision while actually draining deposited capital via malicious smart contract code.

M - P

Mining Scam
Deceptive cloud mining platforms that receive payments yet never supply legitimate mining capacity or generate authentic returns.
Pig Butchering
Prolonged confidence schemes where criminals nurture emotional bonds over extended timeframes before manipulating targets to invest in phony trading sites.
Ponzi Structure
Financial deception where distributions to existing members derive from capital contributed by subsequent participants rather than genuine profits.
Pump and Dump
Artificially escalating an asset's market value through coordinated acquisitions and deceptive marketing, then liquidating positions at peak valuation.

Q - T

Recovery Scam
Secondary fraud operations targeting existing scam victims, pledging to recuperate stolen funds for upfront fees while providing zero actual recovery services.
Rug Pull
When project creators abandon their work and flee with investor capital, commonly by depleting liquidity reserves or implementing sell restrictions.
Seed Phrase Compromise
Tactics for stealing wallet recovery phrases via bogus technical support, deceptive websites, or keylogging software that captures typed seed words.
Shill
Someone who endorses a crypto asset while masking their financial stake, typically remunerated to manufacture artificial buzz.

U - Z

Unlicensed Broker
Trading platforms operating without required financial permits, offering zero investor protections or legal options in case of fraud.
Wallet Drainer
Predatory smart contracts or websites that, following wallet connection, immediately siphon all holdings to the perpetrator's address.
Wash Trading
Synthetically boosting trading activity by repeatedly transacting the same asset, fabricating deceptive signals of market demand.
Zero-Day Exploit
Attacks leveraging previously undetected security vulnerabilities in applications, smart contracts, or protocols before corrections are deployed.

Continue Your Education

Crypto fraud tactics transform continuously. Bookmark this resource and revisit for updates. For specific platform evaluations, explore our review database.