How to Identify & Avoid Crypto Exchange Scams

Billions of dollars are lost to cryptocurrency scams every year. Learn how to spot fake exchanges, phishing attacks, exit scams, and protect your assets.

Updated April 2026

Scam Alert

New scam exchanges appear every week. If you have been directed to an exchange you have never heard of — especially via social media, dating apps, or unsolicited messages — stop and verify it before depositing any funds. When in doubt, stick to well-known, regulated platforms covered in our exchange reviews.

The Scale of Crypto Exchange Scams

Cryptocurrency scams represent one of the largest categories of financial fraud worldwide. According to the FBI's Internet Crime Complaint Center and blockchain analytics firms like Chainalysis, the numbers are staggering:

  • $14 billion+ lost to crypto scams and fraud in 2023 alone
  • $40 billion+ lost in the 2022 collapse of major platforms (FTX, Celsius, Voyager, Terra/Luna)
  • 117,000+ victims reported crypto fraud to the FBI in 2023
  • $4.6 billion lost specifically to investment scams involving fake exchanges and platforms
  • Losses have increased 45% year-over-year since 2020

These figures only include reported losses. The actual total is estimated to be 3–5 times higher, as many victims never report scams due to embarrassment or the belief that recovery is impossible.

Key Statistic

The average individual crypto scam loss is approximately $86,000 according to the FTC. However, the median loss is closer to $3,800, meaning a small number of large-scale victims significantly skew the average. Anyone can be a target regardless of experience level.

Types of Exchange Scams

Understanding the different types of crypto exchange scams is the first step toward protecting yourself. Here are the most common schemes:

Scam Type How It Works Red Flags Typical Losses
Fake Exchanges A completely fabricated exchange website designed to collect deposits that can never be withdrawn No verifiable company info, unrealistic returns promised, no regulatory licenses $1K – $500K per victim
Exit Scams A seemingly functional exchange operates normally for months or years, then suddenly shuts down and absconds with user funds Withdrawal delays escalating over time, vague explanations, team goes silent $100M – $10B+ total
Phishing Clones Pixel-perfect copies of real exchange websites (e.g., Coinbase, Binance) that steal login credentials and 2FA codes Slightly misspelled URLs, unsolicited emails with urgent language, SSL certificate mismatches $500 – $100K per victim
Pump-and-Dump Schemes Coordinated groups inflate a token's price on an exchange, then dump their holdings on unsuspecting buyers Sudden social media hype, obscure tokens with no utility, price spikes with no news $100 – $50K per victim
Rug Pulls Developers create a token/DEX liquidity pool, attract investment, then drain all liquidity at once Anonymous teams, locked liquidity with short timers, no code audits, unrealistic APY $1M – $3B+ total
Impersonation Scams Scammers pose as exchange staff, crypto influencers, or support agents to trick users into sending funds Unsolicited DMs, requests for seed phrases or passwords, "send crypto to verify" requests $200 – $50K per victim
Fake Support Scams Fraudulent "customer support" agents intercept users seeking help and guide them to hand over account access Support via Telegram or Discord DMs, asking for remote access, requesting private keys $500 – $200K per victim

How to Verify If an Exchange Is Legitimate

Before depositing a single dollar into any exchange, run through this verification checklist:

Exchange Legitimacy Checklist

  1. Regulatory licensing: Check if the exchange holds valid licenses. In the US, look for FinCEN MSB registration and state money transmitter licenses. In the EU, look for MiCA authorization. Search the regulator's public database directly — do not trust a license number shown on the exchange's own website without verifying it.
  2. Registration and incorporation: Legitimate exchanges are registered businesses. Search the company name in the relevant corporate registry (e.g., SEC EDGAR, UK Companies House, Singapore ACRA).
  3. Proof of reserves: Does the exchange publish cryptographic proof of reserves? Can you independently verify that the exchange holds sufficient assets to cover all user deposits?
  4. Team transparency: Are the founders and leadership team publicly identified? Can you verify their identities on LinkedIn, in press interviews, or through conference appearances? Anonymous teams are a major red flag for centralized exchanges.
  5. Regulatory compliance: Does the exchange require KYC (Know Your Customer) verification? While privacy-conscious users may dislike KYC, its absence on a centralized exchange is a warning sign.
  6. Domain age and history: Use WHOIS lookup tools to check when the domain was registered. Scam exchanges typically have domains less than 1 year old.
  7. Independent reviews: Search for reviews on independent sites (not the exchange's own testimonials). Check our exchange reviews and other reputable sources.
  8. Trading volume verification: Use sites like CoinGecko or CoinMarketCap to check if the exchange's reported volume matches independent data. Inflated volume is a common tactic.
  9. Withdrawal testing: Before depositing large amounts, make a small deposit and withdrawal first. Scam exchanges often allow small withdrawals to build trust before blocking larger ones.
  10. Community presence: Check for an active, authentic community on Reddit, Twitter/X, and other platforms. Paid bot followers and fake engagement are easy to spot.

Pro Tip: Verify Licenses Directly

Never trust a license number displayed on an exchange's website. Always verify directly with the regulatory body. For US exchanges, search the FinCEN MSB registrant list. For EU exchanges, check the ESMA register. For UK exchanges, search the FCA register. This takes 2 minutes and can save you thousands.

Famous Exchange Collapses & What We Learned

History provides the most powerful lessons. Each major exchange collapse revealed systemic issues that educated the entire industry:

Exchange Year Losses What Happened Key Lesson
Mt. Gox 2014 $473M (850K BTC) Once handling 70% of all Bitcoin trades, Mt. Gox was hacked over several years due to poor security. Filed for bankruptcy in Feb 2014. Never trust a single exchange with the majority of your holdings. Demand proof of reserves and independent security audits.
QuadrigaCX 2019 $190M (CAD) Founder Gerald Cotten died (or allegedly faked his death) in India. He was the sole holder of private keys to cold wallets. Funds were unrecoverable. Single points of failure are unacceptable. Exchanges must have multi-signature key management and transparent custody procedures.
Celsius Network 2022 $4.7B Froze withdrawals in June 2022 after a liquidity crisis caused by overleveraged DeFi positions. Filed for Chapter 11 bankruptcy. If an exchange/lending platform offers returns that seem too good to be true, they are taking excessive risk with your funds.
Voyager Digital 2022 $1.3B Collapsed after exposure to Three Arrows Capital's default. Despite marketing FDIC-insured accounts, crypto deposits were not FDIC insured. Understand exactly what is insured and what is not. "FDIC insured" on a crypto platform may only apply to USD held at a partner bank, not your crypto.
FTX 2022 $8B+ Sam Bankman-Fried secretly funneled customer funds to Alameda Research for risky trading and personal expenses. A bank run in November 2022 exposed the fraud. Even the most prominent, well-connected exchanges can be committing fraud. Proof of reserves, regulatory oversight, and transparent financials are essential.

The Common Thread

Every major exchange collapse shares the same root cause: lack of transparency. Users had no way to independently verify that the exchange held their funds. This is why proof of reserves and regulatory compliance are not optional — they are the bare minimum you should demand from any exchange.

Red Flags: Legitimate Exchange vs. Scam Exchange

Use this comparison to evaluate any exchange you are considering. The more "scam exchange" characteristics you observe, the higher the risk:

Criteria Legitimate Exchange Scam Exchange
Regulatory status Licensed and registered with financial regulators; verifiable on regulator websites Claims to be "decentralized" or "offshore" to avoid regulation; fake license numbers
Team identity Named leadership with verifiable backgrounds; public LinkedIn profiles Anonymous team or fake profiles; stock photos for team members
Domain age Established domain (2+ years); consistent brand history Domain registered within the last few months; frequent domain changes
KYC requirements Requires identity verification before large trades or withdrawals No KYC required at all, or KYC is only requested when you try to withdraw
Withdrawal speed Consistent withdrawal processing; clear timelines published Withdrawals frequently delayed; excuses like "blockchain congestion" or "security review"
Customer support Official support channels; ticketing system; no requests for passwords Support only via Telegram DMs; asks for passwords, seed phrases, or remote access
Return promises No guaranteed returns; clear risk disclosures Promises guaranteed daily/weekly returns (e.g., "2% daily guaranteed")
Proof of reserves Published proof of reserves; third-party audits; on-chain verification No proof of reserves; refuses to disclose wallet addresses
Trading volume Volume matches independent tracking sites; healthy order book depth Suspiciously high volume; thin order books; wash trading patterns
Fee transparency Clear fee schedule published; no hidden charges Fees hidden or unclear; surprise "withdrawal taxes" or "verification fees"
Security features 2FA, withdrawal whitelisting, address book, anti-phishing codes Basic or no security features; no 2FA option
Community reputation Active presence on Reddit, Twitter/X; organic user discussions Only paid promotions; fake Trustpilot reviews; no organic community
Legal terms Comprehensive terms of service; clear jurisdiction stated Generic or copy-pasted legal pages; no clear jurisdiction
Referral program Reasonable referral bonuses (10–30% fee commission) Pyramid-style multi-level referral program; huge bonuses for recruiting
App availability Official apps on Apple App Store and Google Play Store APK sideload only; not available on official app stores; or recently published with few reviews
Press coverage Covered by reputable outlets (Bloomberg, CoinDesk, The Block) Only covered by paid press releases on obscure sites

Phishing Attacks Targeting Exchange Users

Phishing is the most common attack vector against individual crypto exchange users. Attackers create convincing replicas of exchange communications to steal credentials.

Common Phishing Methods

  • Email phishing: Fake emails that appear to come from your exchange, claiming suspicious activity, mandatory verification, or limited-time promotions. The links lead to credential-harvesting sites.
  • SMS phishing (smishing): Text messages with fake withdrawal alerts or 2FA codes designed to create urgency and direct you to phishing sites.
  • Search engine ads: Scammers purchase Google/Bing ads for exchange names, placing phishing sites above the real exchange in search results.
  • Browser extension attacks: Malicious browser extensions that modify exchange pages in real-time, replacing withdrawal addresses with the attacker's address.
  • Man-in-the-middle attacks: Real-time phishing toolkits that relay your credentials and 2FA code to the real exchange instantly, before the TOTP code expires.

How to Spot Phishing

  1. Check the sender address carefully. Scammers use addresses like support@coinbase-security.com instead of support@coinbase.com.
  2. Never click links in emails. Always navigate to the exchange directly by typing the URL or using a bookmark.
  3. Look for your anti-phishing code. Most major exchanges let you set a unique code that appears in every legitimate email. If the code is missing, the email is fake.
  4. Check for urgency and threats. "Your account will be suspended in 24 hours" is almost always a phishing tactic.
  5. Verify SSL certificates. Click the padlock icon in your browser's address bar and verify the certificate is issued to the correct entity.

Set Up Anti-Phishing Codes

Most major exchanges (Binance, Crypto.com, KuCoin, OKX) offer anti-phishing codes. Set a unique word or phrase that will appear in every legitimate email from the exchange. This is one of the simplest and most effective defenses against email phishing. Set this up immediately after creating your account.

Fake Exchange Websites & URL Verification

Fake exchange websites are often indistinguishable from the real thing visually. Here is how to verify you are on the legitimate site:

URL Verification Techniques

  1. Bookmark official URLs: Save the real exchange URL in your browser bookmarks and always access the exchange from your bookmark. Never from search results, emails, or social media links.
  2. Check the exact domain: Scammers use tricks like coinbase.com.trading-secure.net (the real domain is trading-secure.net, not coinbase.com). Learn to identify the actual domain from the URL structure.
  3. Look for homoglyph attacks: Scammers replace characters with similar-looking ones: bInance.com (capital I instead of lowercase L), coinbäse.com (umlaut a), or krakеn.com (Cyrillic e).
  4. Use DNS verification: Run a WHOIS lookup on the domain. Legitimate exchanges will have consistent registration data and old domain registration dates.
  5. Install browser extensions: Tools like PhishFort or MetaMask's phishing detector can warn you before you reach known scam sites.

