Crypto’s ‘Trust’ Problem

There’s a lot of talk about the future of crypto - how it’ll reshape finance, decentralise control, and unlock new economic models. And that vision still holds. But right now, too many people are losing money. I am not referring to market volatility or bad trades, but rather the prevalence of fraud and scams.

In 2024 alone, Chainalysis estimates that a whopping $12.4bn was lost as a result. 

We must fight back - not solely from code bugs or protocol failures, but also from fraud: pig butchering schemes, fake platforms, phishing links, wallet drainers, SIM swaps. These are crimes built on trust - manipulated, then monetised.

And they’re happening every day.

We often hear the word ‘hack’ thrown around when funds go missing. But most of what I see isn’t a traditional hack. It’s psychological manipulation. It’s social engineering. 

Take pig butchering (a type of online scam where the victim is encouraged to make increasing financial contributions over a long period), which has grown by 40% in 2024. It’s a slow-burn scam where someone builds a fake online relationship, often over weeks - before introducing a “can’t-miss” crypto investment platform, for example. Everything looks real.

The site works, the charts move, withdrawals appear to process. But it’s a trap. And once the victim is deep enough in, the exit vanishes.

Losses can be life-changing. Some of our customers have lost 8-figure sums. And because crypto lacks the safety nets of traditional finance - no chargebacks, no fraud department - most people are told there’s nothing they can do.

We don’t think that’s good enough.

In crypto circles, people often talk about security in technical terms: audits, zero-days, bridges and smart contract bugs. That stuff matters. But the biggest threat I see every day, as the founder of a crypto insurance, investigation and recovery firm, is people being deceived, with human nature and vulnerabilities being exploited. 

Yet, too many platforms still treat fraud as a user-side problem. There’s often no formal response process. No fund tracing plan. No recovery team. And when victims ask for help, the response is usually a shrug after a long wait for a response. 

And timing matters. The first 24 - 48 hours after a scam are often make-or-break for any kind of recovery. That’s why we’re set up to move fast.

Crypto is no longer just an experiment. It’s becoming infrastructure - for payments, for identity, for asset ownership. But if we don’t fix the trust issue, adoption will stall. People won’t come near something they feel they don’t understand - or worse, don’t feel safe using.

The crypto industry can no longer treat trust as a user problem. Platforms, devs, and investors all have a stake in building systems that are resilient not just to bugs, but to bad actors. That means designing for prevention, detection, and response. It means funding recovery infrastructure, publishing clear protocols for fraud cases, and refusing to ignore victims. We need the same kind of seriousness applied to scams as is applied to smart contract audits. Until that happens, fraud will remain the single biggest threat to mass adoption.

The truth is, we need a shift in culture. Security can’t be an afterthought. It can’t be seen as a blocker to growth or a checkbox before launch. It has to be baked into the DNA of every team, every product, every roadmap.

Let me be clear: this is not a call for deceleration - far from it. But if we’re serious about achieving the mass adoption the industry aspires to, we must focus on strengthening the entire ecosystem. Because the promise of Web3 is not just exciting - it’s worth protecting.

And it starts with trust.

Neil Holloway is Founder of M2 Recovery

You Might Also Read: 

NimDoor: North Korea’s Latest Cyber Exploit Targets Crypto:


If you like this website and use the comprehensive 8,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Russian Cyber Crime Network Disrupted
Why Choosing The Right Business Internet Services Matters »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Swivel Secure

Swivel Secure

Swivel Secure is an award winning provider of multi-factor authentication solutions.

Certego

Certego

Certego is a company of the VEM Sistemi Group specialised in providing managed computer security services and to combat Cyber Crime.

Parsons

Parsons

Parsons has developed a converged security offering that combines cybersecurity, integrated network solutions, and critical infrastructure protection.

Open Information Security Foundation (OISF)

Open Information Security Foundation (OISF)

OISF is a non-profit organization led by world-class security experts, programmers, and others dedicated to open source security technologies.

Tevora

Tevora

Tevora is a specialized management consultancy focused on cyber security, risk, and compliance services.

The Media Trust

The Media Trust

The Media Trust continuously scans websites, ad tags and mobile apps and alerts on anomalies affecting websites and visitors.

Qatar Computing Research Institute (QCRI)

Qatar Computing Research Institute (QCRI)

QCRI perform cutting-edge research in such areas as Arabic language technologies, social computing, data analytics, distributed systems, cyber security and computational science and engineering.

GreyCortex

GreyCortex

GreyCortex uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

Ntirety

Ntirety

Ntirety Managed Security Services offer enterprise businesses the advanced tools, processes, and support to ensure your infrastructure, networks, and mission-critical applications are secure.

e360

e360

e360 (formerly Entisys360) is an award-winning IT consultancy specializing in advanced IT infrastructure, virtualization, security, automation and cloud first solutions.

Depth Security

Depth Security

Depth Security assessment services provide organizations with real-world visibility into threats facing their infrastructure and applications.

Firmus

Firmus

As the leading penetration testing services provider in Malaysia, Firmus evaluates the ability of your internal or external information assets to withstand attacks.

GreenPages Technology Solutions

GreenPages Technology Solutions

GreenPages provide expert strategic guidance and proven cloud-era solutions for our clients. Every day we help organizations leverage the cloud securely with less risk and cost.

TachTech

TachTech

TachTech is passionate about trust, security and privacy in the digital world. We create tailored security and compliance solutions to improve your business.

Vambrace Cybersecurity

Vambrace Cybersecurity

Vambrace is an experienced cybersecurity consultancy and operations outsourcer helping you to secure your business in an increasingly-hostile cyber environment.

Minimus

Minimus

Minimus, a pioneering application security startup, offers a groundbreaking platform that eliminates over 95% of Common Vulnerabilities and Exposures (CVEs) from software supply chains.