How to identify onchain scams and secure your wallet

As Web3 continues to evolve at pace, the onchain ecosystem is flourishing, with rising numbers of users participating in onchain transactions and other activities. Simultaneously, various onchain scams are emerging, with fraudsters tricking users into authorizing transactions or revealing their keys to steal assets.

To help users safeguard their Web3 security, OKX offers multi-layered security measures. We also advise users to remain vigilant and educate themselves on the threats out there, especially in high-risk scenarios.

In this article, we'll spotlight some common onchain scam cases, alongside OKX's countermeasures and user recommendations. By the end, you should be wel placed to identify and avoid major Web3 risks.

Induced authorization theft

Gaining authorization maliciously is a common tactic used to commit a Web3 scam. Here, fraudsters would create false authorization transactions to trick users into signing, thereby gaining operational control over the user's assets.

Approval authorization scams

Approval authorization scams see the criminal use methods for stealing authorization from users. Here are two common examples to look out for.

  • Phishing links: Fraudsters share so-called "high-yield" trading information in communities, guiding users to click on links to steal authorization for "deposit mining" or "staking airdrops."

  • OTC disguise: Scammers pose as OTC merchants, asking users to make a small test transfer of $1. This is actually an authorization transaction, granting them control over the user's assets.

OKX Wallet security measures

  • First defense: Malicious detection of login URLs, blocking access if the URL is identified as malicious.

  • Second defense: Intercepting authorization to externally owned accounts (EOA) addresses even if the site isn’t flagged as malicious.

  • Third defense: Blocking authorization to contracts identified as malicious.

  • Fourth defense: For specific networks (such as Tron), intercepting transactions if the signature content and description don't match.

Approval authorization scams example
Source: OKX

Permit and Permit2 authorization scams

Permit and Permit2, introduced by Uniswap to save Gas fees, can be exploited by hackers to trick users into authorizing transactions.

OKX Wallet security measures

  • First line of defense: Clearly displays transaction types as permit authorizations, marking involved tokens, scope of permissions, and expiration times.

  • Second line of defense: Automatically block and prompt users to review transaction risks for potentially risky decentralized application (DApp) requests.

Permit authorization scams
Source: OKX

eth_sign authorization scams

eth_sign allows a user to sign any transaction hash, which is like providing a "blank check" on Ethereum. Fraudsters trick users into using eth_sign to construct custom transactions and steal assets.

OKX Wallet security measures

  • Automatic interception: Automatically identifies and blocks eth_sign transactions due to their high phishing nature.

How to protect yourself

  • Stay vigilant: Don't blindly follow financial advice from social media or group chats, especially those involving unknown links or supposedly high-yield projects.

  • Avoid interacting with unknown contracts: Verify the reliability of contract sources before authorizing them. Interact only with well-known platforms or DApps you fully understand.

  • Refuse unknown transaction signatures: Carefully check the authorization target and amount before approving transactions, especially for "approve" and "increase allowance" operations.

  • Understand new authorization risks: Although new authorizations like Permit and Permit2 save gas fees, they may pose security risks.

Screenshot and screen recording key theft

Scammers also sometimes pose as investment advisors or trading experts to trick new users into revealing their private keys or mnemonic phrases through screenshots or screen sharing.

OKX Wallet security measures

  • First line of defense: Disable screenshot and screen recording on sensitive interfaces and warn users of the risks.

  • Second line of defense: Prevent screen sharing of mnemonic phrases.

How to protect yourself

  • Handwrite and securely store mnemonic phrases: Record mnemonic phrases on paper, avoiding screenshots or electronic storage.

  • Beware of strangers requesting mnemonic phrases: Never share mnemonic phrases with anyone.

  • Avoid remote assistance: Dont' display mnemonic phrases or private keys during remote assistance.

Screenshot and screen recording key theft 1
Source: OKX
Screenshot and screen recording key theft 2
Source: OKX
Screenshot and screen recording key theft 3
Source: OKX
Screenshot and screen recording key theft 4
Source: OKX

Malicious airdrop theft

Fraudsters use malicious airdrops as another way of scamming users. Here, the scammer sends worthless tokens to many addresses, tricking users into interacting with phishing sites to sell these tokens, leading to asset theft.

Malicious airdrop theft
Source: OKX

OKX Wallet security measures

  • Hide suspicious airdrop tokens: Automatically hides suspected malicious airdrop tokens to prevent users from interacting with them.

How to protect yourself

  • Don't interact with unknown airdrop tokens: Be cautious of unknown airdrop tokens and verify their information before interacting.

  • Avoid logging into suspicious sites: Never trust non-official channels for selling tokens that can't be traded on regular platforms.

Similar address scams

Fraudsters create addresses similar to those users interact with, tricking them into transferring assets to the wrong address.

OKX Wallet security measures

  • Highlight similar addresses: We list similar addresses on the transfer page to prompt users to verify the correct address.

Similar address scams
Source: OKX

How to protect yourself

  • Carefully verify transfer addresses: Check the first and last few characters of the address before transferring.

  • Support address labels: Use address labels to quickly identify and avoid errors.

Project team exit scams

Some project teams may misuse user authorizations to transfer assets before disappearing, leaving users with nothing.

OKX Wallet security measures

  • Authorization reminders: Reminds users to cancel unnecessary authorizations for DApps not used for a long time.

