📌 The 30-Second Version
Crypto wallet drainers stole $500M in 2024 per Scam Sniffer. Inferno Drainer — the most prominent "scam-as-a-service" kit — stole $80M+ from 134K victims through late 2023, then resurged with 40-45% market share in 2024. Telegram pump-and-dump rings (PumpCell, multiple micro-cap operators) extracted $800K+ in single months. Five variants concentrate the fraud: (1) Telegram pump-and-dump synchronized buying / dumping of micro-cap tokens; (2) wallet drainer kits (Inferno-style) deployed via fake Web3 sites and Discord phishing; (3) fake Telegram support channels impersonating real crypto projects; (4) fake airdrops requiring wallet-connect signatures; (5) fake trading-bot / signal-group subscription scams. The unifying defense fits in one rule: never connect your wallet or sign any transaction at the request of an unsolicited message. Use a hardware wallet for non-trivial holdings; audit approvals via Revoke.cash quarterly.
⚡ Quick Safety Rules
- Hardware wallet for non-trivial holdings. Ledger, Trezor, Lattice. Physical button-press per transaction defeats drainer signatures.
- Revoke.cash quarterly audit. Revoke any token approval you don't actively use. Drainers depend on stale approvals.
- Never connect / sign at unsolicited request. The unsolicited contact is the diagnostic.
- Real support never asks for seed phrases. MetaMask, Phantom, Coinbase — none will ever ask. The request is the diagnostic.
- Free airdrops don't require signatures. Real airdrops are pushed to eligible wallets; "claim" pages with wallet-connect = drainer.
- No paid Telegram signal groups are legitimate. Either subscription fraud, signal-as-coordination, or drainer combo.
🪞 Is this Telegram crypto offer a scam? — 30-second self-check
Two or more "yes" answers and the answer is yes.
- Did the offer arrive via unsolicited Telegram DM, Discord ping, or X reply?
- Does it require you to connect your wallet or sign a transaction to claim something free?
- Is a "trading bot" or "whale signal" promising guaranteed returns?
- Is the "support agent" asking for your seed phrase or private key?
- Is the channel name a lookalike of a real crypto project's official channel?
2+ yes: Crypto scam. Don't connect, don't sign, don't subscribe. Use Revoke.cash to audit. → Skip to What to Do
Jump to a Variant
What These Scams Actually Are
Telegram crypto pump-and-drainer scams share a single structural feature: exploit the irreversibility of blockchain transactions. Once a victim signs a malicious transaction, the funds are gone — there is no chargeback, no fraud reversal, and almost no recovery path. The variants differ in how they engineer the malicious signature, but the underlying mechanic is identical.
- Coordinate buying to inflate price. Pump-and-dump rings synchronize purchases of micro-cap tokens via Telegram timing alerts; insiders exit at peak before announcing the dump.
- Trick the user into signing a malicious approval. Drainer kits (Inferno being the most prominent) deploy fake Web3 sites mimicking real projects; users connect their wallet and sign a transaction that grants the attacker authority to drain tokens.
- Impersonate official support. Fake Telegram support channels lure victims via DM after they post questions in legitimate channels; the fake support agent walks victims through wallet-connect or seed-phrase disclosure.
- Frame the drainer as a free airdrop. Free-token claims require wallet connection; the connection grants drainer signature authority.
🔑 The single rule that defeats every variant — never connect your wallet or sign at unsolicited request
Real Web3 projects do not push wallet-connect requests via DM, do not run airdrops that require signatures to claim, and do not have support agents that ask for seed phrases. You initiate, never accept. Combined with a hardware wallet (Ledger, Trezor) and quarterly Revoke.cash audits, the rule defeats every drainer variant on this page. The protective architecture is mature and freely available; the gap is consumer adoption.
The 5 Variants
A coordinated Telegram group announces a target micro-cap token at a specific time. Members synchronize buy orders to inflate price; insiders dump at peak. Late buyers lose when the cascade reverses. Per Solidus Labs investigation, the PumpCell Telegram ring generated $800,000 in October 2025 across multiple micro-cap tokens.
A representative case from Solidus Labs' 2025 investigation: PumpCell, a Telegram-based pump-and-dump operation, orchestrated synchronized token launches and sniper-bot buys that inflated micro-cap tokens to seven-figure valuations within minutes. Members paying $50-$200/month for "VIP signals" received the announce-and-buy timing milliseconds before the public channel; insiders had already pre-purchased and were in position to exit at peak. Within 5-15 minutes of the announce, the price spiked, insiders sold, and the price collapsed. Members who joined the buy were left with worthless tokens. Total investigated activity in October 2025: $800,000.