Google Ads Warning

Scammers routinely pay for Google Ads targeting exchange names. A search for "Coinbase login" or "Binance" may show a phishing ad above the real result. Never click on ads to access your exchange. Always scroll past the ads to the organic results, or better yet, use your saved bookmark.

Social Media Scams

Social media platforms are the primary distribution channel for crypto scams. Here are the most common types:

Fake Giveaway Scams

"Send 0.1 BTC, get 0.2 BTC back!" These scams impersonate well-known figures (Elon Musk, Vitalik Buterin, CZ) and promise to double your crypto. They often use hacked verified accounts or create convincing lookalike profiles. No legitimate giveaway will ever ask you to send crypto first.

Impersonated Support Accounts

When you post about an exchange issue on Twitter/X or Reddit, scammers immediately respond pretending to be official support. They direct you to a "support portal" (phishing site) or ask you to share your screen via remote access software. Legitimate exchange support will never contact you first via DM, and will never ask for your password or seed phrase.

Telegram and Discord Scams

  • Fake groups: Scammers create Telegram groups mimicking official exchange channels, complete with pinned messages and bot-generated activity
  • Admin impersonation: Fake admins in real groups DM users offering "help" and directing them to phishing sites
  • Airdrop bots: Automated messages promising free token airdrops that require connecting your wallet to a malicious smart contract
  • "Investment opportunity" DMs: Unsolicited messages about exclusive investment platforms that are actually fake exchanges

Social Media Safety Rules

1) Disable DMs from strangers on Discord and Telegram. 2) Never click links in unsolicited messages. 3) Official exchange support will never DM you first. 4) No one will ever give you free crypto for sending them crypto first. 5) If it sounds too good to be true, it is.

Proof of Reserves Explained

Proof of Reserves (PoR) is a cryptographic method that allows an exchange to prove it holds enough assets to cover all user deposits. After the FTX collapse, PoR became the gold standard for exchange transparency.

How Proof of Reserves Works

  1. Merkle tree construction: The exchange creates a Merkle tree data structure containing every user's balance. Each user can verify their balance is included without seeing other users' data.
  2. On-chain wallet verification: The exchange signs messages from its known wallet addresses, proving control of the assets.
  3. Third-party audit: An independent auditor verifies that the total assets in the wallets match or exceed the total liabilities in the Merkle tree.
  4. User verification: Individual users can check that their specific balance is included in the Merkle tree using their unique audit ID.

Limitations of Proof of Reserves

  • PoR is a snapshot in time — it does not guarantee solvency between audits
  • Some implementations do not account for liabilities (borrowed funds, outstanding loans)
  • Exchanges could temporarily borrow assets to pass a PoR audit
  • Not all assets or chains may be included in the proof

Despite these limitations, PoR is significantly better than no verification at all. Exchanges that publish regular, comprehensive PoR audits are demonstrating a commitment to transparency.

What to Do If You Have Been Scammed

If you believe you have fallen victim to a crypto exchange scam, act immediately:

Immediate Steps

  1. Secure your accounts: Change passwords on all exchanges and email accounts. Revoke any API keys. If you shared your seed phrase, move funds from that wallet immediately.
  2. Document everything: Screenshot all transactions, communications, website URLs, wallet addresses, and any identifying information about the scammer.
  3. Report to law enforcement:
    • US: File with the FBI's IC3 (ic3.gov) and the FTC (reportfraud.ftc.gov)
    • UK: Report to Action Fraud (actionfraud.police.uk)
    • EU: File with your national cybercrime unit
    • Australia: Report to ScamWatch (scamwatch.gov.au)
  4. Report to the exchange: If the scam involved a legitimate exchange's platform (e.g., phishing that compromised your real account), contact that exchange's support immediately.
  5. Contact blockchain analytics firms: Companies like Chainalysis and CipherTrace can sometimes trace stolen funds. Some offer victim recovery programs.

