Cryptocurrency Fraud Awareness for US Users
Cryptocurrency fraud represents one of the fastest-growing categories of financial crime in the United States, with the FBI's Internet Crime Complaint Center (IC3 2023 Internet Crime Report) recording $5.6 billion in cryptocurrency-related losses in 2023 alone — a 45% increase from the prior year. This page covers the definition and scope of cryptocurrency fraud as a distinct fraud category, the operational mechanisms fraudsters use, the most commonly reported scenario types affecting US users, and the decision boundaries that separate criminal fraud from civil disputes or market risk. The Online Safety Listings maintained by this authority reflect the service landscape where fraud recovery, cybersecurity consultation, and reporting resources operate.
Definition and scope
Cryptocurrency fraud is the use of deceptive, manipulative, or unauthorized means to obtain cryptocurrency assets or fiat currency converted through cryptocurrency channels from a victim without lawful consent. It is classified as wire fraud under 18 U.S.C. § 1343 and, where investment instruments are involved, as securities fraud under 15 U.S.C. § 78j — a dual-jurisdiction framework that implicates both the Department of Justice and the Securities and Exchange Commission (SEC Crypto Assets and Cyber Enforcement Actions).
The Federal Trade Commission (FTC Consumer Sentinel Network) distinguishes cryptocurrency fraud from general investment fraud on the basis of the payment medium and reversibility — cryptocurrency transactions are pseudonymous, irreversible, and cross-border by default, making them structurally distinct from ACH or wire fraud in traditional banking. The Commodity Futures Trading Commission (CFTC Digital Assets) holds concurrent jurisdiction over cryptocurrency derivatives and spot markets for commodities-classified digital assets such as Bitcoin and Ether.
Scope is national but geographically concentrated: IC3 data shows California, Florida, and Texas account for the highest absolute complaint volumes, though per-capita loss rates are elevated in states with high cryptocurrency adoption. The relevant regulatory bodies — SEC, CFTC, DOJ, FTC, and FinCEN under the Bank Secrecy Act — each carry distinct enforcement mandates over overlapping portions of the fraud taxonomy.
How it works
Cryptocurrency fraud operates across three structural phases common to most scheme variants:
-
Target acquisition — The fraudster identifies victims through social media platforms, dating applications, unsolicited SMS or email contact, or compromised online forums. Targeting is frequently demographic: IC3 data identifies adults over 60 as the highest-loss age cohort, accounting for $1.65 billion in 2023 cryptocurrency losses (IC3 2023 Elder Fraud Report).
-
Trust and liquidity building — The fraudster establishes sustained contact, often over 30 to 90 days, simulating romantic interest, professional mentorship, or investment expertise. During this phase, victims are directed to move assets into cryptocurrency as a precondition for access to purported investment platforms or opportunities.
-
Extraction and exit — Cryptocurrency is transferred to wallets controlled by the fraudster through direct transfer requests, fake platform withdrawals, or "tax and fee" payment demands. Once transferred, assets pass through chain-hopping (converting between tokens across multiple blockchains) or mixing services to obscure traceability before conversion to fiat through offshore exchanges.
FinCEN (FinCEN Advisories on Cryptocurrency) has flagged chain-hopping and the use of unhosted wallets as primary red flags in suspicious activity reports (SARs) filed by regulated exchanges under the Bank Secrecy Act (31 U.S.C. § 5318).
Common scenarios
The FBI and FTC have classified cryptocurrency fraud into distinct operational scenario types. The four most-reported categories in the US are:
-
Pig butchering (Sha Zhu Pan) — Long-duration romance and investment scams in which victims are cultivated over weeks before being directed to fraudulent trading platforms. The FBI assessed this as the dominant high-loss scheme type in 2023, with average individual losses exceeding $100,000 per victim (FBI Pig Butchering Warning).
-
Rug pulls — Fraudulent cryptocurrency token launches where developers abandon a project and extract liquidity after investors purchase the token. Distinct from pig butchering in that victim contact is minimal and losses occur at the smart contract layer rather than through social engineering.
-
Phishing and wallet compromise — Credential theft via spoofed exchange login pages or malicious wallet-connect requests targeting seed phrases. The Anti-Phishing Working Group (APWG eCrime Reports) tracks phishing infrastructure targeting cryptocurrency users as a separate subcategory from financial-sector phishing.
-
Advance-fee and recovery fraud — Fraudsters impersonate law enforcement officers, attorneys, or blockchain recovery specialists and demand upfront cryptocurrency payments to recover funds lost in prior fraud. The FTC classifies this as a secondary victimization pattern.
Pig butchering vs. rug pulls — key distinction: Pig butchering requires sustained social engineering and produces higher per-victim losses; rug pulls are transactional, require no victim relationship, and produce lower per-victim losses distributed across a larger victim pool.
Decision boundaries
Determining whether a cryptocurrency loss constitutes actionable fraud — as opposed to investment risk, contract dispute, or platform insolvency — depends on the presence of specific elements:
- Intent to deceive: Material misrepresentation by the counterparty is required; market volatility losses and exchange bankruptcy do not qualify as fraud absent misrepresentation.
- Unauthorized access: Wallet compromise through phishing or SIM-swapping is criminal under the Computer Fraud and Abuse Act (18 U.S.C. § 1030), separate from civil fraud claims.
- Jurisdictional trigger: Cross-border transactions implicate DOJ's Money Laundering and Asset Recovery Section in addition to IC3 reporting channels.
Complaints should be filed with IC3 at ic3.gov, the FTC at reportfraud.ftc.gov, and the relevant state Attorney General's office. Victims seeking professional recovery or cybersecurity services can reference the structured Online Safety Listings or consult the Online Safety Directory Purpose and Scope for guidance on how this directory is organized. Background on how to navigate listings effectively is covered in the How to Use This Online Safety Resource reference.
References
- FBI Internet Crime Complaint Center (IC3) 2023 Internet Crime Report
- FBI IC3 2023 Elder Fraud Report
- Federal Trade Commission — Consumer Sentinel Network
- FTC — Report Fraud
- U.S. Securities and Exchange Commission — Crypto Assets Enforcement
- Commodity Futures Trading Commission — Digital Assets
- Financial Crimes Enforcement Network (FinCEN) — Advisories
- Anti-Phishing Working Group (APWG) — eCrime Reports
- 18 U.S.C. § 1343 — Wire Fraud (Cornell LII)
- 18 U.S.C. § 1030 — Computer Fraud and Abuse Act (Cornell LII)
- 31 U.S.C. § 5318 — Bank Secrecy Act Compliance (Cornell LII)