← Back to Resources
Scam Terminology Dictionary
Essential Vocabulary for Protection
Mastering scam terminology forms your initial line of defense against fraudsters. This dictionary decodes the language commonly used in digital asset fraud operations.
A - D
- Address Poisoning
- A cunning technique where attackers dispatch tiny transactions from addresses mimicking authentic ones, enticing victims to mistakenly copy fraudulent addresses for later transfers.
- Airdrop Deception
- Fabricated token distributions requiring targets to link wallets to malicious portals or remit fees to obtain worthless digital tokens.
- Boiler Room
- Aggressive telemarketing centers where criminals utilize high-pressure sales methods to coerce targets into funding fraudulent investment propositions.
- Clone Phishing
- Fabricating perfect duplicates of legitimate websites or communications to mislead users into providing credentials or processing payments.
- Crypto Dusting
- Transferring microscopic cryptocurrency amounts to wallets for surveillance purposes and potentially exposing wallet proprietors for targeted exploitation.
E - H
- Exit Scam
- When crypto venture administrators or exchange management vanish unexpectedly with user assets, halting all services without warning.
- FOMO Exploitation
- A psychological manipulation approach fraudsters employ to generate artificial urgency, pushing targets toward impulsive financial decisions.
- Front Running
- Capitalizing on advance transaction intelligence to profit at the detriment of others, especially common within decentralized finance protocols.
- Honeypot Trap
- Deceptive smart contracts constructed to appear profitable while containing hidden mechanisms that prevent users from selling or extracting their holdings.
I - L
- Impersonation Attack
- Scammers disguising themselves as public figures, popular influencers, or help desk representatives to deceive targets into sending crypto or divulging private information.
- ICO Scam
- Fraudulent initial coin offerings where founders collect investor money for fictional or abandoned projects, abandoning investors with worthless tokens.
- Liquidity Pool Fraud
- Sham DeFi services promising attractive returns for liquidity provision while actually draining deposited capital via malicious smart contract code.
M - P
- Mining Scam
- Deceptive cloud mining platforms that receive payments yet never supply legitimate mining capacity or generate authentic returns.
- Pig Butchering
- Prolonged confidence schemes where criminals nurture emotional bonds over extended timeframes before manipulating targets to invest in phony trading sites.
- Ponzi Structure
- Financial deception where distributions to existing members derive from capital contributed by subsequent participants rather than genuine profits.
- Pump and Dump
- Artificially escalating an asset's market value through coordinated acquisitions and deceptive marketing, then liquidating positions at peak valuation.
Q - T
- Recovery Scam
- Secondary fraud operations targeting existing scam victims, pledging to recuperate stolen funds for upfront fees while providing zero actual recovery services.
- Rug Pull
- When project creators abandon their work and flee with investor capital, commonly by depleting liquidity reserves or implementing sell restrictions.
- Seed Phrase Compromise
- Tactics for stealing wallet recovery phrases via bogus technical support, deceptive websites, or keylogging software that captures typed seed words.
- Shill
- Someone who endorses a crypto asset while masking their financial stake, typically remunerated to manufacture artificial buzz.
U - Z
- Unlicensed Broker
- Trading platforms operating without required financial permits, offering zero investor protections or legal options in case of fraud.
- Wallet Drainer
- Predatory smart contracts or websites that, following wallet connection, immediately siphon all holdings to the perpetrator's address.
- Wash Trading
- Synthetically boosting trading activity by repeatedly transacting the same asset, fabricating deceptive signals of market demand.
- Zero-Day Exploit
- Attacks leveraging previously undetected security vulnerabilities in applications, smart contracts, or protocols before corrections are deployed.
Continue Your Education
Crypto fraud tactics transform continuously. Bookmark this resource and revisit for updates. For specific platform evaluations, explore our review database.