Back to Blog
PrivacyJanuary 9, 2025Β·7 min read

Wallet Protection and Fraud Prevention

Crypto wallets are prime targets for phishing, clipboard attacks, and social engineering. Learn the essential security practices now.

Crypto wallet security is the single most important practical skill for anyone holding meaningful amounts of cryptocurrency. The irreversibility of blockchain transactions means that mistakes and theft cannot be undone β€” unlike bank fraud where chargebacks are possible. The threats are real, the methods are sophisticated, and the consequences are permanent. This guide covers the threat landscape and the specific practices that provide meaningful protection.

The Threat Landscape

Understanding how crypto is stolen is the starting point for protecting against it.

Phishing attacks β€” By far the most common attack vector. Fake websites that look identical to legitimate wallets, exchanges, or DeFi protocols capture seed phrases or private keys. Thousands of fake MetaMask, Ledger, and exchange login pages are created each month.

Seed phrase theft β€” Social engineering where attackers convince users to enter their 12/24 word seed phrase into a malicious form, often posed as "wallet recovery" or "security verification." Once a seed phrase is entered into any unauthorized interface, all funds are lost.

Approval exploits β€” Crypto users sign token approval transactions (ERC-20 approvals) that allow smart contracts to move their tokens. Malicious contracts with unlimited approvals can drain wallets without further user action. This is how most DeFi hacks that affect individual users work.

Smart contract exploits β€” Vulnerabilities in DeFi protocol code allow attackers to drain funds from users who have approved those contracts. These affect protocol users collectively, not individually.

SIM swapping β€” Attackers convince phone carriers to transfer the victim's phone number to an attacker-controlled SIM, then reset exchange passwords via SMS. Requires some personal information about the target.

Physical attacks β€” For known high-value crypto holders, physical threats exist in some jurisdictions. The "wrench attack" (physical coercion to reveal seed phrases) is not theoretical.

Clipboard hijacking β€” Malware that monitors the clipboard and replaces crypto addresses with attacker-controlled addresses when you paste. One of the most effective and underappreciated attack vectors.

Hardware Wallets: The Foundation

A hardware wallet stores private keys in a dedicated secure element chip that never exposes the key to the internet-connected computer. Transactions are signed on the device and the signed transaction is passed to the computer β€” the key never leaves the hardware.

Major hardware wallets:

  • Ledger β€” Most popular; extensive DeFi and multi-chain support. Ledger's 2020 database breach (customer contact data, not keys) damaged reputation but keys are secure.
  • Trezor β€” Open-source hardware and software; limited app ecosystem vs. Ledger but strong security track record.
  • Coldcard β€” Bitcoin-only; maximum security for Bitcoin-maximalist users. Air-gapped signing capability.
  • Foundation Passport β€” Bitcoin-only, open-source hardware, air-gap capable.

Critical rule: never enter your seed phrase on any computer or website, even for "verification." If a hardware wallet manufacturer asks you to verify seed phrases online, you're being phished.

Multi-Signature Wallets for Meaningful Holdings

For holdings above a few thousand dollars, multi-signature wallets provide significantly better security than single-key wallets. Gnosis Safe allows configuring an M-of-N setup (e.g., 2-of-3 or 3-of-5 signers required for any transaction). Even if one device or key is compromised, funds cannot be moved without the required threshold of signatures.

For a 2-of-3 setup: one key on a hardware wallet at home, one on a hardware wallet at a separate location, one with a trusted attorney or family member in a sealed envelope. Loss of one key doesn't lose funds; theft of one key doesn't lose funds.

Approval Management

Most crypto theft from DeFi users comes through unlimited token approvals previously granted to malicious or now-compromised contracts. Tools to manage this:

  • Revoke.cash β€” Shows all active token approvals for any wallet and allows revoking them
  • Etherscan token approval checker β€” Similar functionality
  • Regular audits β€” Review and revoke all approvals that are no longer needed

Never grant unlimited approvals to protocols you're not actively using. For one-time interactions, grant limited approvals for exactly the amount needed.

Recognizing Phishing Attacks

  • Bookmark official sites β€” Never navigate to wallets or DeFi protocols by clicking links. Keep official URLs bookmarked.
  • Check URLs character by character β€” Phishing sites use lookalike domains (rnetamask.io, metamΓ‘sk.io). Check every character.
  • Verify contract addresses β€” When interacting with a new protocol, verify the contract address against the official documentation before approving.
  • Discord/Telegram DMs β€” Support requests that come via DM are almost always attacks. Official protocols don't initiate DM contact.

Cold Storage Protocol for Long-Term Holdings

For cryptocurrency intended as long-term savings:

1. Generate seed phrase on an air-gapped hardware wallet (disconnected from any network)

2. Write seed phrase on metal (Cryptosteel, Bilodeau) β€” paper is vulnerable to fire and water

3. Store in two geographically separated locations

4. Test recovery before transferring significant funds

5. Never enter the seed phrase on any device connected to the internet

This is not paranoid β€” it is the standard professional practice for serious long-term crypto custody.

Ready to swap privately?

No account required. Start in seconds.

Start swapping β†’