Ethereum security and scam prevention | ethereum.org (2024)

Rising interest in cryptocurrency brings with it growing risk from scammers and hackers. This article lays out some best practices to mitigate these risks.

Crypto security 101

Level up your knowledge

Misunderstandings about how crypto works can lead to costly mistakes. For example, if someone pretends to be a customer service agent who can return lost ETH in exchange for your private keys, they are preying on people not understanding that Ethereum is a decentralized network lacking this kind of functionality. Educating yourself on how Ethereum works is a worthwhile investment.

What is Ethereum?
What is ether?

Wallet security

Don't give out your private keys

Never, for any reason, share your private keys!

The private key to your wallet is a password to your Ethereum wallet. It is the only thing stopping someone who knows your wallet address from draining your account of all of its assets!

What's an Ethereum wallet?

Don't take screenshots of your seed phrases/private keys

Screenshotting your seed phrases or private keys might sync them to a cloud data provider, which could make them accessible to hackers. Obtaining private keys from the cloud is a common attack vector for hackers.

Use a hardware wallet

A hardware wallet provides offline storage for private keys. They are considered the most secure wallet option for storing your private keys: your private key never touches the internet and stays completely local on your device.

Keeping private keys offline massively reduces the risk of being hacked, even if a hacker gets control of your computer.

Try a hardware wallet:

Double check transactions before sending

Accidentally sending crypto to the wrong wallet address is a common mistake. A transaction sent on Ethereum is irreversible. Unless you know the address owner and can convince them to send you your fund back, you will not be able to retrieve your funds.

Always make sure the address you are sending to exactly matches the desired recipient's address before sending a transaction.It is good practice when interacting with a smart contract to read the transaction message before signing.

Set smart contract spend limits

When interacting with smart contracts, do not allow unlimited spend limits. An unlimited spend could enable the smart contract to drain your wallet. Instead, set spending limits to only the amount necessary for the transaction.

Many Ethereum wallets offer limits protection to safeguard against accounts being drained.

How to revoke smart contract access to your crypto funds

Common scams

It is impossible to stop scammers completely, but we can make them less effective by being aware of their most used techniques. There are many variations of these scams, but they generally follow the same high-level patterns. If nothing else, remember:

  • always be skeptical
  • no one is going to give you free or discounted ETH
  • no one needs access to your private keys or personal information

Twitter ad phishing

There is a method for spoofing Twitter's (also known as X) link preview feature (unfurling) to potentially deceive users into thinking they are visiting a legitimate website. This technique exploits Twitter's mechanism for generating previews of URLs shared in tweets, and shows from ethereum.org for example (shown above), when in fact they are being redirected to a malicious site.

Always check that you are on the right domain, especially after clicking a link.

More information here(opens in a new tab).

Giveaway scam

One of the most common scams in cryptocurrency is the giveaway scam. The giveaway scam can take many forms, but the general idea is that if you send ETH to the provided wallet address, you will receive your ETH back but doubled.For this reason, it is also known as the 2-for-1 scam.

These scams usually stipulate a limited time of opportunity to claim the giveaway to create a false sense of urgency.

Social media hacks

A high-profile version of this occurred in July 2020, when the Twitter accounts of prominent celebrities and organizations got hacked. The hacker simultaneously posted a Bitcoin giveaway on the hacked accounts. Although the deceptive tweets were quickly noticed and deleted, the hackers still managed to get away with 11 bitcoin (or $500,000 as of September 2021).

Celebrity giveaway

The celebrity giveaway is another common form the giveaway scam takes. The scammers will take a recorded video interview or conference talk given a celebrity and livestream it on YouTube - making it appear as though the celebrity was giving a live video interview endorsing a cryptocurrency giveaway.

Vitalik Buterin is used most often in this scam, but many other prominent people involved in crypto are also used (e.g. Elon Musk or Charles Hoskinson). Including a well-known person gives the scammers livestream a sense of legitimacy (this looks sketchy, but Vitalik is involved, so it must be ok!).

Giveaways are always scams. If you send your funds to these accounts, you will lose them forever.

Support scams

Cryptocurrency is a relatively young and misunderstood technology. A common scam that takes advantage of this is the support scam, where scammers will impersonate support personnel for popular wallets, exchanges, or blockchains.

Much of the discussion about Ethereum happens on Discord. Support scammers will commonly find their target by searching for support questions in public discord channels and then sending the enquirer a private message offering support. By building trust, support scammers try to trick you into revealing your private keys or sending your funds to their wallets.