The SEC and CFTC have pursued pump-and-dump organizers under existing securities-fraud and commodities-fraud statutes since at least 2021. The structural problem is enforcement scope — Telegram operators frequently use offshore channels and crypto-only payments, making jurisdiction murky. The protective rule for individual investors is simpler than the enforcement architecture: any "guaranteed pump" or "whale signal" Telegram channel is a fraud. Real legitimate trading does not work via coordinated synchronized buying.
What stops it is refusing to participate. Don't pay for Telegram signal groups. Don't synchronize buys with anyone. Don't believe "guaranteed" anything in crypto. If you've been a victim, document the transactions and report at SEC TCR (Tips, Complaints, and Referrals), FTC ReportFraud, and FBI IC3.
Red Flags
- Telegram channel offering "VIP signals" or "whale alerts" for a paid subscription
- "Guaranteed" returns or "100x in minutes" claims
- Synchronized buy time announcements
- Micro-cap tokens with no project-team transparency
Defenses
- Don't pay for any Telegram signal group
- Don't synchronize buys with strangers
- Treat "guaranteed" as the diagnostic for fraud
- Report at SEC TCR + FTC + IC3 if scammed
Typical Money Demanded
$50–$500/month subscription + $1,000-$10,000 in pump-trapped buys per victim · PumpCell: $800K in October 2025 alone.
— The second variant is structurally larger. Wallet drainers operate as scam-as-a-service, distributed across hundreds of phishing kits. —
A "scam-as-a-service" wallet-draining malware kit (most famously Inferno Drainer) deploys fake Web3 sites mimicking legitimate crypto projects. Users connect their wallet and sign a transaction that grants the attacker authority to drain tokens. Per Scam Sniffer 2024 data, wallet drainers stole roughly $500 million across 2024; Inferno alone accounted for 40-45% of all drainer hits.
A representative case: a user clicks an X / Twitter advertisement promoting a "Uniswap V4 early access airdrop." The link routes to a site that visually matches Uniswap's official UI, with a "Claim Airdrop" button. The user clicks; a wallet-connect prompt appears (looks like the legitimate MetaMask/WalletConnect modal); the user clicks "Connect" and signs a transaction labeled "Approve" that they believe is the airdrop claim. The signature actually grants unlimited token-transfer authority to the drainer's smart contract. Within seconds, the drainer extracts every fungible token from the user's wallet — often $5,000-$500,000 depending on holdings. The user has no recourse; blockchain transactions are irreversible.
Inferno Drainer's operation through 2023 stole $80M+ from 134K victims per Group-IB. The operators announced a Telegram-channel shutdown in November 2023, but a sophisticated phishing campaign abusing Discord brought the same kit back in 2024 with even larger market share. Per Check Point Research, Inferno's 2024 resurgence accounted for 40-45% of all drainer activity that year.
What stops it is hardware-wallet discipline + approval auditing. Use a hardware wallet (Ledger, Trezor) for any non-trivial crypto holdings — hardware wallets require physical button-press confirmation per transaction, and the on-device display shows the actual transaction details (not the website's claim). Audit approvals quarterly via Revoke.cash and revoke any approvals you don't actively use. The combination defeats most drainer variants because the hardware wallet refuses to sign anything not visible on its screen.
Red Flags
- "Free airdrop" or "early access" claim requiring wallet-connect
- X / Twitter ad routing to a Web3 site you didn't search for
- Site URL is a lookalike of the real project (uniswap-airdrop.com vs uniswap.org)
- Wallet-connect prompts a transaction labeled "Approve" with unclear scope
Defenses
- Hardware wallet (Ledger / Trezor) for non-trivial holdings
- Revoke.cash quarterly audit + revoke unused approvals
- Type project URLs directly; never click X / Discord airdrop links
- If drained: move remaining funds to fresh wallet + revoke all approvals
Typical Money Demanded
Whatever's in the wallet: $500-$500,000+ per drained wallet · Inferno cumulative: $80M+ from 134K victims · Wallet drainers 2024: $500M total.
