💎 Scam Guide · 2026 · Everywhere

Telegram Crypto Pump & Wallet-Drainer Scams: 5 Variants and the Never-Connect-Wallet Rule

Wallet drainers stole roughly $500 million in crypto in 2024 per Scam Sniffer tracking. Inferno Drainer alone stole $80M+ from 134,000 victims through 2022-23 before claiming shutdown; it resurged in late 2024 and dominated 2024 with 40-45% market share of crypto-drainer hits. Solidus Labs documented the PumpCell Telegram ring generating $800,000 in October 2025 alone via coordinated pump-and-dump operations. Five variants — Telegram pump-and-dump, wallet drainer (Inferno-style), fake Telegram support channels, fake airdrop, fake trading-bot / signal-group subscriptions. Real Reddit stories, SEC + Group-IB + Scam Sniffer verified, and the never-connect-wallet rule that defeats them all.

💬 Channels: Telegram · Discord · X · Fake Web3 sites 📅 Updated May 2026 📑 5 variants documented ⭐ SEC · Group-IB · Scam Sniffer · Solidus Labs verified
🎯 Target: Crypto wallet holders, especially Web3 / NFT users 📈 Wallet drainers 2024: $500M stolen 📉 Inferno Drainer: $80M+ across 134K victims
📖 8 min read

📌 The 30-Second Version

Crypto wallet drainers stole $500M in 2024 per Scam Sniffer. Inferno Drainer — the most prominent "scam-as-a-service" kit — stole $80M+ from 134K victims through late 2023, then resurged with 40-45% market share in 2024. Telegram pump-and-dump rings (PumpCell, multiple micro-cap operators) extracted $800K+ in single months. Five variants concentrate the fraud: (1) Telegram pump-and-dump synchronized buying / dumping of micro-cap tokens; (2) wallet drainer kits (Inferno-style) deployed via fake Web3 sites and Discord phishing; (3) fake Telegram support channels impersonating real crypto projects; (4) fake airdrops requiring wallet-connect signatures; (5) fake trading-bot / signal-group subscription scams. The unifying defense fits in one rule: never connect your wallet or sign any transaction at the request of an unsolicited message. Use a hardware wallet for non-trivial holdings; audit approvals via Revoke.cash quarterly.

⚡ Quick Safety Rules

🪞 Is this Telegram crypto offer a scam? — 30-second self-check

Two or more "yes" answers and the answer is yes.

  1. Did the offer arrive via unsolicited Telegram DM, Discord ping, or X reply?
  2. Does it require you to connect your wallet or sign a transaction to claim something free?
  3. Is a "trading bot" or "whale signal" promising guaranteed returns?
  4. Is the "support agent" asking for your seed phrase or private key?
  5. Is the channel name a lookalike of a real crypto project's official channel?

2+ yes: Crypto scam. Don't connect, don't sign, don't subscribe. Use Revoke.cash to audit. → Skip to What to Do

Jump to a Variant

  1. High Telegram Pump-and-Dump
  2. High Wallet Drainer (Inferno-Style)
  3. High Fake Telegram Support Channels
  4. High Fake Airdrop (Wallet-Connect Phishing)
  5. Med Fake Trading-Bot / Signal-Group Subscription

What These Scams Actually Are

Telegram crypto pump-and-drainer scams share a single structural feature: exploit the irreversibility of blockchain transactions. Once a victim signs a malicious transaction, the funds are gone — there is no chargeback, no fraud reversal, and almost no recovery path. The variants differ in how they engineer the malicious signature, but the underlying mechanic is identical.

🔑 The single rule that defeats every variant — never connect your wallet or sign at unsolicited request

Real Web3 projects do not push wallet-connect requests via DM, do not run airdrops that require signatures to claim, and do not have support agents that ask for seed phrases. You initiate, never accept. Combined with a hardware wallet (Ledger, Trezor) and quarterly Revoke.cash audits, the rule defeats every drainer variant on this page. The protective architecture is mature and freely available; the gap is consumer adoption.

The 5 Variants

Variant #1
High Severity
Telegram Pump-and-Dump
💬 Channel: Telegram channels labeled 'pump signals,' 'whale alerts,' 'crypto VIP,' or similar. Members synchronize buy orders on a target micro-cap token at announcement time. Insiders (channel operators) exit at peak. Late buyers lose when the dump cascades. SEC + CFTC have brought enforcement actions since 2021. Solidus Labs 2025 investigation: PumpCell ring generated $800K in October 2025 alone.
Telegram Pump-and-Dump — comic illustration

A coordinated Telegram group announces a target micro-cap token at a specific time. Members synchronize buy orders to inflate price; insiders dump at peak. Late buyers lose when the cascade reverses. Per Solidus Labs investigation, the PumpCell Telegram ring generated $800,000 in October 2025 across multiple micro-cap tokens.

