← Back to Resources
Fraud Detection Glossary
Key Terms Every Investor Must Know
Understanding fraud vocabulary is essential for protecting yourself. This glossary breaks down the terminology frequently encountered in cryptocurrency scam schemes.
A - D
- Address Poisoning
- A deceptive method where criminals transmit minimal transactions from wallet addresses resembling legitimate ones, tricking victims into copying fraudulent addresses for subsequent transfers.
- Airdrop Fraud
- Bogus token giveaways that demand victims link their wallets to harmful websites or submit fees to receive tokens with no actual value.
- Boiler Room Operation
- Intensive sales centers where con artists employ forceful methods to persuade targets into committing money to bogus investment opportunities.
- Clone Phishing
- Producing identical copies of authentic websites or correspondence to deceive users into submitting login details or executing payments.
- Crypto Dusting
- Distributing minuscule cryptocurrency amounts to wallets for transaction monitoring and potentially unmasking wallet holders for focused attacks.
E - H
- Exit Scam
- When cryptocurrency project managers or exchange operators vanish abruptly with customer assets, terminating all services without notice.
- FOMO Manipulation
- A mental manipulation strategy scammers deploy to manufacture urgency and compel victims into rushed investment choices.
- Front Running
- Leveraging prior awareness of upcoming transactions to gain financially at the expense of others, particularly prevalent in DeFi ecosystems.
- Honeypot Contract
- Malicious smart contracts engineered to seem lucrative but incorporating concealed programming that blocks users from liquidating or retrieving their assets.
I - L
- Impersonation Fraud
- Criminals masquerading as famous personalities, content creators, or customer service agents to manipulate victims into transferring crypto or exposing sensitive data.
- ICO Fraud
- Deceptive token offerings where creators gather capital for nonexistent or deserted ventures, leaving investors holding valueless digital tokens.
- Liquidity Mining Fraud
- Counterfeit DeFi platforms advertising substantial yields for liquidity contributions but actually siphoning deposited assets via harmful smart contracts.
M - P
- Mining Fraud
- Fake cloud mining operations that accept payments but fail to deliver genuine mining capacity or investment returns.
- Pig Butchering
- Extended romance schemes where fraudsters cultivate connections over extended periods before persuading targets to deposit funds into fraudulent trading platforms.
- Ponzi Scheme
- Investment deception where payouts to current participants come from money deposited by newer participants rather than from actual earnings.
- Pump and Dump
- Synthetically boosting an asset's valuation through synchronized purchases and deceptive marketing, then offloading holdings at maximum prices.
Q - T
- Recovery Fraud
- Follow-up scams preying on prior victims, promising to retrieve stolen assets for advance payment but delivering nothing in return.
- Rug Pull
- When project founders desert their venture and abscond with investor capital, typically by emptying liquidity reserves or blocking sell transactions.
- Seed Phrase Theft
- Schemes to acquire wallet recovery words through fake customer support, phishing websites, or malicious software that records typed seed phrases.
- Shill
- An individual who endorses a cryptocurrency while concealing their monetary stake, frequently compensated to fabricate false enthusiasm.
U - Z
- Unregulated Broker
- Trading services functioning without appropriate financial authorization, providing zero investor safeguards or legal remedies for fraud.
- Wallet Drainer
- Harmful smart contracts or websites that, upon wallet connection, instantly move all holdings to the criminal's address.
- Wash Trading
- Artificially pumping trade volume by continuously purchasing and disposing of identical assets, generating misleading indicators of market interest.
- Zero-Day Exploit
- Attacks targeting undiscovered security flaws in applications, smart contracts, or systems before fixes become available.
Keep Learning
Cryptocurrency fraud tactics shift constantly. Save this page and return periodically for new additions. For detailed platform analyses, explore our review database.