Most conversations about crypto scams center on individual victims: people who clicked the wrong link, trusted the wrong token, or responded to a fake giveaway. That picture captures one part of reality — but it leaves out the institutional layer entirely.
Crypto exchanges, OTC desks, and financial institutions face different types of crypto scams: more targeted, more technically sophisticated, and with dramatically higher stakes per incident. A single breach can mean an entire operational wallet is emptied, a counterparty network is disrupted, or a regulatory process that follows the incident for years.
This article breaks down the six most dangerous types of crypto scams for B2B businesses today: what each one is, where it comes from, why it creates significant risks for companies, and what practical steps can be taken right now to address it.
Key takeaways
- Smart contract and bridge exploits account for 64% of all crypto incidents and remain the most frequent attack vector for businesses.
- Malicious approvals produce the highest damage-to-frequency ratio of any attack type, with $1.51 billion lost across a relatively small number of incidents.
- DPRK-affiliated actors are responsible for nearly half of all recorded crypto losses.
- In most incidents, stolen funds move before any public disclosure, leaving compliance teams with a response window measured in minutes.
- Governance failures like FTX do not only damage the platform itself — every counterparty suffers losses.
Common Crypto Scams Targeting Businesses in 2026
According to Global Ledger's research across 255 incidents in 2025, total crypto losses reached $4.04 billion. In April 2026 alone, hackers stole $641.67 million across 25 major cases analyzed by Global Ledger. It is the highest monthly total this year and one of the largest since the Bybit hack.
Below is a crypto scams list of the six types that create the highest risk for B2B platforms today.
1. Malicious Approvals
Malicious approval attacks target the authorization process rather than the blockchain itself. Attackers either embed a fake interface into a platform's transaction approval process or manipulate the underlying transaction details within a multisig flow — so the person responsible for signing sees what appears to be a legitimate transaction, but is actually authorizing something entirely different.
The mechanism is as follows: the attack doesn't need to break cryptography. It just needs the person holding the keys to approve the wrong thing.
What do the crypto scams statistics show?
According to Global Ledger's analysis of 255 hacks in 2025:
-
Malicious approvals represented 11.76% of all incidents.
-
They generated $1.51 billion in losses — the highest damage-to-frequency ratio of any attack type.
-
That figure is significantly influenced by the Bybit exploit (~$1.46 billion), which involved a malicious approval component during a routine hot-to-cold wallet transfer.
Where is the main risk hidden?
Individual users don't run multisig approval workflows or internal signing environments that control company funds. This attack vector is built specifically around corporate authorization processes. The failure doesn't happen on the blockchain — it happens in the trust placed in the interface.
Case example: WazirX (2024)
In the WazirX incident, operators saw a legitimate transaction in their Liminal interface. What was actually authorized was different. Over $230 million was lost because the team verified what the screen showed, not what the underlying transaction contained.
What you can do now to minimize the risk
- Require independent, off-system verification of every high-value transaction with all transaction details.
- Treat wallet infrastructure vendors as operational counterparties, not utility services.
- Never rely on a single interface layer as the final check on a high-value transfer.
2. Smart Contract and Bridge Exploits
Smart contract exploits target logical vulnerabilities in on-chain code: DeFi protocols, bridge contracts, and external protocol dependencies. Attackers identify a flaw — often quietly, sometimes weeks in advance — and then execute a fast, large-scale drain.
Bridge exploits specifically target cross-chain messaging layers, where validation logic is more complex and historically less audited than single-chain protocols. This is one of the most commonly occurring types of hacks.
What do the crypto scams statistics show?
According to Global Ledger's research:
-
Smart contract exploits accounted for approximately 64% of 255 crypto hacks last year — the most frequent attack vector by incident count.
-
They caused $861.54 million in total losses.
-
In April 2026 alone, KelpDAO lost $293 million through a LayerZero bridge exploit — with full fund consolidation completed in under 2 hours.
Where is the main risk hidden?
VASPs commonly hold liquidity in DeFi protocols and depend on bridges for cross-chain operations. This creates direct capital exposure: when the protocol is exploited, the business's funds are at risk.
Bridge attacks also create multi-chain complexity: losses spread across Ethereum, Arbitrum, Solana, and other networks simultaneously, which slows coordinated response.
Case example: KelpDAO & Drift Protocol (April 2026)
Both hacks are confirmed smart contract and bridge exploits — among the largest of 2026. In the KelpDAO case, attackers exploited LayerZero's cross-chain messaging layer, draining approximately $293 million, with stolen funds fully consolidated into the attacker's wallet in under 2 hours.