A representative case from Solidus Labs' 2025 investigation: PumpCell, a Telegram-based pump-and-dump operation, orchestrated synchronized token launches and sniper-bot buys that inflated micro-cap tokens to seven-figure valuations within minutes. Members paying $50-$200/month for "VIP signals" received the announce-and-buy timing milliseconds before the public channel; insiders had already pre-purchased and were in position to exit at peak. Within 5-15 minutes of the announce, the price spiked, insiders sold, and the price collapsed. Members who joined the buy were left with worthless tokens. Total investigated activity in October 2025: $800,000.

The SEC and CFTC have pursued pump-and-dump organizers under existing securities-fraud and commodities-fraud statutes since at least 2021. The structural problem is enforcement scope — Telegram operators frequently use offshore channels and crypto-only payments, making jurisdiction murky. The protective rule for individual investors is simpler than the enforcement architecture: any "guaranteed pump" or "whale signal" Telegram channel is a fraud. Real legitimate trading does not work via coordinated synchronized buying.

What stops it is refusing to participate. Don't pay for Telegram signal groups. Don't synchronize buys with anyone. Don't believe "guaranteed" anything in crypto. If you've been a victim, document the transactions and report at SEC TCR (Tips, Complaints, and Referrals), FTC ReportFraud, and FBI IC3.

Red Flags

  • Telegram channel offering "VIP signals" or "whale alerts" for a paid subscription
  • "Guaranteed" returns or "100x in minutes" claims
  • Synchronized buy time announcements
  • Micro-cap tokens with no project-team transparency

Defenses

  • Don't pay for any Telegram signal group
  • Don't synchronize buys with strangers
  • Treat "guaranteed" as the diagnostic for fraud
  • Report at SEC TCR + FTC + IC3 if scammed

Typical Money Demanded

$50–$500/month subscription + $1,000-$10,000 in pump-trapped buys per victim · PumpCell: $800K in October 2025 alone.

— The second variant is structurally larger. Wallet drainers operate as scam-as-a-service, distributed across hundreds of phishing kits. —

Variant #2
High Severity
Wallet Drainer (Inferno-Style)
💬 Channel: Fake Web3 sites mimicking 100+ legitimate crypto projects (Uniswap, OpenSea, MetaMask, Phantom, etc.). Distributed via X/Twitter ads, Discord pings, Telegram DMs, fake search-engine ads. Inferno Drainer (and successors) operates as scam-as-a-service: low-skill scammers pay 20-30% of stolen funds for the phishing kit. Per Group-IB, Inferno stole $80M+ from 134K victims in 2022-23 alone; resurged with 40-45% market share in 2024.
Wallet Drainer (Inferno-Style) — comic illustration

A "scam-as-a-service" wallet-draining malware kit (most famously Inferno Drainer) deploys fake Web3 sites mimicking legitimate crypto projects. Users connect their wallet and sign a transaction that grants the attacker authority to drain tokens. Per Scam Sniffer 2024 data, wallet drainers stole roughly $500 million across 2024; Inferno alone accounted for 40-45% of all drainer hits.

A representative case: a user clicks an X / Twitter advertisement promoting a "Uniswap V4 early access airdrop." The link routes to a site that visually matches Uniswap's official UI, with a "Claim Airdrop" button. The user clicks; a wallet-connect prompt appears (looks like the legitimate MetaMask/WalletConnect modal); the user clicks "Connect" and signs a transaction labeled "Approve" that they believe is the airdrop claim. The signature actually grants unlimited token-transfer authority to the drainer's smart contract. Within seconds, the drainer extracts every fungible token from the user's wallet — often $5,000-$500,000 depending on holdings. The user has no recourse; blockchain transactions are irreversible.

Inferno Drainer's operation through 2023 stole $80M+ from 134K victims per Group-IB. The operators announced a Telegram-channel shutdown in November 2023, but a sophisticated phishing campaign abusing Discord brought the same kit back in 2024 with even larger market share. Per Check Point Research, Inferno's 2024 resurgence accounted for 40-45% of all drainer activity that year.

What stops it is hardware-wallet discipline + approval auditing. Use a hardware wallet (Ledger, Trezor) for any non-trivial crypto holdings — hardware wallets require physical button-press confirmation per transaction, and the on-device display shows the actual transaction details (not the website's claim). Audit approvals quarterly via Revoke.cash and revoke any approvals you don't actively use. The combination defeats most drainer variants because the hardware wallet refuses to sign anything not visible on its screen.

