Phishing is the number one attack vector in crypto. Not smart contract exploits. Not 51% attacks. Not zero-day vulnerabilities. Phishing—the art of tricking people into signing malicious transactions, entering credentials on fake sites, or clicking compromised links—accounted for more individual crypto losses in 2025 than all other attack types combined.
The reason phishing is so effective in crypto is that transactions are irreversible. There's no bank to call, no chargeback to file, no fraud department to dispute with. Once you sign a malicious approval or send funds to a scammer's address, the money is gone. Understanding the attack patterns is your best defense.
This guide covers every major type of crypto phishing attack active in 2026, with real examples, detection methods, and concrete prevention steps.
The 8 Types of Crypto Phishing Attacks
| Type | How It Works | Avg Loss | Detection Difficulty |
|---|---|---|---|
| Ice Phishing | Tricks you into signing token approval to attacker's contract | $15,000+ | Hard |
| Permit Phishing | Abuses ERC-20 permit() for gasless approval theft | $20,000+ | Very Hard |
| Fake Airdrop | Lures with "free tokens" to drain wallet via approval | $5,000+ | Medium |
| Clone Site | Pixel-perfect copy of legitimate dApp with drainer | $10,000+ | Medium |
| Discord/Telegram Hijack | Compromised mod posts fake mint/claim link | $8,000+ | Medium |
| Address Poisoning | Sends tiny txns from similar-looking address to pollute history | $25,000+ | Hard |
| Seed Phrase Phishing | Fake wallet app or "support" asks for seed phrase | Total wallet | Easy |
| NFT Offer Phishing | Fake offer notification leads to malicious signature | $3,000+ | Medium |
1. Ice Phishing: The Most Dangerous Attack in DeFi
Ice phishing doesn't steal your private key. Instead, it tricks you into signing a transaction that grants the attacker permission to spend your tokens. The term was coined by Microsoft's security team in 2022 and remains the dominant attack method in 2026.
How it works:
- The attacker creates a website that mimics a legitimate dApp (DEX, NFT marketplace, or DeFi protocol)
- When you "connect your wallet" and try to perform an action (swap, mint, stake), the site requests a token approval
- The approval looks normal in your wallet popup, but it grants spending permission to the attacker's contract instead of the legitimate protocol
- Once approved, the attacker calls
transferFrom()on the token contract to drain your approved tokens at any time
Why it's hard to detect: The approval transaction itself doesn't move any funds. Your wallet shows no immediate loss. The drain happens in a separate transaction, sometimes minutes, hours, or even days later. Many victims don't connect the approval to the loss because they happened at different times.
Prevention:
- Always verify the spender address in any approval popup—it should match the known contract address of the protocol you're using
- Use transaction simulation tools like Wallet Guard or Blowfish that show you exactly what you're approving
- Set specific approval amounts instead of "unlimited" when possible
- Regularly revoke stale approvals using Revoke.cash
- Use RugTool Scanner to check any contract before approving it
2. Permit Phishing: The Gasless Nightmare
Permit phishing exploits the ERC-20 permit extension (EIP-2612), which allows gasless approvals through off-chain signatures. Unlike traditional approvals that require an on-chain transaction (which at least shows up in your wallet history), permit signatures are off-chain. They don't cost gas and leave no on-chain trace until the attacker uses them.
How it works:
- The phishing site asks you to sign a message (not a transaction)
- The message is actually an ERC-20 permit signature granting the attacker approval to spend your tokens
- Because it's a "sign message" request (not a "send transaction" request), many users lower their guard
- The attacker submits the permit on-chain and drains your tokens in the same transaction
Prevention:
- Be extremely cautious of any "sign message" request from a dApp—read the message content carefully
- Use wallets that decode and display permit signatures in human-readable format (Rabby does this well)
- Consider using a hardware wallet, which displays signing details on the device screen
- Never sign messages on a site you reached through a link in a DM, email, or ad
3. Fake Airdrop Scams
Fake airdrops exploit the crypto community's excitement about free tokens. Scammers deploy worthless tokens to thousands of wallets, create a "claim" website, and wait for victims to connect their wallets and approve the drainer contract.
Common patterns:
- Tokens appear in your wallet that you never bought (airdrop bait)
- The token has a name like "$1000 REWARD - claim at fakesite.com"
- Social media posts announce "limited time airdrops" with urgency language
- The claim site requires a wallet connection and transaction approval
- The "claim" transaction is actually an approval that drains your real tokens
Prevention:
- Never interact with tokens that randomly appear in your wallet
- Never visit websites embedded in token names or NFT descriptions
- Legitimate airdrops are announced through official channels, not random token transfers
- If an airdrop requires you to approve spending your existing tokens, it's a scam
4. Clone Sites and Typosquatting
Clone sites are pixel-perfect copies of legitimate DeFi protocols and NFT marketplaces. Attackers register domains that look nearly identical to the real thing—using character substitutions (rn instead of m), different TLDs (.co instead of .com), or extra words (app-uniswap.org).
Real examples of typosquatting patterns:
| Real Domain | Phishing Domain (Examples) | Trick Used |
|---|---|---|
| uniswap.org | uniswap.com, un1swap.org | Wrong TLD, character substitution |
| opensea.io | 0pensea.io, opensea-claims.io | Zero for O, added words |
| aave.com | aave-app.com, aave.finance | Added words, different TLD |
| lido.fi | lido-staking.fi, lid0.fi | Added words, zero for O |
Prevention:
- Bookmark every DeFi protocol you use and only access them through bookmarks
- Never click links in search ads—scammers buy Google Ads for clone sites
- Check the URL character by character before connecting your wallet
- Install Wallet Guard browser extension for real-time phishing site detection
- Use SPUNK.CODES as a verified link directory for crypto tools
5. Discord and Telegram Server Compromises
In 2025, over 300 NFT and DeFi project Discord servers were compromised through webhook exploits, bot vulnerabilities, or phished moderator accounts. Once attackers gain control, they post fake mint links, fake airdrop announcements, or fake migration notices—all leading to drainer sites.