As a general rule, staff will never communicate with you through private, unofficial channels. Some simple things to keep in mind when dealing with support:

  • Never share your private keys, seed phrases or passwords
  • Never allow anyone remote access into your computer
  • Never communicate outside an organization's designated channels

Beware: although support-style scams commonly happen on Discord, they can also be prevalent on any chat applications where crypto discussion happens, including email.

'Eth2' token scam

In the run-up to The Merge, scammers took advantage of the confusion around the term 'Eth2' to try and get users to redeem their ETH for an 'ETH2' token. There is no 'ETH2', and no other legitimate token was introduced with The Merge. The ETH that you owned before The Merge is the same ETH now. There is no need to take any action related to your ETH to account for the switch from proof-of-work to proof-of-stake.

Scammers may appear as "support", telling you that if you deposit your ETH, you will receive back 'ETH2'. There is no official Ethereum support, and there is no new token. Never share your wallet seed phrase with anyone.

Note: There are derivative tokens/tickers that may represent staked ETH (ie. rETH from Rocket Pool, stETH from Lido, ETH2 from Coinbase), but these are not something you need to "migrate to."

Phishing scams

Phishing scams are another increasingly common angle that scammers will use to attempt to steal your wallet's funds.

Some phishing emails ask users to click on links that will re-direct them to imitation websites, asking them to enter their seed phrase, reset their password or send ETH. Others may ask you to unknowingly install malware to infect your computer and give scammers access to your computer's files.

If you receive an email from an unknown sender, remember:

  • Never open a link or attachment from email addresses you don't recognize
  • Never divulge your personal information or passwords to anyone
  • Delete emails from unknown senders

More on avoiding phishing scams(opens in a new tab)

Crypto trading broker scams

Scam crypto trading brokers claim to be specialist cryptocurrency brokers who will offer to take your money and invest on your behalf. After the scammer receives your funds, they may lead you on, asking that you send more funds, so you don't miss out on further investment gains, or they may disappear entirely.

These fraudsters often find targets by using fake accounts on YouTube to start seemingly natural conversations about the 'broker'. These conversations are often highly upvoted to increase legitimacy, but the upvotes are all from bot accounts.

Do not trust internet strangers to invest on your behalf. You will lose your crypto.

Crypto mining pool scams

As of September 2022, mining on Ethereum is no longer possible. However, mining pool scams still exist. Mining pool scams involve people contacting you unsolicited and claiming that you can make large returns by joining an Ethereum mining pool. The scammer will make claims and stay in contact with you for however long it takes. Essentially, the scammer will try to convince you that when you join an Ethereum mining pool, your cryptocurrency will be used to create ETH and that you will be paid ETH dividends. You will then see that your cryptocurrency is making small returns. This is simply to bait you into investing more. Eventually, all of your funds will be sent to an unknown address, and the scammer will either disappear or in some cases will continue to stay in touch as has happened in a recent case.

Bottom line: be wary of people who contact you on social media asking for you to be part of a mining pool. Once you lose your crypto, it is gone.

Some things to remember:

  • Be wary of anyone contacting you about ways to make money off of your crypto
  • Do your research about staking, liquidity pools, or other ways of investing your crypto
  • Rarely, if ever, are such schemes legitimate. If they were, they would probably be mainstream and you will have heard of them.

Man loses $200k in mining pool scam(opens in a new tab)

Airdrop scams

Airdrop scams involve a scam project airdropping an asset (NFT, token) into your wallet and sending you to a scam website to claim the airdropped asset. You will get prompted to sign in with your Ethereum wallet and "approve" a transaction when attempting to claim. This transaction compromises your account by sending your public and private keys to the scammer. An alternative form of this scam may have you confirm a transaction that sends funds to the scammer's account.

More on airdrop scams(opens in a new tab)

Web security 101

Use strong passwords

Over 80% of account hacks are a result of weak or stolen passwords(opens in a new tab). A long combination of characters, numbers and symbols will help keep your accounts secure.

A common mistake is using a combination of a few common, related words. Passwords like this are insecure because they are prone to a hacking technique called dictionary attack.

Example of a weak password: CuteFluffyKittens!Example of a strong password: ymv\*azu.EAC8eyp8umf

Another common mistake is using passwords that can be easily guessed or discovered through social engineering(opens in a new tab). Including your mother's maiden name, the names of your children or pets, or dates of birth in your password will increase the risk of getting hacked.