Red Flags

  • "Free airdrop" or "early access" claim requiring wallet-connect
  • X / Twitter ad routing to a Web3 site you didn't search for
  • Site URL is a lookalike of the real project (uniswap-airdrop.com vs uniswap.org)
  • Wallet-connect prompts a transaction labeled "Approve" with unclear scope

Defenses

  • Hardware wallet (Ledger / Trezor) for non-trivial holdings
  • Revoke.cash quarterly audit + revoke unused approvals
  • Type project URLs directly; never click X / Discord airdrop links
  • If drained: move remaining funds to fresh wallet + revoke all approvals

Typical Money Demanded

Whatever's in the wallet: $500-$500,000+ per drained wallet · Inferno cumulative: $80M+ from 134K victims · Wallet drainers 2024: $500M total.

— The third variant attacks users who already use crypto correctly — they go to support channels for help and get fake support instead. —

Variant #3
High Severity
Fake Telegram Support Channels
💬 Channel: Lookalike Telegram and Discord channels mimicking real crypto-project support. Scammers monitor real official channels for users with questions, then DM them inviting them to the fake support channel. The fake support agent walks the user through "troubleshooting" that culminates in wallet-connect or seed-phrase disclosure. Per Cybernews 2025, fake support channels are one of the most prevalent Inferno Drainer distribution vectors.
Fake Telegram Support Channels — comic illustration

Fake lookalike Telegram / Discord channels mimic real crypto-project support. Scammers DM users from real channels and invite them to the fake support channel, where the "support agent" walks them through wallet-connect or seed-phrase disclosure. Real support NEVER asks for your seed phrase or private key under any circumstances.

A representative case: a MetaMask user posts in the official MetaMask Discord asking why a transaction failed. Within minutes, a DM arrives from a user with "MetaMask Support" branding offering to help in a private channel. The user clicks the channel invite; the channel name is "MetaMask Help Desk" (not "MetaMask Official"), but the branding looks identical. The fake agent walks the user through a "wallet recovery procedure" that requires entering the 12-word seed phrase into a "secure verification form." The user enters the seed; the attacker uses it to import the wallet on their own device and drains every asset within seconds.

The protective rule is the most absolute one in crypto. No legitimate crypto support — MetaMask, Phantom, Coinbase, OpenSea, Uniswap, none of them — will ever ask for your seed phrase, private key, or wallet password under any circumstances. The request itself is the diagnostic for impersonation, regardless of how plausible the framing. Real support troubleshooting is done through the application itself (logs, error messages, settings) without ever requiring seed-phrase disclosure.

What stops it is the no-seed-phrase rule plus channel verification. Verify Telegram / Discord channel names against the project's official website before joining. Never enter your seed phrase anywhere outside the wallet's own UI on your trusted device. Real seed phrases are entered exactly once — when you first restore a wallet — and never again for "verification" or "recovery."

Red Flags

  • DM invitation to a "support channel" after posting in official channel
  • Channel name is a lookalike (MetaMask Help vs MetaMask Official)
  • "Support agent" asks for seed phrase, private key, or wallet password
  • "Verification form" requesting wallet credentials

Defenses

  • Verify channel names via project's official website before joining
  • Real support never asks for seed phrase / private key — the request is the diagnostic
  • Real support is done in-app via logs / error messages
  • If exposed seed: move funds to fresh wallet immediately + revoke approvals

Typical Money Demanded

Whatever's in the compromised wallet · seed-phrase disclosure = total wallet compromise.

— The fourth variant frames the drainer as a free gift. The "claim" page is the drainer's signature surface. —

Variant #4
High Severity
Fake Airdrop (Wallet-Connect Phishing)
💬 Channel: X / Twitter posts, Telegram channels, Discord pings, email campaigns announcing a "free token airdrop" requiring wallet-connect to claim. The connection grants drainer signature authority. Real airdrops typically require no wallet connection — eligible wallets receive tokens automatically.
Fake Airdrop (Wallet-Connect Phishing) — comic illustration

A "free token airdrop" announcement requires wallet-connect to claim. The connection grants the drainer authority to move existing tokens out of the wallet (the actual goal). Real airdrops typically push tokens automatically to eligible wallets without requiring user action; "claim" pages requiring signatures are the diagnostic for drainer fraud.