In the Drift Protocol case, the attacker spent 9 days preparing — obtaining multisig control over protocol permissions, pre-signing transactions — before draining more than 15 different asset types in approximately 10 seconds. Together, these two incidents accounted for roughly 88% of all April 2026 losses.
What you can do now to minimize the risk
- Continuously monitor protocols and bridges with KYT solutions where your platform holds liquidity or routes transactions.
- Flag cross-chain activity as higher risk by default.
- Configure alert thresholds for unusual fund movements.
- Update risk models with bridge- and mixer-specific patterns.
3. Private Key Compromise
The private key compromise vector doesn't attack the blockchain — it attacks the credentials that control access to it. Attackers obtain private keys, seed phrases, or API keys through credential theft, internal security failures, or compromised infrastructure. Once they hold the keys, they hold the wallet. And they move immediately.
What do the crypto scams statistics show?
According to Global Ledger's research:
-
Private key compromises accounted for 13.33% of 255 incidents last year.
-
They caused $959.68 million in losses.
-
DPRK-affiliated actors rely heavily on this vector — particularly when targeting centralized exchanges — and were responsible for approximately $1.89 billion, or 46.8% of all losses.
-
In H2 2025, the share of DPRK-linked attacks specifically targeting CEXs increased from approximately 40% to over 83%, according to the Global Ledger data.
Where is the main risk hidden?
Centralized exchanges are the primary target because they concentrate high-value credentials in operational environments. One compromised key can expose the entire hot wallet balance.
The Bybit, Coincheck, KuCoin, and BtcTurk incidents all involved private key or hot wallet credential compromise as part of the attack chain.
Case example: BtcTurk (2024).
In June 2024, BtcTurk disclosed unauthorized withdrawals from its hot wallets affecting 10 assets, with losses estimated at approximately $55 million. What makes this case particularly instructive for compliance teams is not the breach itself but what happened after.
Global Ledger traced the stolen funds through a multi-stage laundering path: self-hosted wallets, CoinJoin, Wasabi Wallet, THORChain, Chainflip, and the Lightning Network. The real control failure continued long after the initial breach, in the limited ability to detect and respond once the funds began moving across multiple stages.
This suggests that money laundering has become more staged and fragmented, making it even harder to follow the trail
Check the BtcTurk case in the Global Ledger tracing tool.
What you can do now to minimize the risk
- Minimize hot wallet exposure; enforce strict segmentation between operational funds, company reserves, and customer assets.
- Apply behavioral monitoring to signing patterns — not only blacklist-based screening.
- Treat key-management infrastructure as a primary risk surface, with the same controls applied to critical systems.
4. Rug Pulls and Ponzi Schemes
A rug pull occurs when a project's developers attract funds — from liquidity providers, investors, or users — and then withdraw everything and disappear. The project may appear functional and even generate early returns before the exit. By the time the withdrawal happens, the funds are gone and the team is unreachable.
Ponzi schemes follow a different structure but arrive at the same outcome. They generate returns for early participants using funds from new ones, creating the appearance of a legitimate investment product. The scheme holds together only as long as new capital keeps coming in — and collapses the moment it doesn't.
Both rely on the same fundamental gap: the people running the scheme know it's fraudulent; the businesses and users providing funds do not. Among the most typical crypto scams in this category, rug pulls and Ponzis remain persistently active despite growing market awareness.
What do the crypto scams statistics show?
According to Global Ledger's research:
-
Rug pulls represented 4.71% of 255 incidents last year.
-
They caused $524.10 million in losses, though losses fell more than 5× in H2 compared to H1 2025 — suggesting increased market awareness or earlier exit timing by attackers.
Where is the main risk hidden?
For B2B platforms, the exposure is primarily through counterparty risk. Exchanges that list or provide liquidity for fraudulent projects can face regulatory questions, user claims, and reputational consequences. OTC desks and liquidity providers that onboard rug-pull tokens before the exit can end up holding worthless assets. It can be even worse: facilitating laundering flows from the fraud without realizing it.
Case example: BitConnect (2018)
BitConnect operated as a global Ponzi scheme, promising guaranteed returns that were paid out using funds from new investors. When it collapsed, exchanges that had listed the token faced immediate user claims and reputational consequences with no prior warning.
What you can do now to minimize the risk
- Apply KYB-level sanctions screening to new counterparties before providing liquidity or listing.
- Monitor on-chain concentration and developer wallet behavior for early exit signals.
- Maintain documented due diligence trails for any asset or project onboarding decision.
5. Governance Failures & Internal Fraud
This category is not a technical hack but an institutional failure. Governance breakdowns occur when internal controls are weak enough that insiders can misappropriate funds, hide liabilities, or grant hidden privileges to related entities.