Recovery Options

Be realistic about recovery. In most cases, stolen crypto is difficult or impossible to recover. However:

  • Law enforcement action: In high-profile cases, agencies like the DOJ have recovered significant funds (e.g., $3.6B recovered from the Bitfinex hack)
  • Exchange cooperation: If stolen funds were sent to a regulated exchange, law enforcement can issue freeze orders
  • Bankruptcy proceedings: In cases of exchange collapse (FTX, Celsius), victims may recover partial funds through bankruptcy courts

Beware of Recovery Scams

After being scammed, victims are often targeted by "recovery services" that promise to retrieve stolen funds for an upfront fee. These are almost always secondary scams. Legitimate law enforcement and legal professionals do not charge upfront fees to recover crypto. If someone DMs you offering recovery services, it is a scam.

Exchange Insurance & User Protections

Understanding what is actually insured and protected on each major exchange is critical. Most users incorrectly assume their full balance is insured.

Exchange USD/Fiat Insurance Crypto Insurance Cold Storage % Proof of Reserves Notable Protections
Coinbase FDIC insured up to $250K (USD balances held at partner banks) Crime insurance policy covering a portion of crypto held in hot storage 98% SEC-audited financial reports (publicly traded) Vault with time-delayed withdrawals; whitelisted addresses; SOC 2 compliance
Kraken Not FDIC insured; funds held at regulated banking partners No public crypto insurance policy; strong security track record (never hacked) 95% Bi-annual PoR audits by independent auditors Global settings lock; master key; PGP-signed emails; withdrawal address management
Binance Varies by jurisdiction; not FDIC insured for US users (Binance.US) SAFU fund ($1B+ emergency insurance fund for security breaches) 90%+ Monthly Merkle tree PoR with on-chain verification Anti-phishing code; address whitelist; device management; withdrawal limits
Gemini FDIC insured up to $250K (USD balances held at partner banks) Commercial insurance for digital assets held in hot wallet 95%+ SOC 2 Type 2 certified; regular audits SOC 2 Type 2; NY DFS regulated; strong custody solution (Gemini Custody); address whitelisting

What FDIC Insurance Actually Covers

FDIC insurance on crypto exchanges only covers US dollar cash balances held at FDIC-insured partner banks. It does not cover cryptocurrency holdings. If an exchange collapses, your Bitcoin, Ethereum, and other crypto assets are not protected by FDIC insurance regardless of what the exchange's marketing may imply.

Two-Factor Authentication Best Practices

Two-factor authentication (2FA) is your most important defense after a strong password. However, not all 2FA methods are equal:

2FA Methods Ranked (Best to Worst)

  1. Hardware security keys (YubiKey, Titan): Phishing-resistant because the key verifies the domain cryptographically. Even if you visit a phishing site, the key will not authenticate. This is the gold standard.
  2. Authenticator apps (Google Authenticator, Authy): Time-based one-time passwords (TOTP) that change every 30 seconds. Very secure but can be phished in real-time man-in-the-middle attacks.
  3. SMS-based 2FA: Vulnerable to SIM-swapping attacks where criminals port your phone number to their SIM card. Avoid SMS 2FA for exchange accounts.
  4. Email-based 2FA: Only as secure as your email account. If your email is compromised, this provides no protection.

2FA Setup Recommendations

  • Use a hardware security key as your primary 2FA method on all exchanges that support it
  • Set up an authenticator app as your backup 2FA method
  • Store your 2FA backup/recovery codes offline in a secure location (not on your phone or computer)
  • Never share screenshots of your QR codes or manual setup keys
  • Disable SMS 2FA entirely if your exchange offers alternatives
  • Use a dedicated device for your authenticator app if possible

Cold Storage vs. Hot Wallet Security

Understanding the difference between cold and hot storage is essential for protecting your crypto assets:

Hot Wallets

  • Connected to the internet at all times
  • Used by exchanges for processing withdrawals and active trading
  • Convenient but vulnerable to hacking, malware, and phishing
  • Typically holds 2–10% of an exchange's total assets
  • If an exchange is hacked, hot wallet funds are most at risk

Cold Storage

  • Completely offline; private keys never touch an internet-connected device
  • Used for the majority of an exchange's reserves
  • Immune to remote hacking attacks
  • Typically holds 90–98% of an exchange's total assets
  • Withdrawals from cold storage may take longer (this is a feature, not a bug)

When evaluating an exchange, look for one that stores 95% or more of assets in cold storage. Exchanges that are transparent about their cold/hot wallet ratios are generally more trustworthy.

