The Anatomy of a Crypto Scam
This talk analyzes the operational tactics of organized crypto scam syndicates, focusing on social engineering and investment fraud. It details how attackers use fake exchange interfaces and psychological manipulation to deceive victims into transferring funds. The presentation highlights the importance of threat intelligence sharing between platforms and security researchers to disrupt these criminal operations. It also demonstrates the use of automated bot networks to waste scammers' time and collect actionable intelligence.
How Automated Bot Networks Are Turning the Tables on Crypto Scammers
TLDR: Modern crypto scam syndicates are increasingly relying on sophisticated social engineering and fake exchange interfaces to drain victim funds. By deploying custom bot networks, researchers can now waste these attackers' time, gather actionable intelligence like wallet addresses and IP logs, and disrupt their operations at scale. This approach shifts the power dynamic from passive defense to active, automated disruption of fraud infrastructure.
The threat landscape for cryptocurrency users has shifted from purely technical exploits to high-volume, human-centric social engineering. While we often obsess over smart contract vulnerabilities or DApp logic flaws, the most effective attack vector remains the oldest one in the book: convincing a user they are interacting with a legitimate platform when they are actually staring at a pixel-perfect clone.
Organized crime syndicates are now running professionalized call centers that operate with the efficiency of legitimate tech support firms. They use social engineering to guide victims through the process of transferring assets to attacker-controlled wallets. The scale of this problem is staggering, with billions of dollars lost annually to these operations. As security researchers, we need to stop treating these as isolated incidents and start treating them as a targetable infrastructure.
The Mechanics of the Scam
The core of these operations is the fake exchange interface. Attackers build web applications that mirror the look and feel of major exchanges like Kraken or Coinbase. These sites are not just static pages; they are dynamic, interactive environments designed to build trust. When a victim attempts to withdraw funds, the site triggers a fake error message or a "verification" requirement, which then directs the victim to contact a "support agent" via Telegram or a provided phone number.
Once the victim is on the phone, the scammer uses psychological pressure to maintain control. They might claim the account is flagged for suspicious activity or that a withdrawal is stuck in a pending state. The goal is to keep the victim in a state of high anxiety, making them more likely to follow instructions without questioning the legitimacy of the process.
Turning the Tables with Bot Networks
The most effective way to disrupt these syndicates is to increase their cost of operation. If a scammer spends an hour on the phone with a victim, that is an hour they cannot spend on someone else. By deploying automated bot networks, we can force these attackers to interact with non-human agents.
These bots are built using large language models to simulate human conversation, allowing them to engage with scammers for extended periods. The objective is to keep the scammer occupied, extract their infrastructure details, and ultimately frustrate them into abandoning the interaction.
During these interactions, the bots are programmed to:
- Request and collect attacker-controlled crypto wallet addresses.
- Capture IP addresses and metadata from the scammer's communication channels.
- Gather photos or videos if the scammer is forced to perform "human verification" tasks.
This intelligence is invaluable. By feeding these wallet addresses into blockchain analysis tools, we can map out the flow of stolen funds and identify the primary deposit addresses used by the syndicates.
Practical Implementation for Pentesters
For those of us conducting red team engagements or security assessments, this research offers a blueprint for how to handle social engineering threats. When you encounter a phishing site during an engagement, do not just report the URL and move on. If the infrastructure allows, use automated scripts to interact with the site.
A simple Python script using Playwright or similar browser automation can be used to navigate the fake site and trigger the support flow. By containerizing these interactions using Docker, you can scale your efforts, running dozens of concurrent sessions to tie up the attackers' resources.
# Simplified example of a bot interaction flow
from playwright.sync_api import sync_playwright
def interact_with_scam_site(url):
with sync_playwright() as p:
browser = p.chromium.launch(headless=True)
page = browser.new_page()
page.goto(url)
# Trigger the fake withdrawal flow
page.click("text=Withdraw")
# Extract the support contact info
contact_info = page.inner_text(".support-contact")
print(f"Scammer contact info: {contact_info}")
browser.close()
The impact of this work is twofold. First, it provides law enforcement with concrete evidence, including real identities and communication logs, which are often the missing pieces in cross-border fraud investigations. Second, it creates a "denial of service" for the scammers. If their support channels are flooded with bot traffic, their conversion rate drops, and the operation becomes less profitable.
Moving Beyond Passive Defense
Defenders must recognize that these scams are not just technical problems; they are business problems for the attackers. If we can make the cost of acquiring a victim higher than the expected payout, we can force these syndicates to shift their focus.
We need to prioritize the development of automated tools that can detect and interact with these fraudulent interfaces. By sharing the intelligence gathered from these interactions—such as known malicious wallet addresses and infrastructure patterns—we can build a more resilient ecosystem. The next time you find a phishing link, consider how you can use it to gather intelligence rather than just blocking it. The scammers are counting on us to be passive. It is time we start being a much more difficult target.
Vulnerability Classes
Target Technologies
OWASP Categories
Up Next From This Conference
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Kill List: Hacking an Assassination Site on the Dark Web




