Crypto’s ‘Trust’ Problem

There’s a lot of talk about the future of crypto - how it’ll reshape finance, decentralise control, and unlock new economic models. And that vision still holds. But right now, too many people are losing money. I am not referring to market volatility or bad trades, but rather the prevalence of fraud and scams.

In 2024 alone, Chainalysis estimates that a whopping $12.4bn was lost as a result. 

We must fight back - not solely from code bugs or protocol failures, but also from fraud: pig butchering schemes, fake platforms, phishing links, wallet drainers, SIM swaps. These are crimes built on trust - manipulated, then monetised.

And they’re happening every day.

We often hear the word ‘hack’ thrown around when funds go missing. But most of what I see isn’t a traditional hack. It’s psychological manipulation. It’s social engineering. 

Take pig butchering (a type of online scam where the victim is encouraged to make increasing financial contributions over a long period), which has grown by 40% in 2024. It’s a slow-burn scam where someone builds a fake online relationship, often over weeks - before introducing a “can’t-miss” crypto investment platform, for example. Everything looks real.

The site works, the charts move, withdrawals appear to process. But it’s a trap. And once the victim is deep enough in, the exit vanishes.

Losses can be life-changing. Some of our customers have lost 8-figure sums. And because crypto lacks the safety nets of traditional finance - no chargebacks, no fraud department - most people are told there’s nothing they can do.

We don’t think that’s good enough.

In crypto circles, people often talk about security in technical terms: audits, zero-days, bridges and smart contract bugs. That stuff matters. But the biggest threat I see every day, as the founder of a crypto insurance, investigation and recovery firm, is people being deceived, with human nature and vulnerabilities being exploited. 

Yet, too many platforms still treat fraud as a user-side problem. There’s often no formal response process. No fund tracing plan. No recovery team. And when victims ask for help, the response is usually a shrug after a long wait for a response. 

And timing matters. The first 24 - 48 hours after a scam are often make-or-break for any kind of recovery. That’s why we’re set up to move fast.

Crypto is no longer just an experiment. It’s becoming infrastructure - for payments, for identity, for asset ownership. But if we don’t fix the trust issue, adoption will stall. People won’t come near something they feel they don’t understand - or worse, don’t feel safe using.

The crypto industry can no longer treat trust as a user problem. Platforms, devs, and investors all have a stake in building systems that are resilient not just to bugs, but to bad actors. That means designing for prevention, detection, and response. It means funding recovery infrastructure, publishing clear protocols for fraud cases, and refusing to ignore victims. We need the same kind of seriousness applied to scams as is applied to smart contract audits. Until that happens, fraud will remain the single biggest threat to mass adoption.

The truth is, we need a shift in culture. Security can’t be an afterthought. It can’t be seen as a blocker to growth or a checkbox before launch. It has to be baked into the DNA of every team, every product, every roadmap.

Let me be clear: this is not a call for deceleration - far from it. But if we’re serious about achieving the mass adoption the industry aspires to, we must focus on strengthening the entire ecosystem. Because the promise of Web3 is not just exciting - it’s worth protecting.

And it starts with trust.

Neil Holloway is Founder of M2 Recovery

You Might Also Read: 

NimDoor: North Korea’s Latest Cyber Exploit Targets Crypto:


If you like this website and use the comprehensive 8,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Russian Cyber Crime Network Disrupted
Why Choosing The Right Business Internet Services Matters »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Reed Smith LLP

Reed Smith LLP

Reed Smith LLP is an international law firm with offices in the USA, Europe, Middle East and Asia. Practice areas include Information Technology, Privacy & Data Security.

DataCore Software

DataCore Software

DataCore Software is a leader in Software-Defined Storage. Solutions offered include back up and disaster recovery.

Security Brigade

Security Brigade

Security Brigade is an information security firm specializing in Penetration Testing, Vulnerability Assessment, Web-application Security and Source Code Security Audit.

VisionWare

VisionWare

VisionWare provide consulting services and solutions in areas covering both physical and digital security.

QuintessenceLabs

QuintessenceLabs

QuintessenceLabs offers a suite of Data Security technology, products and solutions to secure digital information in-transit, at-rest or in-use.

Consult Hyperion

Consult Hyperion

Consult Hyperion is an independent strategic and technical consultancy specialising in digital identity and secure electronic transactions.

CodeSealer

CodeSealer

CodeSealer provide invisible end-to-end user interface protection with a unique web security solution to eliminate Man-in-the-Middle and Man-in-the-Browser vulnerabilties.

Pixalate

Pixalate

Pixalate is an omni-channel fraud intelligence company that works with brands and platforms to prevent invalid traffic and improve ad inventory quality.

K2 Cyber Security

K2 Cyber Security

K2 Cyber Security delivers the Next Generation Application Workload Protection Platform to secure web applications and container workloads against sophisticated attacks.

SecureWorx

SecureWorx

SecureWorx are a secure multi-cloud MSP, a provider of advanced IT security services and an independent cyber security advisory.

Trail of Bits

Trail of Bits

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.

Prism Infosec

Prism Infosec

Prism Infosec is an award-winning independent cyber security consultancy, CREST STAR, NCSC CHECK member, CAA ASSURE audit provider and PCI Qualified Security Assessor.

RMC

RMC

RMC was purpose-built for Mission Assurance and ICS/OT cybersecurity, dedicated to strengthening and protecting government and commercial assets.

Questex Asia Total Security Conference

Questex Asia Total Security Conference

Questex Asia’s Total Security Conferences is one of the industry’s most prestigious and engaging forums for the region's top information security leaders and business decision-makers.

Quarkslab

Quarkslab

Quarkslab is a dedicated team of cyber-security engineers and developers. We aim at forcing the attackers, not the defender, to adapt constantly.

OryxLabs

OryxLabs

OryxLabs provide advanced enterprise digital risk protection solutions. Learn more about how 24x7 continuous assessment, monitoring, and improvement can secure your network.