— The third variant attacks users who already use crypto correctly — they go to support channels for help and get fake support instead. —
Fake lookalike Telegram / Discord channels mimic real crypto-project support. Scammers DM users from real channels and invite them to the fake support channel, where the "support agent" walks them through wallet-connect or seed-phrase disclosure. Real support NEVER asks for your seed phrase or private key under any circumstances.
A representative case: a MetaMask user posts in the official MetaMask Discord asking why a transaction failed. Within minutes, a DM arrives from a user with "MetaMask Support" branding offering to help in a private channel. The user clicks the channel invite; the channel name is "MetaMask Help Desk" (not "MetaMask Official"), but the branding looks identical. The fake agent walks the user through a "wallet recovery procedure" that requires entering the 12-word seed phrase into a "secure verification form." The user enters the seed; the attacker uses it to import the wallet on their own device and drains every asset within seconds.
The protective rule is the most absolute one in crypto. No legitimate crypto support — MetaMask, Phantom, Coinbase, OpenSea, Uniswap, none of them — will ever ask for your seed phrase, private key, or wallet password under any circumstances. The request itself is the diagnostic for impersonation, regardless of how plausible the framing. Real support troubleshooting is done through the application itself (logs, error messages, settings) without ever requiring seed-phrase disclosure.
What stops it is the no-seed-phrase rule plus channel verification. Verify Telegram / Discord channel names against the project's official website before joining. Never enter your seed phrase anywhere outside the wallet's own UI on your trusted device. Real seed phrases are entered exactly once — when you first restore a wallet — and never again for "verification" or "recovery."
Red Flags
- DM invitation to a "support channel" after posting in official channel
- Channel name is a lookalike (MetaMask Help vs MetaMask Official)
- "Support agent" asks for seed phrase, private key, or wallet password
- "Verification form" requesting wallet credentials
Defenses
- Verify channel names via project's official website before joining
- Real support never asks for seed phrase / private key — the request is the diagnostic
- Real support is done in-app via logs / error messages
- If exposed seed: move funds to fresh wallet immediately + revoke approvals
Typical Money Demanded
Whatever's in the compromised wallet · seed-phrase disclosure = total wallet compromise.
— The fourth variant frames the drainer as a free gift. The "claim" page is the drainer's signature surface. —
A "free token airdrop" announcement requires wallet-connect to claim. The connection grants the drainer authority to move existing tokens out of the wallet (the actual goal). Real airdrops typically push tokens automatically to eligible wallets without requiring user action; "claim" pages requiring signatures are the diagnostic for drainer fraud.
The variant is structurally the most common drainer-distribution mechanic. A user sees a viral X post claiming "Uniswap V4 early-access airdrop — claim 5,000 UNI tokens (~$50,000) at this site." The link is verified by 50+ bot reposts using the same lookalike domain. The user clicks, lands on a fake Uniswap UI, connects their wallet, signs the "claim transaction," and watches the entire wallet drain in seconds. The promised UNI tokens never arrive.
Real airdrops work differently. Eligible wallets (early users, NFT holders meeting specific criteria) receive tokens automatically — the user can see the airdrop in their wallet without any action. Some legitimate airdrops do require a "claim" transaction, but the legitimacy is verified by checking the project's official website, official Twitter, and on-chain transaction history before connecting. The "free is not free if you have to sign" rule is a near-perfect filter.
What stops it is the verify-before-connect rule + hardware wallet. Before connecting your wallet to any airdrop site: (1) navigate to the project's official URL by typing it (not via the X link); (2) confirm the airdrop announcement on the project's official Twitter and website; (3) check Etherscan / project explorer for the airdrop's smart contract address. If any of those checks fail, walk away. A hardware wallet adds a final defense by requiring physical confirmation of every transaction with the actual contract address visible on the device screen.
Red Flags
- Airdrop announced via X / Twitter / Discord without confirmation on project's official website
- Site URL is a lookalike (project-airdrop.com vs project.org)
- "Claim" page requires wallet-connect + signature
- Promised reward is suspiciously high ($50K+ in free tokens)
Defenses
- Type project URL directly; verify announcement on official site/Twitter
- Real airdrops push to eligible wallets automatically
- Hardware wallet for any signing
- Revoke.cash audit after any airdrop interaction
Typical Money Demanded
Entire wallet contents · per-victim losses range from $500 to $500,000+ depending on holdings.
