Social Engineering in Crypto

Hello Tronics in the forum,
Let learn about social engineering.

In our crypto,NFTs & Web3 space scammers always find new ways to exploit people’s trust. Crypto users must stay vigilant and educated on the latest attack methods to protect themselves from financial losses.

Thanks to @Prince-Onscolo for taking the crypto security lessons very seriously in this forum.
Security tips. do not send any crypto or money to someone to trade on your behalf

  • What is a Social Engineering attack?

Simply a method of manipulating people into revealing information or taking actions that can compromise the security and privacy of crypto networks. It involves exploiting people’s trust, newbies and willingness to believe what they are told.


Social engineering attacks usually consist of two fundamental stages.
A. First, the attacker investigates their target to gain essential background data like potential entry points and vulnerable security protocols required to continue with the attack.

B. Then, they work on winning over the victim’s trust before providing stimuli for actions that violate safety practices — including disclosing confidential details or granting access to vital resources.

  • Social engineering can also involve:-

• Impersonating an authority figure
• Creating false urgency
• Offering rewards
• Using social media platforms to spread misinformation.

  • How does Social Engineering work?

All working very simple. All a hacker must do is convince an unsuspecting, rushed, or trusting individual to follow their instructions with a similar pattern:

• Preparing and investigating targets who have what they’re seeking.

• Infiltrate by forming a relationship that starts by building trust.

• Attack the victim once the trust is established.

•Retreat once the user has taken the desired action.
(This process could be a simple email exchange or even an extended series of conversations taking place over social media)
In the end, could lead to you taking some action — whether that be sharing your personal data with
someone else or exposing yourself to malicious software.

  • Types of Social Engineering:-
  1. Phishing Attack
    These are malicious emails or text messages which are created to look like legitimate emails from reputable companies. The idea is for the hacker to fool you into believing that they’re actually a trusted source, convincing you to give away sensitive information such as passwords and credit card numbers.

  2. Quid Pro Quo attack is a type of baiting trial in which malicious actors offer something to their victims in exchange for confidential data.

By disguising their intent under the guise of generosity, cybercriminals can trick people out of vital details without arousing suspicion.

For example, a hacker could offer to fix a computer issue in exchange for the victim’s email address and password. The unsuspecting user would give away their personal information without realizing who they are giving it to.

  1. Scareware is a type of malicious software that generates false alarms / notifications with display security warnings/popups telling the victim that their computer has been infected with malware, prompting them to download a virus removal program as a solution.

Once downloaded, the “removal tool” turns out to be malware itself, allowing the hacker to gain access to your personal data. It manipulates you into purchasing bogus cybersecurity software or revealing confidential details such as your login credentials.

  1. Pretexting
    involves creating a false scenario, in order to force someone into disclosing sensitive information, the attacker needs to be much more active to get you to believe they are genuine. Once they have your trust, then the exploitation can begin.
  • Who are the main targets of Social Engineering attacks?
    Anybody on the internet using Crypto. **
    ** Maybe me, you or someone by your side.

  • How to identify most types of Social Engineering attacks.?

  • How to prevent Social engineering attacks?
    Let get to share how to identify these, based on
    our own thoughts or experience!.

Let ENGAGE guys.
T for Tron and Thanks.


Very well written.
Yeah we were not hacked but manipulated :joy::joy:

We should take these serious and stay safe.
Thank you too bro


Yes bro.

I just learnt that last night and have been a victim.
So I will share them .

Now I’m like crypto self vigilanter

1 Like

Thanks for such information…


Gracias por esta información, siempre es de utilidad para todos.

1 Like

Hello @Gordian ,

Thank you for initiating this informative discussion on social engineering and its implications in the crypto, NFTs, and Web3 space. It’s crucial for everyone involved in these communities to be aware of the risks posed by social engineering attacks and to take proactive measures to protect themselves. Your breakdown of social engineering, its stages, and types is very insightful.

It’s through these discussions that we can collectively raise awareness and foster a safer online environment for everyone.

Let’s keep engaging, sharing insights, and learning from each other to stay one step ahead of potential threats.

Stay Unmanipulated :sunglasses:


You welcome, Tron Dao forum is one platform you will meet like minds in crypto discussion and awareness.

For doe social engineering, In some cases I will say
You were not scammed, but you were socially manipulate.