The variant is structurally the most common drainer-distribution mechanic. A user sees a viral X post claiming "Uniswap V4 early-access airdrop — claim 5,000 UNI tokens (~$50,000) at this site." The link is verified by 50+ bot reposts using the same lookalike domain. The user clicks, lands on a fake Uniswap UI, connects their wallet, signs the "claim transaction," and watches the entire wallet drain in seconds. The promised UNI tokens never arrive.

Real airdrops work differently. Eligible wallets (early users, NFT holders meeting specific criteria) receive tokens automatically — the user can see the airdrop in their wallet without any action. Some legitimate airdrops do require a "claim" transaction, but the legitimacy is verified by checking the project's official website, official Twitter, and on-chain transaction history before connecting. The "free is not free if you have to sign" rule is a near-perfect filter.

What stops it is the verify-before-connect rule + hardware wallet. Before connecting your wallet to any airdrop site: (1) navigate to the project's official URL by typing it (not via the X link); (2) confirm the airdrop announcement on the project's official Twitter and website; (3) check Etherscan / project explorer for the airdrop's smart contract address. If any of those checks fail, walk away. A hardware wallet adds a final defense by requiring physical confirmation of every transaction with the actual contract address visible on the device screen.

Red Flags

  • Airdrop announced via X / Twitter / Discord without confirmation on project's official website
  • Site URL is a lookalike (project-airdrop.com vs project.org)
  • "Claim" page requires wallet-connect + signature
  • Promised reward is suspiciously high ($50K+ in free tokens)

Defenses

  • Type project URL directly; verify announcement on official site/Twitter
  • Real airdrops push to eligible wallets automatically
  • Hardware wallet for any signing
  • Revoke.cash audit after any airdrop interaction

Typical Money Demanded

Entire wallet contents · per-victim losses range from $500 to $500,000+ depending on holdings.

— The fifth variant is the closest to traditional subscription fraud. Pay for "signals" that don't exist or signal pump-and-dump exits. —

Variant #5
Medium Severity
Fake Trading-Bot / Signal-Group Subscription
💬 Channel: Telegram or Discord channels offering paid subscriptions ($50-$500/month) for "trading bot access," "whale signal alerts," or "automated portfolio management." Three sub-variants: pure subscription fraud (no signals delivered), signal-as-coordination (signals timed to organizer's exits), or drainer combo (requires wallet-connect for "bot integration").
Fake Trading-Bot / Signal-Group Subscription — comic illustration

Telegram / Discord channels offer paid trading-bot or signal-group subscriptions. Three failure modes: (1) pure subscription fraud, (2) signals timed to the organizer's pump-and-dump exits, or (3) requires wallet-connect for "bot integration" → drainer. Real legitimate trading-signal services exist but are rare; the vast majority of paid Telegram signal groups are fraud.

A representative case: a Telegram channel offers "AlphaSignal Pro" — automated crypto-trading signals for $200/month, with screenshots of "verified members" reporting 3-5x monthly returns. The subscriber pays the $200, joins the VIP channel, and starts receiving signals. The signals turn out to be the organizer's own pump-and-dump entries (Variant #1) plus a smattering of obvious losing trades to disguise the pattern. The subscriber loses 60% of their portfolio over 3 months while the organizer extracts $200/month subscription fees + pump-and-dump exit profits. Real legitimate algorithmic-trading services exist (3Commas, Bitsgap, etc., though their efficacy is heavily debated), but they don't operate via Telegram subscription with screenshot-based marketing.

The protective rule is the no-paid-signals-on-Telegram rule. If a strategy genuinely produced consistent returns, it would not need to be sold via Telegram subscription. Real funds and legitimate trading firms have different distribution. If you genuinely want algorithmic trading, use established platforms with regulatory oversight (regulated brokerages, professional fund managers); if you just want crypto exposure, hold spot tokens via Coinbase / Kraken / hardware wallet without trading. Never connect your wallet to any "bot" regardless of framing.

What stops it is refusing to subscribe. No paid Telegram signal group is legitimate. Treat the existence of the offer as the diagnostic. If you've already subscribed and want recourse, dispute the credit-card charge under FCBA, report to FTC + SEC TCR, and never connect your wallet to any tool the channel pitches.

Red Flags

  • Telegram / Discord paid subscription for "trading signals" or "bot access"
  • Screenshot-based marketing showing 3-5x monthly returns
  • "Connect your wallet for bot integration" requirement
  • "Guaranteed" returns or "verified member" testimonials

Defenses

  • No paid Telegram signal group is legitimate — period
  • Never connect wallet to any "bot"
  • Use regulated brokerages or simply hold spot
  • Dispute via FCBA + report to FTC + SEC if subscribed

Typical Money Demanded

$50–$500/month subscription + portfolio losses from pump-and-dump signals · drainer combo: full wallet.

