Common Wallet Scams: Fake Support, Fake Apps and Recovery Phrase Theft
Learn common wallet scam patterns including fake support, fake apps, phishing pages, clipboard malware, remote access, and recovery phrase theft.
Fake support
Scammers impersonate wallet brands and ask for recovery words or remote access.
Fake apps
Cloned wallet apps and download pages can steal backups or approvals.
Phishing and malware
Bad links, clipboard swaps, and approval traps can redirect funds.
The most common wallet scam patterns
Wallet scams usually target moments of confusion: a zero balance, failed transaction, stuck firmware update, lost recovery phrase, or urgent support search.
Compare brand-specific warnings for Ledger recovery phrase requests and Trezor recovery phrase requests.
Fake support
A helper promises recovery, asks for a seed phrase, or moves the conversation to private chat.
Fake apps
A cloned app or download page asks for phrase entry outside the official restore flow.
Clipboard malware
The copied address is replaced before you send funds.
Approval phishing
A site asks for wallet approvals that do not match what you intended to do.
How to respond safely
Stop interacting with the suspicious page or chat, save evidence, verify official sources from a clean browser session, and avoid entering seed words or private keys anywhere.
If the scam appeared during an update, read the firmware update guide. If the phrase may be exposed, review recovery phrase safety immediately.
Scam alert
Guaranteed wallet recovery claims are dangerous
No outside service can safely guarantee recovery of a self-custody wallet if it needs your recovery phrase, private key, or remote access.
- Recovery fees
- Seed phrase checks
- Remote access
- Fake official accounts
People Also Search
Related Problems
Related Guides
FAQ
Common Questions
Can a wallet recovery service get funds back?+
Be careful. Anyone asking for your recovery phrase, private key, payment upfront, or remote access is a serious risk.
How do fake wallet apps steal funds?+
They may ask for seed words, change transaction details, or trick users into unsafe approvals.
What is clipboard malware?+
Clipboard malware can replace a copied wallet address with an attacker's address before you send funds.
What should I do after a wallet scam?+
Stop sharing details, save evidence, secure devices and accounts, and use official wallet safety resources before moving funds.