Crypto Phishing Scams Drain $46 Million in September 2024

In September 2024, crypto phishing scams drained $46 million from investors, highlighting the growing threat of cybercrime in the cryptocurrency space.

In September 2024, crypto phishing scams resulted in a staggering loss of $46 million, impacting approximately 10,800 victims. The third quarter of the year saw over $127 million stolen from investors, highlighting the growing threat of phishing attacks in the cryptocurrency space.

Key Takeaways

  • Total Losses: $46 million lost in September alone.
  • Victims: Approximately 10,800 individuals affected.
  • Major Attack: The largest single loss occurred on September 28, totaling $32.43 million.
  • Targeted Cryptocurrencies: Ethereum was the primary target, along with Polygon, BNB, and Optimism.

Overview Of Phishing Attacks

Phishing attacks in the cryptocurrency world involve scammers tricking investors into linking their wallets to fraudulent websites. This allows the attackers to withdraw funds without any further authentication. The most common methods include fake accounts on social media platforms and misleading ads on search engines.

Major Incidents In September

The most significant incident occurred on September 28, when a phishing attack utilizing a permit phishing signature drained 12,083 spWETH, amounting to $32.43 million. This incident underscores the sophistication of current phishing tactics and the urgent need for enhanced security measures among investors.

Cryptocurrency Targets

According to Scam Sniffer, the following cryptocurrencies were primarily targeted in phishing scams:

  • Ethereum (ETH): The most affected cryptocurrency.
  • Polygon (MATIC): Another significant target.
  • BNB: Frequently exploited in phishing schemes.
  • Optimism (OP): Also saw notable losses.

The Bigger Picture: Q3 2024 Losses

In the broader context, the total losses from all types of crypto hacks in Q3 2024 exceeded $753 million across 155 incidents. This represents a 9.5% increase in financial damage compared to previous quarters. The Ethereum network alone accounted for 86 of these incidents, costing over $387 million.

Recommendations For Investors

Given the rising threat of phishing attacks, investors are advised to take the following precautions:

  1. Verify URLs: Always double-check website addresses before entering sensitive information.
  2. Be Cautious with Emails: Scrutinize email addresses and avoid clicking on suspicious links.
  3. Use Two-Factor Authentication: Enable additional security measures on wallets and exchanges.
  4. Stay Informed: Regularly update yourself on the latest phishing tactics and scams.

Conclusion

The alarming rise in crypto phishing scams, particularly in September 2024, serves as a wake-up call for investors. With significant financial losses and a growing number of victims, it is crucial for individuals to remain vigilant and adopt best practices to safeguard their assets in the ever-evolving landscape of cryptocurrency.

Sources

[ newsletter ]
Stay ahead of Web3 threats—subscribe to our newsletter for the latest in blockchain security insights and updates.

Thank you! Your submission has been received!

Oops! Something went wrong. Please try again.

[ More Posts ]

Neo4j for Transaction Graphs: Modeling and Cypher
16.12.2025
[ Featured ]

Neo4j for Transaction Graphs: Modeling and Cypher

Explore Neo4j transaction graph crypto use cases, modeling, and Cypher analysis. Learn how to leverage graph algorithms for security insights and real-time processing.
Read article
Python SDK for Wallet Risk: Code Examples
16.12.2025
[ Featured ]

Python SDK for Wallet Risk: Code Examples

Explore the Python SDK for Wallet Risk with code examples. Learn to assess and manage blockchain security effectively.
Read article
Grafana Dashboards for Web3 Security: Panels and Alerts
15.12.2025
[ Featured ]

Grafana Dashboards for Web3 Security: Panels and Alerts

Enhance Web3 security with Grafana dashboards. Learn about essential panels, alerts, and advanced techniques for real-time monitoring and proactive threat detection.
Read article