— The fifth variant is the closest to traditional subscription fraud. Pay for "signals" that don't exist or signal pump-and-dump exits. —
Telegram / Discord channels offer paid trading-bot or signal-group subscriptions. Three failure modes: (1) pure subscription fraud, (2) signals timed to the organizer's pump-and-dump exits, or (3) requires wallet-connect for "bot integration" → drainer. Real legitimate trading-signal services exist but are rare; the vast majority of paid Telegram signal groups are fraud.
A representative case: a Telegram channel offers "AlphaSignal Pro" — automated crypto-trading signals for $200/month, with screenshots of "verified members" reporting 3-5x monthly returns. The subscriber pays the $200, joins the VIP channel, and starts receiving signals. The signals turn out to be the organizer's own pump-and-dump entries (Variant #1) plus a smattering of obvious losing trades to disguise the pattern. The subscriber loses 60% of their portfolio over 3 months while the organizer extracts $200/month subscription fees + pump-and-dump exit profits. Real legitimate algorithmic-trading services exist (3Commas, Bitsgap, etc., though their efficacy is heavily debated), but they don't operate via Telegram subscription with screenshot-based marketing.
The protective rule is the no-paid-signals-on-Telegram rule. If a strategy genuinely produced consistent returns, it would not need to be sold via Telegram subscription. Real funds and legitimate trading firms have different distribution. If you genuinely want algorithmic trading, use established platforms with regulatory oversight (regulated brokerages, professional fund managers); if you just want crypto exposure, hold spot tokens via Coinbase / Kraken / hardware wallet without trading. Never connect your wallet to any "bot" regardless of framing.
What stops it is refusing to subscribe. No paid Telegram signal group is legitimate. Treat the existence of the offer as the diagnostic. If you've already subscribed and want recourse, dispute the credit-card charge under FCBA, report to FTC + SEC TCR, and never connect your wallet to any tool the channel pitches.
Red Flags
- Telegram / Discord paid subscription for "trading signals" or "bot access"
- Screenshot-based marketing showing 3-5x monthly returns
- "Connect your wallet for bot integration" requirement
- "Guaranteed" returns or "verified member" testimonials
Defenses
- No paid Telegram signal group is legitimate — period
- Never connect wallet to any "bot"
- Use regulated brokerages or simply hold spot
- Dispute via FCBA + report to FTC + SEC if subscribed
Typical Money Demanded
$50–$500/month subscription + portfolio losses from pump-and-dump signals · drainer combo: full wallet.
🆘 What to Do If You've Been Drained
🚪 Move Remaining Funds to a Fresh Wallet
The drained wallet has signed approvals the attacker will continue to exploit; you cannot 'recover' it, you must abandon it. Move any remaining funds to a brand new wallet (ideally hardware-wallet-secured).
🛡 Revoke.cash Approval Audit
Use Revoke.cash on the drained wallet to revoke all token approvals. This stops further drains even after the wallet is empty.
📋 Chainabuse
Report at chainabuse.com — leading public crypto-fraud-reporting platform with shared blacklists used by exchanges.
📋 FTC ReportFraud
File at reportfraud.ftc.gov.
🏛 IC3 — Loss Over $1,000
File at ic3.gov (FBI Internet Crime Complaint Center).
🏛 SEC TCR (Pump-and-Dump)
File at sec.gov/tcr if the scam involved securities-fraud elements (pump-and-dump, fake-airdrop ICO).
🚫 Do NOT Pay for Crypto Recovery
"Crypto recovery services" are uniformly scams. Real recovery from blockchain transactions is essentially impossible because transactions are irreversible.
📝 Document Everything
Transaction hashes, wallet addresses, dates, screenshots. The DOJ has prosecuted some major drainer operations; aggregated reporting matters.
If You're Reporting Outside the United States
- United Kingdom: Action Fraud + FCA ScamSmart.
- Canada: CAFC.
- Australia: Scamwatch + ASIC.
- European Union: National financial-services regulators.
Frequently Asked Questions
What is a wallet drainer?
What's the single best defense?
What is a Telegram pump-and-dump?
What is Inferno Drainer?
What is a fake Telegram support channel?
What is a fake airdrop scam?
What is a fake trading-bot subscription?
I think my wallet was drained — what do I do?
Related Reading
- Pig-Butchering Scams — The romance-into-investment crypto fraud variant overlaps with Telegram pump-and-dump on the recruitment side.
- Celebrity-Impersonation Crypto Scams — Same wallet-connect-drainer mechanic, different recruitment vector.
- Recovery Scams — The parasite layer that promises to recover drained crypto for upfront fees.