🆘 What to Do If You've Been Drained

🚪 Move Remaining Funds to a Fresh Wallet

The drained wallet has signed approvals the attacker will continue to exploit; you cannot 'recover' it, you must abandon it. Move any remaining funds to a brand new wallet (ideally hardware-wallet-secured).

🛡 Revoke.cash Approval Audit

Use Revoke.cash on the drained wallet to revoke all token approvals. This stops further drains even after the wallet is empty.

📋 Chainabuse

Report at chainabuse.com — leading public crypto-fraud-reporting platform with shared blacklists used by exchanges.

📋 FTC ReportFraud

File at reportfraud.ftc.gov.

🏛 IC3 — Loss Over $1,000

File at ic3.gov (FBI Internet Crime Complaint Center).

🏛 SEC TCR (Pump-and-Dump)

File at sec.gov/tcr if the scam involved securities-fraud elements (pump-and-dump, fake-airdrop ICO).

🚫 Do NOT Pay for Crypto Recovery

"Crypto recovery services" are uniformly scams. Real recovery from blockchain transactions is essentially impossible because transactions are irreversible.

📝 Document Everything

Transaction hashes, wallet addresses, dates, screenshots. The DOJ has prosecuted some major drainer operations; aggregated reporting matters.

📖 Coming Soon · tabiji.ai General Scams
If you hold crypto in a hot wallet or have ever signed a Web3 transaction, the full book covers 30+ scams across phone, text, online, and in-person channels — same federal-source-verified research as this guide.
$4.99 on Kindle when it ships · Notify me →
See current titles →

If You're Reporting Outside the United States

Frequently Asked Questions

What is a wallet drainer?
A wallet drainer is malware (often deployed as 'drainer-as-a-service' kits sold on Telegram) that tricks crypto users into signing malicious blockchain transactions through fake DApps, fake airdrops, fake support sites, and phishing pages. When the user clicks 'Approve' or 'Connect Wallet,' the drainer extracts authorization to move tokens. Per Scam Sniffer, wallet drainers stole roughly $500 million across 2024. Inferno Drainer alone reportedly stole $80M+ from 134,000 victims.
What's the single best defense?
Never connect your wallet or sign any transaction at the request of an unsolicited Telegram message, Discord ping, or pop-up. Use a hardware wallet for non-trivial holdings. Use Revoke.cash to audit and revoke unwanted token approvals quarterly.
What is a Telegram pump-and-dump?
A coordinated Telegram group announces a target token, members synchronize buy orders to inflate price, then dump simultaneously after pre-arranged early buyers exit at peak. Per Solidus Labs, the PumpCell ring generated $800,000 in October 2025 alone via this script. Any 'guaranteed pump' or 'whale signal' Telegram channel is fraud.
What is Inferno Drainer?
Inferno Drainer is a 'scam-as-a-service' wallet-draining malware kit sold on Telegram and Discord since 2022. Customers (low-skill scammers) pay 20-30% of stolen funds for the phishing kit. Per Group-IB, Inferno stole $80M+ from 134K victims through November 2023, claimed shutdown, then resurged in 2024 with 40-45% market share of crypto-drainer hits.
What is a fake Telegram support channel?
Scammers create lookalike channels with similar names ('MetaMask Help' vs 'MetaMask Official') and invite victims via DM after they post questions in real channels. The fake support agent walks victims through wallet-connect or seed-phrase disclosure. Real support NEVER asks for seed phrases or private keys.
What is a fake airdrop scam?
Scammers create fake airdrop announcements requiring wallet-connect to 'claim' free tokens. The connection grants drainer signature authority to move existing tokens (the actual goal). Real airdrops typically push tokens to eligible wallets automatically without user action. Free is not free if it requires a signature.
What is a fake trading-bot subscription?
Telegram channels offer paid subscriptions ($50-$500/month) for 'trading bot access' or 'whale signal alerts.' Three failure modes: pure subscription fraud, signals timed to organizer's pump-and-dump exits, or drainer combo (requires wallet-connect for 'bot integration'). No paid Telegram signal group is legitimate.
I think my wallet was drained — what do I do?
(1) Move any remaining funds to a fresh wallet. (2) Use Revoke.cash to revoke all token approvals on the compromised wallet. (3) Report at chainabuse.com, reportfraud.ftc.gov, ic3.gov for losses over $1,000, SEC TCR for securities-fraud elements. (4) Do not pay for 'crypto recovery services' — uniformly scams. (5) Document everything (transaction hashes, addresses, dates, screenshots).

Related Reading