Good password practices:

  • Make passwords as long as allowed by either your password generator or the form you're filling out
  • Use a mixture of uppercase, lowercase, numbers and symbols
  • Don't use personal details, such as family names, in your password
  • Avoid common words

More on creating strong passwords(opens in a new tab)

Use unique passwords for everything

A strong password that has been revealed in a data breach is no longer a strong password. The websiteHave I Been Pwned(opens in a new tab)allows you to check if your accounts were involved in any public data breaches. If they have,change those passwords immediately. Using unique passwords for every account lowers the risk of hackers getting access to all of your accounts if one of your passwords is compromised.

Use a password manager

Using a password manager takes care of creating strong, unique passwords and remembering them! We strongly recommend using one, and most of them are free!

Remembering strong, unique passwords for every account you have isn't ideal. A password manager offers a secure, encrypted store for all your passwords that you can access through one strong master password. They also suggest strong passwords when signing up for a new service, so you don't have to create your own. Many password managers will also tell you if you have been involved in a data breach, allowing you to change the passwords before any malicious attacks.

Try a password manager:

Use Two-Factor Authentication

You may sometimes be asked to authenticate your identity through unique proofs. These are known as factors. The three main factors are:

  • Something you know (such as a password or security question)
  • Something you are (such as a fingerprint or iris/facial scanner)
  • Something you own (a security key or authentication app on your phone)

UsingTwo-Factor Authentication (2FA)provides an additionalsecurity factorfor your online accounts. 2FA ensures that merely having your password is not enough to access an account. Most commonly, the second factor is a randomized 6-digit code, known as a time-based one-time password (TOTP), that you can access through an authenticator app such as Google Authenticator or Authy. These work as a "something you own" factor because the seed that generates the timed code is stored on your device.

Note: Using SMS-based 2FA is susceptible to

SIM jacking(opens in a new tab)

and is not secure. For the best security, use a service like

Google Authenticator(opens in a new tab)

or

Authy(opens in a new tab)

.

Security keys

A security key is a more advanced and secure type of 2FA. Security keys are physical hardware authentication devices that work like authenticator apps. Using a security key is the most secure way to 2FA. Many of these keys utilize the FIDO Universal 2nd Factor (U2F) standard. Learn more about FIDO U2F(opens in a new tab).

Watch more on 2FA:

Uninstall browser extensions

Browser extensions, like Chrome extensions or Add-ons for Firefox, can improve browser functionality but also come with risks. By default, most browser extensions ask for access to 'read and change site data', allowing them to do almost anything with your data. Chrome extensions are always automatically updated, so a previously safe extension may update later to include malicious code. Most browser extensions are not trying to steal your data, but you should be aware that they can.

Stay safe by:

  • Only install browser extensions from trusted sources
  • Removing unused browser extensions
  • Install Chrome extensions locally to stop auto-updating (Advanced)

More on the risks of browser extensions(opens in a new tab)

Further reading

Web security

Crypto security

Scam education

Test your Ethereum knowledge

Loading...

Was this article helpful?

Ethereum security and scam prevention | ethereum.org (2024)

FAQs

Can you get your ETH back if you get scammed? ›

Typically, when you report a crypto scam, the government will track down the criminals and get your funds back for you. Hence, don't hesitate to work with your government.

How does Ethereum provide security? ›

Smart Contract Audits

Ethereum's platform hosts a vast number of decentralized applications (dApps) and smart contracts. To ensure the security of these applications, they often undergo rigorous security audits and formal verification processes before deployment.

Is the ethereum code safe? ›

Advanced Security Features – 4.6/5: Ethereum Code employs strong encryption and two-factor authentication to safeguard transactions and assets. These security measures ensure that users can trade with confidence, knowing that their information and funds are protected.

How do I report a scam address to ETH? ›

Reporting an address​
  1. Access the address on Etherscan. ...
  2. Locate the 'More Info' section on the right, near the top of the page.
  3. Click the dropdown menu marked 'More' and select 'Report/Flag Address':

Is there any way to recover scammed crypto? ›

Yes, it is possible to recover scammed cryptocurrency with legal action. However, it's essential to understand that crypto scam recovery services are not included in cryptocurrency tracing, which aims only to identify payment paths on the blockchain.

What happens if ETH is a security? ›

It could change how you buy or sell Ethereum

If Ethereum is classed as a security, we'd see much stricter controls on how you can buy and sell Ethereum. One crypto attorney told CoinDesk it would be "devastating" for American investors. For example, centralized cryptocurrency exchanges are not registered with the SEC.