Project team exit scams
Source: OKX

How to protect yourself

  • Be Cautious with authorizations: Don't easily authorize DApps or contracts, especially those promising "high returns" or "no risk."

  • Regularly manage authorizations: Regularly check for and cancel DApp authorizations that haven't been used in a long time.

Rug pull scams

Similar to project team exit scams is the rug pull. Here, fraudsters promote tokens to attract users, then manipulate prices higher so they can exit with a massive gain. Meanwhile, users are prevented from selling their assets, causing losses.

OKX Wallet security measures

  • Risk assessment interception: Our built-in engine evaluates token risks and blocks high-risk purchases.

  • Onchain risk detection: Provides risk token detection for supported chains.

How to protect yourself

  • Be aware of rug pull risks: Verify token information on official platforms before purchasing.

  • Avoid following the hype: Stay cautious and don't participate in hype, especially if it's a project you're not familiar with.

The final word

Crypto scams are constantly evolving, presenting traders like you with new threats to understand and mitigate. Taking the time to regularly educate yourself about new risks and how to manage them is key, and we're here to help.

Read our guide on how to spot crypto scams in 2024 for more insight, and check out our wider scam guides to understand other crypto threats.

Avis de non-responsabilité
Ce contenu est uniquement fourni à titre d’information et peut concerner des produits indisponibles dans votre région. Il n’est pas destiné à fournir (i) un conseil en investissement ou une recommandation d’investissement ; (ii) une offre ou une sollicitation d’achat, de vente ou de détention de cryptos/d’actifs numériques ; ou (iii) un conseil financier, comptable, juridique ou fiscal. La détention d’actifs numérique, y compris les stablecoins et les NFT, comporte un degré élevé de risque, et ces derniers peuvent fluctuer considérablement. Évaluez attentivement votre situation financière pour déterminer si vous êtes en mesure de détenir des cryptos/actifs numériques ou de vous livrer à des activités de trading. Demandez conseil auprès de votre expert juridique, fiscal ou en investissement pour toute question portant sur votre situation personnelle. Les informations (y compris les données sur les marchés, les analyses de données et les informations statistiques, le cas échéant) exposées dans la présente publication sont fournies à titre d’information générale uniquement. Certains contenus peuvent être générés par ou à l'aide d’outils d'intelligence artificielle (IA). Bien que toutes les précautions raisonnables aient été prises lors de la préparation des présents graphiques et données, nous n’assumons aucune responsabilité quant aux erreurs relatives à des faits ou à des omissions exprimées aux présentes. Le portefeuille OKX Web3 et ses services auxiliaires ne sont pas proposés par la plateforme d'échange OKX et sont soumis aux Conditions de service de l’écosystème d’OKX Web3.

Articles connexes

Afficher plus
Circle cross-chain transfers thumbnail
Stablecoins
Protocols

Understanding Circle's cross-chain transfer protocol: a comprehensive guide

Have you ever felt restricted by the boundaries of a single blockchain network when managing your assets? With cross-chain token transfers from financial services company Circle, restrictions are a thing of the past. They help break down those sometimes frustrating obstacles so you can move crypto like effortlessly from networks like and Cosmos.
15 juil. 2025
2
OKX Launches Bitcoin Halving-Themed Competitions
Bitcoin

What is the Bitcoin 2024 halving and how could it impact crypto?

April 19, 2024 saw the arrival of the fourth Bitcoin halving event — a significant development affecting the asset's circulation. But what is the Bitcoin halving exactly? According to the Bitcoin white paper , it's a built-in feature of Bitcoin's programming that occurs approximately every four years. This unique event cuts the number of Bitcoins awarded to miners for processing transactions in half. Why does this matter? Well, it's all about supply and control.
15 juil. 2025
Intermédiaire
25
Web3 rewrites social media
Research

Web1 to Web3: The rise of decentralized social media

The evolution of social media has been a fascinating journey. It started in the late 1990s when basic message board platforms and chat rooms dominated. This was a time when users were more concerned w
15 juil. 2025
OKX Bot Trading
Trading guide
Blockchain
Trading basics

A beginner’s guide to IPOs: how cryptocurrency firms can go public

An initial public offering (IPO) is the process of a private company offering its shares to the public for the first time, allowing anyone to buy a stake in the company. This usually occurs when a company is looking to raise capital to fund its growth and expansion plans. IPOs have become increasingly popular among cryptocurrency firms in recent years, as they seek to gain mainstream recognition and credibility. This beginner’s guide will explore the IPO process and provide insights into how cryptocurrency firms can go public.
15 juil. 2025
Débutant
7
Forward Contracts vs. Futures Contracts What Are the Differences
NFT
Artificial intelligence

How generative AI is transforming the NFT space

Just as NFTs swept the scene in 2021 and 2022, AI is the talk of the town today. We've witnessed the evolution ChatGPT has contributed to copy and content, but what about art and digital collectibles?
15 juil. 2025
3
Forward Contracts vs. Futures Contracts What Are the Differences
Research

Consortium blockchains: What you need to know

Blockchain is a type of distributed ledger technology (DLT) that facilitates the sharing and storage of data and information in groups called blocks. The emerging technology has gained substantial pop
15 juil. 2025
5
Afficher plus