The fraud typically runs undetected until the platform approaches financial collapse or external scrutiny forces disclosure.
What do the crypto scams statistics show?
-
FTX's 2022 collapse revealed an $8 billion+ customer fund shortfall — assets had been quietly used by affiliated entity Alameda Research for margin trading, investment, and executive compensation, enabled by hidden system-level privileges.
-
Mt. Gox's 2014 collapse involved approximately 650,000 BTC lost over years of unreported reconciliation failure — undetected because internal auditing was effectively absent.
Where is the main risk hidden?
This is the only scam type that doesn't primarily damage the fraudulent platform itself. It damages every B2B counterparty that has exposure to it.
Governance failures are arguably the most dangerous crypto scams for B2B precisely because they cannot be detected through blockchain monitoring alone. They require enhanced counterparty due diligence, meaningful proof-of-reserves verification, and ongoing oversight of related-party structures.
Case example: FTX (2022)
Every business that had active exposure to FTX — as a trading partner, lender, or liquidity provider — faced direct losses when the platform collapsed. None of this was visible from the outside until it was too late.
What you can do now to minimize the risk
- Treat major counterparties as active risk exposures requiring ongoing KYB verification — not one-time onboarding checks.
- Look for signals of hidden liabilities: inconsistent reserve disclosures, undisclosed related-party relationships, irregular governance structures.
- Avoid having critical operational dependencies — settlement, liquidity, custody — concentrated in a single counterparty whose governance you cannot independently verify.
6. Impersonation & Crypto Recovery Scams
Impersonation scams targeting businesses work differently from retail phishing. Fraudsters copy the branding, domain, and documentation of legitimate blockchain analytics firms to target victims of prior crypto losses. They pretend to be fund recovery specialists, legal representatives, or compliance service providers.
For businesses specifically, the attack surface is different. Operational and compliance staff can be approached through spoofed vendor communications, fake compliance service offers, or fraudulent outreach impersonating law firms or investigators.
There is a structural reason why this happens: the firms best positioned to help after a breach — blockchain analytics companies with forensic capabilities — are also the ones most often impersonated. Their credibility is precisely what makes copying their brand name effective.
When a scam operation presents itself under a trusted name, the victim doesn't verify further. They pay. And the real firm bears the reputational cost of an incident it had no part in.
What do the crypto scams statistics show?
-
According to the Global Ledger research, only approximately 7% of stolen funds ($263 million) were actually returned across 255 incidents last year.
-
Nearly $2 billion of stolen funds remained unspent — not yet moved or cashed out — creating a large pool of assets that users and companies still hope to recover. That gap between expected and realistic recovery outcomes is exactly where recovery scammers operate.
-
The FBI received 181,565 cryptocurrency fraud complaints totaling more than $11 billion last year — a 22% increase from 2024 — and has issued three successive warnings specifically about fake crypto recovery services.
Where is the main risk hidden?
Three parties are affected simultaneously, and that is what makes this scam type structurally damaging rather than just costly.
The victim has already lost funds and is now searching for help under time pressure — the exact conditions that reduce caution and increase willingness to trust quickly.
The legitimate firm being impersonated loses trust it didn't damage, because every person defrauded through the fake site associates the experience with the real brand.
And the industry as a whole loses a critical layer of trust: the people most in need of blockchain forensics support become reluctant to engage any firm that claims to offer it.
This impersonation fraud pattern affected Global Ledger directly.
A fraudulent website was registered to impersonate the company. A spoofed email campaign followed, using copied branding to instruct recipients to take wallet actions. Both were identified and reported promptly. Users were notified through official channels as quickly as possible.
But the pattern itself is not unique to one firm; it reflects a deliberate and documented trend across the blockchain analytics space.
What you can do now to minimize the risk
- Set up monitoring for domain variations of your own brand and key vendor brands.
- Train operational and compliance staff to verify vendor identities through direct channels — never through links sent inbound.
- Establish a clear internal protocol for how third-party service providers are engaged after an incident.
- If you identify impersonation of your brand or a vendor you rely on: act fast, document the fraudulent domain or communication, notify affected users through official channels directly, and report to the relevant authorities.
Crypto Recovery Scams: How They Work & How to Stay Safe
Examples of Crypto Scams Creating the Highest B2B Risk
Knowing the types is one layer of understanding. Seeing how they have played out — historically and recently — is another.
The following cases represent the highest-impact incidents in crypto history, mapped to the scam types described above. The table runs from the most recent to the oldest, with the specific compliance and B2B risk each case created.
