Impersonation Attack

Learn what impersonation attacks are, how scammers exploit trust, and how to verify identities in Web3.

W
by Werner Vermaak
Expert Verified
March 4, 2026 • 2 minutes read
Impersonation Attack

What Is an Impersonation Attack?

An impersonation or pretext attack is a social engineering scam where criminals pretend to be someone you trust, like customer support, a company executive, or a well-known crypto personality, to trick you into taking harmful actions. These attacks exploit trust rather than technical vulnerabilities, making them especially dangerous.

How It Works

image

Scammers craft believable scenarios designed to create urgency and bypass your skepticism. Common tactics include fake security alerts (“Your wallet has been compromised, click here immediately!”), phony support messages on Discord or Telegram, or impersonating executives on video calls.

They’ll even create lookalike social media accounts, spoof email addresses, or use AI to clone voices and faces.

image

Source: Mailguard

One specific ploy that I experienced personally was a request form a popular X account to be featured in a Coindesk podcast last year. The conversation was soon moved to a Telegram chat with other attendees, who were all impersonators. Their goal was to get me to install “video conferencing” malware which would allow them to access my computer and steal my funds without any detection.

The goal is always the same: get you to reveal sensitive information, approve malicious wallet transactions, or visit fake websites that drain your funds.

These scams frequently funnel victims toward crypto wallet drainer sites that empty accounts in seconds once you approve a transaction.

Why It Matters

Impersonation attacks scale trust exploitation to industrial levels. In 2024 and 2025, AI-enhanced campaigns using deepfake voices and cloned social media profiles targeted crypto founders, exchange customers, and DeFi users, resulting in millions in losses.

One sophisticated attack involved scammers impersonating a project’s entire support team, complete with matching profile pictures and conversation histories, to steal user funds over several weeks.

The attacks are becoming harder to detect as AI tools make fake identities more convincing. Even experienced crypto users have fallen victim to well-executed impersonation scams.

How to Protect Yourself

  • Always verify identities through official channels, if someone claims to be support, contact the company directly using verified contact information, not links they provide

  • Remember that legitimate companies never ask for seed phrases or private keys

  • Be suspicious of urgent requests, especially those pressuring immediate action

  • Understanding Web3 social engineering and phishing patterns is your first line of defense against these trust-based attacks

  • Use Web3 security tools like Kerberus and Pocket Universe to get real-time protection and warnings when interacting with Web3 platforms

  • Check Kerberus Learn academy for top crypto safety information

Written by:

W
Expert Verified

Werner Vermaak is a Web3 author and crypto journalist with a strong interest in cybersecurity, DeFi, and emerging blockchain infrastructure. With more than eight years of industry experience creating over 1000 educational articles for leading Web3 teams, he produces clear, accurate, and actionable organic material for crypto users.

  • 8+ years in crypto & blockchain journalism
  • 1000+ educational articles for leading Web3 teams
  • Former content lead at CoinMarketCap, Bybit, OKX
View full author profile
Browser Extension
Navigate Web3 Fearlessly

Install once & immediately get protected from scams, phishing and hacks. Zero losses for 250k+ users in 3 years. Now with up to $30,000 in coverage.

Get Protected Now
4.8 From 298+ reviews