What are the biggest risks to Ethereum? ›

What Are the Challenges of Investing in Ethereum?
  1. High Volatility. Volatility is to cryptocurrency as toppings are to pizza—inseparable. ...
  2. Competition from other blockchains. Competition also poses a threat to your ETH investment. ...
  3. Security Threats. ...
  4. High Gas fees. ...
  5. Regulatory Concerns. ...
  6. Market Sentiment. ...
  7. Liquidity Risk.

Is Ethereum more secure than Bitcoin? ›

Security Comparisons

While both Bitcoin and Ethereum are highly secure thanks to encryption and blockchain technology, both have different approaches towards achieving security. Bitcoin's PoW system deters attacks because it is highly demanding in terms of computing power and energy.

What are the security issues with Ethereum? ›

We can better prepare for and fend off such threats if we know these security issues. Theft and Hacking: Ethereum is vulnerable to theft due to its decentralized structure. The ecosystem's attraction to hackers and cybercriminals increases with its growth.

Is ETH hackable? ›

Cryptocurrencies like Bitcoin and Ethereum are generally considered to be secure due to their use of blockchain technology, which provides a high level of security and transparency. However, they can still be vulnerable to hacking and theft if proper security measures are not taken.

How much will 1 Ethereum be worth in 2030? ›

Ethereum (ETH) Price Prediction 2030

According to your price prediction input for Ethereum, the value of ETH may increase by +5% and reach $ 3,479.04 by 2030.

Who owns the Ethereum code? ›

It is open-source software. Ethereum was conceived in 2013 by programmer Vitalik Buterin. Other founders include Gavin Wood, Charles Hoskinson, Anthony Di Iorio, and Joseph Lubin. In 2014, development work began and was crowdfunded, and the network went live on 30 July 2015.

Should I be worried if a scammer has my address? ›

There are several things that a scammer can do with your address and phone number, which is why you should always be wary when someone asks for this information if you're not sure who they are or what they want. Identity theft is one of the main reasons someone might ask for this information.

Is it safe to give someone your ETH address? ›

You can safely give out your Ethereum address to friends, family, and acquaintances. No one can steal your ethereum using just your Ethereum address. They'd need both your address and the private key to it.

What to do if you accidentally gave a scammer your address? ›

What To Do If You Gave Your Address To A Scammer
  1. Notify Affected Banks or Creditors.
  2. Use a Fraud Alert on Your Credit Report.
  3. Check Your Credit Reports.
  4. Freeze Your Credit.
  5. Report to the FTC (Federal Trade Commission)
  6. Report to the Police.
  7. Remove Fraudulent Information from Your Credit Report.
  8. Change Your Passwords.
Jul 9, 2024

Can you recover funds after being scammed? ›

If you paid by card or PayPal

If you've paid for something you haven't received, you might be able to get your money back. Your card provider can ask the seller's bank to refund the money. This is known as the 'chargeback scheme'. If you paid by debit card, you can use chargeback however much you paid.

Can Ethereum be reversed? ›

Please note that once a transaction has been confirmed on the Ethereum blockchain, it is final and can no longer be sped up, reverted, or canceled.

Can Ethereum be refunded? ›

Ethereum Gas fees in general is non-refundable as they get paid to the validators for their role in Validating the transactions.

Can you recover stolen Ethereum? ›

Yes it possible to trace the flow of funds on the blockchain. However, this process can be complex, costly, and time consuming. Blockchain analysis may require the involvement of specialized professionals or organizations with the expertise and tools to track transactions.

Top Articles
Generating Bearer token for API troubleshooting
How to Repair a USB Flash Drive (Pen Drive) Using CMD
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Doby's Funeral Home Obituaries
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Testberichte zu E-Bikes & Fahrrädern von PROPHETE.
Aaa Saugus Ma Appointment
Geometry Review Quiz 5 Answer Key
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Cvs Sport Physicals
Mercedes W204 Belt Diagram
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Selly Medaline
Latest Posts
Article information

Author: Otha Schamberger

Last Updated:

Views: 6324

Rating: 4.4 / 5 (55 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Otha Schamberger

Birthday: 1999-08-15

Address: Suite 490 606 Hammes Ferry, Carterhaven, IL 62290

Phone: +8557035444877

Job: Forward IT Agent

Hobby: Fishing, Flying, Jewelry making, Digital arts, Sand art, Parkour, tabletop games

Introduction: My name is Otha Schamberger, I am a vast, good, healthy, cheerful, energetic, gorgeous, magnificent person who loves writing and wants to share my knowledge and understanding with you.