Top 6 historical incidents that matter for crypto businesses
|
Incident
|
Year
|
Type
|
Loss
|
Key B2B Risk
|
|---|---|---|---|---|
|
FTX
|
2022
|
Exchange collapse / fraud
|
>$8B shortfall
|
Counterparty collapse with no external warning
|
|
Ronin Network
|
2022
|
Bridge / validator compromise
|
~$540M
|
Simultaneous multi-chain, multi-asset exposure for every connected counterparty
|
|
Poly Network
|
2021
|
Cross-chain exploit
|
~$610M
|
Bridge interoperability flaw triggered emergency asset freezes across multiple chains
|
|
KuCoin
|
2020
|
Private key compromise
|
>$275M
|
Compromised hot wallet keys exposed the entire operational balance at once
|
|
Coincheck
|
2018
|
Private key compromise
|
~$530M
|
Entire balance in a single hot wallet with no multisig
|
|
Mt. Gox
|
2014
|
Governance failure
|
~650K BTC
|
Years of undetected reconciliation failure
|
Top 10 Biggest Crypto Scams in History That Created the Highest B2B Risk
Top 7 recent incidents (2024-2026) that matter for crypto businesses
|
Incident
|
Year
|
Type
|
Loss
|
Key B2B Risk
|
|---|---|---|---|---|
|
KelpDAO
|
2026
|
Bridge / smart contract exploit
|
~$293M
|
Fast laundering with full fund consolidation in just 2 hours
|
|
Drift Protocol
|
2026
|
Bridge / smart contract exploit
|
~$285M
|
9-day preparation with ~$285M drained in approximately 10 seconds
|
|
Grinex
|
2026
|
Private key compromise
|
~$19.4M
|
Sanctioned exchange and A7A5 flows that can target CEXs directly
|
|
Bybit
|
2025
|
Malicious approval / private key
|
~$1.5B
|
Funds fragmented and bridged before public disclosure
|
|
DMM Bitcoin
|
2024
|
Social engineering / private key
|
~$305M
|
Trusted internal workflow exploited through a compromised vendor employee
|
|
WazirX
|
2024
|
Malicious approval
|
>$230M
|
Vendor interface mismatch led to $230M unauthorized transfer
|
|
BtcTurk
|
2024
|
Exchange hot-wallet breach
|
~$55M
|
Hot wallet breach with fragmented multi-chain laundering path
|
Hackers Steal $642M in April, Set 2026 Record
Conclusion
The landscape of crypto scams has changed in ways that matter directly to businesses. The most dangerous types of crypto scams today are deliberate, technically sophisticated, and often specifically designed to exploit the exact processes that companies rely on: signing flows, approval chains, bridge infrastructure, and counterparty relationships.
For exchanges, VASPs, and financial institutions, awareness of the most common crypto scams is the starting point, not the defense. The practical layer is continuous monitoring, multi-hop tracing capability, counterparty due diligence, and clear escalation procedures.
While laundering has become faster and cheaper, compliance has not kept pace. Global Ledger closes that gap with real-time monitoring, cross-chain visibility, and enhanced due diligence that cover the full picture behind transactions and entities.
Quiet risk is harder to spot. Preparation helps — and you don't have to do it alone.
FAQ
What are 5 of the most current scams?
Based on Global Ledger's research, the most active types of crypto scams targeting businesses right now are: smart contract and bridge exploits, private key compromise, malicious approval and signing flow attacks, rug pulls and Ponzi schemes, governance failures and internal fraud, and impersonation scams targeting compliance and operations teams through fake vendor domains and spoofed communications.
What are the most common types of crypto scams?
By incident frequency, smart contract exploits are the most common types of crypto scams, accounting for approximately 64% of 255 hacks last year. By financial damage per incident, malicious approvals produce the highest losses ($1.51 billion) relative to how often they occur. Private key compromises are the primary vector for state-sponsored attacks on centralized exchanges and have caused $959.68 million in losses.
How can you tell if someone is a crypto scammer in a B2B context?
Warning signs vary by scam type: inconsistent reserve disclosures signal governance risk, interface mismatches point to malicious approvals, and unsolicited recovery offers often indicate impersonation. The common thread across all of them — if a workflow, communication, or counterparty requires you to trust without verifying, that is the moment to slow down.
What percentage of crypto projects are scams?
There is no single authoritative figure showing the percentage of crypto projects that are scams today. However, the structural risk is persistent. Global Ledger's research shows that only approximately 7% of stolen funds were actually returned across 255 incidents analyzed. For compliance teams, this means many new projects carry higher risk, and due diligence is essential at onboarding.