Signs of a compromised server:
- Urgent, unscheduled announcements about mints, airdrops, or migrations
- Announcements posted at unusual hours (3 AM in the team's timezone)
- Links to domains you've never seen the project use before
- Announcement channel is suddenly the only active channel (others may be locked)
- The announcement uses urgency language: "ONLY 30 MINUTES LEFT"
Prevention:
- Never click links from Discord or Telegram announcements without verifying on the project's Twitter/X
- Wait at least 15 minutes before acting on any "urgent" announcement
- Cross-reference announcements across multiple official channels
- Disable DMs from server members—this blocks most private message phishing
6. Address Poisoning
Address poisoning is a sophisticated attack that exploits how most people copy-paste wallet addresses from their transaction history. The attacker generates an address that has the same first and last 4-6 characters as your frequently used address (like your exchange deposit address), then sends a tiny transaction from this look-alike address to your wallet.
When you later go to send funds, you might copy the poisoned address from your transaction history instead of the real one, sending your crypto directly to the attacker. This attack has resulted in losses exceeding $70 million across the ecosystem.
Prevention:
- Always verify the FULL address, not just the first and last characters
- Use address book/contacts features in your wallet for frequently used addresses
- Never copy addresses from transaction history—always use the original verified source
- Use a hardware wallet like Ledger Nano X that displays the full address on-device
7. Seed Phrase Phishing
This is the oldest and most straightforward crypto phishing attack: tricking users into revealing their seed phrase (recovery phrase). Despite being well-known, it still works because attackers have become incredibly convincing.
Common vectors:
- Fake "customer support" DMs on Twitter, Discord, or Telegram
- Fake wallet apps on app stores that ask for your seed phrase to "import"
- Fake browser extension updates that prompt for re-entry of seed phrase
- Phishing emails claiming your wallet needs "verification"
- Fake hardware wallet packaging with pre-filled seed phrase cards
Prevention:
- Store your seed phrase offline on metal or paper, never digitally
- Buy hardware wallets only from the manufacturer's official website
- Never enter your seed phrase into any website, app, or form
- Use a steel seed phrase backup for fire and water resistance
8. NFT Offer Phishing
NFT marketplaces like OpenSea, Blur, and Magic Eden send notifications when someone makes an offer on your NFTs. Scammers exploit this by sending fake offer notifications via email that link to drainer sites disguised as the marketplace.
More advanced versions use the marketplace's own features: they create legitimate-looking collection offers or trait offers that, when accepted, trigger a series of transactions including hidden approvals for the victim's other assets.
Prevention:
- Always access marketplaces through bookmarks, never through email links
- Verify offers directly on the marketplace before accepting
- Be suspicious of offers significantly above floor price (used as bait)
- Review all transactions before signing—accepting an offer shouldn't require approving new token spending
Complete Anti-Phishing Checklist
- Bookmark all DeFi sites and only access through bookmarks
- Install Wallet Guard or similar anti-phishing browser extension
- Never click crypto links from DMs, emails, ads, or social media
- Always read transaction details before signing—understand what you're approving
- Use a hardware wallet (Ledger or Trezor) for significant holdings
- Enable hardware 2FA (YubiKey) on all exchange accounts
- Never share your seed phrase with anyone, for any reason
- Revoke stale token approvals monthly using Revoke.cash
- Use a burner wallet for minting, airdrops, and new protocols
- Verify URLs character by character before connecting your wallet
- Disable DMs from unknown users on Discord and Telegram
- Wait 15+ minutes before acting on "urgent" announcements
- Scan contracts with RugTool Scanner before any interaction
What to Do If You've Been Phished
If you believe you've signed a malicious transaction or your wallet has been compromised, time is critical. Follow these steps immediately:
- Revoke all approvals immediately: Go to revoke.cash and revoke every active approval from the compromised wallet
- Transfer remaining assets: Move all remaining tokens and NFTs to a new, clean wallet that has never interacted with any dApp
- Check for permit signatures: If you signed any off-chain messages, those permits may be valid even after revoking on-chain approvals. Transfer assets out of the wallet entirely.
- Document everything: Screenshot your transaction history, the phishing site (if still up), and any communications
- Report the phishing site: Report to Chainabuse.com, the browser vendor (Google Safe Browsing, Microsoft SmartScreen), and relevant project teams
- Alert the community: Post about the scam on Twitter/X to warn others (without sharing the phishing link directly)
Recommended Security Equipment
- Ledger Nano X Hardware Wallet — keeps private keys offline
- YubiKey 5 NFC — hardware 2FA for exchange accounts
- Steel Seed Phrase Backup — fireproof, waterproof seed storage
- Privacy Screen Protector — prevents shoulder surfing in public
Final Thoughts
Phishing attacks succeed because they exploit human psychology, not technology. They create urgency, excitement, or fear to bypass your critical thinking. The best defense is simple: slow down. Never rush a transaction. Never click links from untrusted sources. And always verify before you sign.
Use RugTool to scan any contract before interacting with it. Use SPUNK.CODES as your verified starting point for crypto tools. And remember: if something feels too good to be true in crypto, it almost certainly is.
Stay Protected
Scan any contract before signing. Free, instant, no wallet connection required.
Launch RugTool Scanner →