Self-Custody vs. Exchange Custody

The phrase "not your keys, not your coins" captures the fundamental tradeoff between convenience and control. Here is a balanced comparison:

Factor Self-Custody (Hardware Wallet) Exchange Custody
Control Full control; you hold the private keys Exchange holds keys on your behalf
Exchange collapse risk Zero — your funds are independent of any exchange High — if the exchange fails, your funds may be lost
Hacking risk Very low if set up correctly; immune to remote attacks Depends on the exchange's security practices
User error risk High — lost seed phrase = permanent loss; no recovery Low — exchange offers account recovery options
Convenience Less convenient; requires manual transaction signing Very convenient; instant trading and transfers
Cost One-time hardware cost ($60–$200); network fees for transfers Free to hold; trading and withdrawal fees apply
Insurance No insurance; you are solely responsible Some exchanges offer partial insurance coverage
Best for Long-term holdings; large amounts; experienced users Active trading; small amounts; beginners

Recommended Strategy

Use a hybrid approach: keep funds you actively trade on a reputable, regulated exchange, and move long-term holdings to a hardware wallet (Ledger or Trezor). A common guideline is to keep no more than 10–20% of your total crypto portfolio on exchanges at any time.

Regulatory Protections by Country

Regulatory frameworks vary dramatically by country. Knowing what protections exist in your jurisdiction helps you understand your recourse if something goes wrong:

Country/Region Primary Regulator Key Protections Crypto-Specific Framework
United States SEC, CFTC, FinCEN, state regulators FDIC insurance on USD; state money transmitter laws; securities laws apply to many tokens Evolving; SEC enforcement-driven; FIT21 framework under development
European Union ESMA, national regulators MiCA regulation requires exchange authorization; consumer protection rules; reserve requirements for stablecoins MiCA (Markets in Crypto-Assets) — comprehensive framework effective 2024–2025
United Kingdom FCA FCA registration required for crypto businesses; AML compliance; marketing restrictions Crypto treated as property; FCA authorization regime for exchanges
Japan FSA (JFSA) One of the strictest regimes; exchanges must segregate customer funds; cold storage requirements Payment Services Act; comprehensive licensing since 2017 (after Mt. Gox)
Singapore MAS Payment Services Act licensing; AML/CFT requirements; consumer protection measures Progressive but strict licensing; major crypto hub with clear regulatory framework
Australia ASIC, AUSTRAC DCE registration required; AML/CTF compliance; proposed licensing framework Evolving framework; consultation on comprehensive crypto regulation
Canada CSA, FINTRAC, provincial regulators Exchanges must register as restricted dealers or marketplaces; CIPF may apply in some cases Provincial securities regulators actively enforcing registration (post-QuadrigaCX reforms)

Offshore Exchanges and Regulation

Exchanges operating from jurisdictions with little or no crypto regulation (e.g., Seychelles, Marshall Islands, certain Caribbean nations) may offer lower fees and fewer restrictions, but they also offer zero regulatory protection if something goes wrong. If an offshore exchange freezes your funds or collapses, you have virtually no legal recourse. Prioritize exchanges regulated in your home country.

Final Thoughts: Protecting Your Crypto

The crypto industry has matured significantly since the early days of Mt. Gox, but scams continue to evolve. The most effective protection is a combination of education, skepticism, and good security practices:

  1. Only use well-known, regulated exchanges covered in our exchange reviews
  2. Enable all available security features — hardware 2FA, withdrawal whitelists, anti-phishing codes
  3. Verify before you trust — check licenses, proof of reserves, and team transparency
  4. Store long-term holdings in self-custody using a hardware wallet
  5. Stay informed about new scam tactics by following our guides and security ratings

Stay Updated

The scam landscape changes constantly. Bookmark our Security Ratings page for the latest exchange security assessments, and check our Reviews before using any new exchange. Your due diligence today prevents losses tomorrow.