This is what I'm wondering. How do you get the typical person to fall for a scam to open a crypto account, buy it, go through kyc, etc
This is what I'm wondering. How do you get the typical person to fall for a scam to open a crypto account, buy it, go through kyc, etc
A friend of a friend (doctor as well) got taken for ~20.000 eur while being kept on the phone for over 6 hours using the "security breach at your bank" story. She said they got her so into the story that she really saw no issues going to the Crypto ATM at the local mall and doing 15 (FIFTEEN!) purchases there because a "police inspector" told her that's the only safe place for her money. They had a fake website where she could "see" her deposits but she was with the guy on the phone and was telling him "I made another deposit" ...
I think they are doing bank transfers directly to the scammers, who give them a FAKE website that shows a crypto balance + great investment returns. I'm not sure crypto is involved at all; it's just the old Spanish prisoner / Nigerian prince scam with a new coat of paint.
>How do you get the typical person to fall for a scam to open a crypto account, buy it, go through kyc, etc
With spam like the below (note that the original contains mostly UTF8 characters to avoid spam filters). I get these every so often on the NOC and postmaster addresses of domains I manage.
It's not even phishing. Just spam blasts to find anyone uninformed enough to believe it, and insecure enough to be afraid of the (empty) "threat":
As you can see, the claims and threats are cartoonish. But folks who aren't tech savvy could be fooled by this.I'd expect that each spam recipient is given a unique BTC address, so that they can be identified for further "blackmail"[0] should they actually comply.
And to clarify, the above message was received by a "postmaster@domain" account on 23 May 2025. And since I've been seeing them for at least a few years I can only assume they are at least occasionally successful.
There are other scams that target folks with bitcoin demands too. Likely with similar claims.
[0] https://malwaretips.com/blogs/ive-recorded-many-videos-of-yo...
> I'd expect that each spam recipient is given a unique BTC address, so that they can be identified for further "blackmail"[0] should they actually comply.
They typically aren't, actually. Most of the time when you enter the wallet address into Blockchair or another BTC transaction monitoring service you'll see tons of payments for the demanded amount having been sent to that sole wallet.
Even thinking of it logistically, its a whole lot easier for a scammer to just send literally the same email to every victim, wait some months, then withdraw the funds from one BTC wallet.
It's such a simple scam, anyone who can make a BTC wallet and send emails could pull it off.
Fair points.
But if you use the same bitcoin address for every email, you won't know who the mark that actually paid was -- potentially leaving money on the table for the future.
I did (before posting the comment to which you replied) check to see if there was any activity[0] on the bitcoin address in the email I posted. There was none. Which strengthened my conclusion (I have no evidence) that unique bitcoin addresses were in use.
But I certainly could be wrong.
[0] https://www.blockchain.com/explorer/addresses/btc/bc1qt30ya4...
[dead]