죄송합니다. 이 페이지의 콘텐츠는 선택하신 언어로 제공되지 않습니다.

나의 IP:알 수 없음

·

내 상태: 알 수 없음

주요 내용으로 건너뛰기

Advance-fee crypto scams: How fake platforms steal your money and data

Advance-fee scams are taking on a new form in the cryptocurrency space. The NordVPN threat intelligence research team has recently uncovered and analyzed a large-scale phishing and fraud campaign built around fake crypto exchanges and wallet services. Instead of obvious requests for money, scammers now build convincing platforms that show fake balances and simulate real transactions. By the time the payment request appears, the situation feels credible enough to follow through. This article explains how these scams work, why they’re effective, and what to watch for before you risk losing money or exposing sensitive information.

2026년 4월 7일

15분 소요

Advance-fee crypto scams: How fake platforms steal your money

A new twist on an old scam

Advance-fee fraud isn’t new. Traditionally, scammers promised unexpected money, like inheritance claims, lottery winnings, or business deals, which required a small upfront payment to receive a much larger reward. The core idea hasn’t changed, but the way scammers present it has.

Today, scammers build these schemes around cryptocurrency, a space many people still find complex or unfamiliar. They use that complexity to justify unexpected fees and technical-sounding explanations. Users who are less experienced in decentralized networks often comply without questioning the request.

Additionally, instead of making vague promises, the scammers show their targets what looks like a real platform. Users can log in, see a balance, and interact with a familiar interface. The process feels like a normal transaction, which lowers suspicion.

How an advance-fee crypto scam works

The cryptocurrency scams follow a clear sequence that leads people from curiosity to payment. Each step builds on the last, making the situation feel more real and reducing suspicion along the way.


Infographic: How an advance-fee crypto scam works

Phase 1: A fake deposit notification

The advance-fee scam, like all social engineering attacks, usually starts with the bait — a message or an email claiming you’ve received a large cryptocurrency transfer, typically 15 bitcoin. The amount is intentionally high, often framed as a mistake or an unexpected credit. This message is designed to immediately capture attention, create a sense of urgency, and push the recipient toward quick action.

The message may suggest that the funds could be reversed if not claimed soon, encouraging the user to act without verifying the situation. To make the story more convincing, the email often includes login credentials and a direct link to access the funds.

Phase 2: A fake platform and balance trap

After clicking the link, users are taken to a website that closely resembles a real crypto exchange or wallet platform. These fake websites are often well designed, with familiar layouts, charts, and account dashboards that reinforce their legitimacy.

Once logged in, the user sees a large balance already credited to their account. This visual confirmation is critical because it reduces doubt and makes the situation feel real. At this point, many users begin to think about how to withdraw the funds rather than questioning their origin.

Before allowing any action, the platform pushes the user to “complete their profile” by entering personal information such as an email address, phone number, full name, and sometimes a new password. While it may appear to be a routine step, it allows attackers to collect valuable data that can be reused in future scams or sold on underground markets.

Phase 3: The advance-fee theft

When the user attempts to withdraw the funds, the scam reaches its final stage. The platform displays an error or restriction, explaining that the transaction cannot be completed without paying a required fee.

The fee is usually described using technical language, such as a “network fee,” “gas fee,” or “transfer tax.” Because these terms exist in real crypto transactions, they help make the request seem legitimate. However, in genuine transactions, fees are automatically deducted and do not require separate payments through external forms.

The user is then prompted to enter payment details, often through a credit or debit card form embedded within the platform. Once submitted, the money is taken immediately, and the victim receives nothing in return. In some cases, the platform may continue to request additional payments, each presented as the final step needed to release the funds.

Why these scams are effective

These campaigns succeed because they combine technical realism with psychological manipulation:

  • They look legitimate. The platforms are often well designed, with dashboards, transaction histories, and branding that mimic real services. For someone unfamiliar with crypto platforms, it’s difficult to tell the difference.
  • They create a sense of urgency. Targeted users are pushed to act quickly before the “error” is corrected without careful thinking or verification.
  • They rely on perceived complexity. Cryptocurrency already feels complicated to many users. When a platform mentions fees or technical requirements, users are more likely to accept them without questioning the request.
  • They escalate commitment. Each step (logging in, entering data, attempting withdrawal) increases the likelihood that the target will follow through.

The hidden danger: Data harvesting

Financial loss is only part of the damage. These scams are also designed to collect sensitive information that can be reused in other attacks. In the process, users may unknowingly open the door to these scams:

Even if you don’t pay the fake fee, entering your details can still put you at risk.

Known malicious domains

NordVPN’s investigation identified over 100 active domains impersonating cryptocurrency brands used to carry out these scams. 

Many of these domains rely on typosquatting — slight misspellings of legitimate brand names (like “zinance” instead of “Binance”) — or use less common top-level domains such as “.su” to appear credible at first glance. Many also follow similar naming patterns, usually “coin,” “koin,” or “bit.” 

Some examples include:

  • coinpoint.su
  • paypot.net
  • coinlarge.net
  • coinbond.net
  • coinshore.net
  • koincrane.com
  • capitalkoin.com
  • bitcount.net
  • securecoins.net
  • zinance.trade

How to recognize the scam early

The most reliable way to avoid these scams is to recognize the pattern before reaching the payment stage. Look for these warning signs:

  • You’re told you’ve received crypto you didn’t expect.
  • The message includes login credentials or unusual instructions.
  • The platform asks you to “complete registration” before withdrawal.
  • You see a large balance immediately after logging in.
  • You’re asked to pay fees to access funds.
  • Payment is requested before any real transaction happens.

How to protect yourself

Prevention is easier than recovery, especially since crypto transactions can’t be reversed. Staying safe requires a combination of awareness and the right tools:

  • Be skeptical of unexpected crypto claims. Legitimate platforms don’t randomly deposit large amounts of cryptocurrency into user accounts. If it sounds too good to be true, it is.
  • Never pay to unlock funds. In legitimate crypto transactions, fees are built into the process and do not require separate payments.
  • Avoid logging in to unknown platforms. If you receive a link via email or message, don’t trust it. Always verify the platform independently.
  • Use tools that block malicious sites. Scam platforms often rely on users reaching the site in the first place. Blocking access reduces risk significantly. Tools like NordVPN’s Threat Protection Pro™ can help detect and block known malicious domains before they load.
  • Verify wallet addresses before sending funds. If you’re asked to send funds, double-check the destination using a crypto wallet address checker. Doing so helps identify known scam-linked addresses.

Before you send crypto, make sure it’s safe.

Stay protected with Threat Protection Pro™

Methodology

This investigation was carried out in collaboration with the TechRadar security team using open-source intelligence (OSINT). All findings were cross-checked across multiple sources to ensure accuracy.

Researchers used advanced search queries (“dorks”) across major search engines, along with specialized platforms like Shodan and FOFA, to identify domains, websites, and exposed services linked to the campaign.

This approach helped map the full scope of the operation and distinguish actively malicious domains from those that only appeared similar. Additional investigations also looked into related scams, including a campaign exploiting FCKeditor and a Chinese-linked fake e-commerce network — you can read more about them in our other research articles.

Cybersecurity and Threat Protection expert Dainius Ražinskas

Dainius Ražinskas

Product and engineering manager, NordVPN