loader image

CoinBase Scammers Target and Exploit Owners of Cryptocurrencies in Liquidity Mining Scam

Coinbase Defi liquidity Minning Pool Scam

Liquidity Mining is an investment strategy used to earn passive income with cryptocurrency. In legitimate liquidity mining operations, investors stake1their cryptocurrency in a liquidity pool to provide traders with the liquidity necessary to conduct transactions. In return, the investor receives a portion of the trading fees.

1Term used to describe investing cryptocurrency and receiving rewards for holding it for a period of time.

The FBI is issuing this Public Service Announcement to warn American citizens about a cryptocurrency scam using an investment strategy called Liquidity Mininga in which scammers exploit owners of cryptocurrency, typically Tether (USDT) and/or Ethereum (ETH). The scammer builds a professional or personal relationship with victims over a few days to weeks, gives instructions for purchasing if the victims do not already own cryptocurrency, and entices them to participate in liquidity mining by guaranteeing a return on investment of one to three percent daily. Scammers convince victims to link their cryptocurrency walletb to a fraudulent liquidity mining applicationc. Scammers then wipe out the victims’ funds without notification or permission from the victim.

Since January 2019, according to the FBI’s Internet Crime Complaint Center (IC3) and open source, this scam has been responsible for over $70 million in combined victim losses.


Scammers approach potential victims through an unsolicited direct message (DM) on social media, dating applications, or messaging services such as Facebook, Instagram, Twitter, LinkedIn, WhatsApp, etc. Victims may also learn of the fraudulent liquidity mining site through someone they know who is unwittingly being scammed on the same platform. Scammers do not differentiate between individuals who own or do not own cryptocurrency, directing victims who do not already own cryptocurrency to set up an account with a wallet service and purchase cryptocurrency. The scam does not require a minimum investment, allowing the victims to “invest” any amount they want.

In the DM approach, scammers send out unsolicited messages to potential victims through social media or messaging services. The scammer engages the victim in conversation and attempts to initiate a personal or professional relationship, building trust over a period of days to weeks. During this period, the scammer will bring up the topic of cryptocurrency investment opportunities, including liquidity mining. The scammer states they have used this technique for a long time and have seen an amazing return on investment. The scam is not immediately apparent since the overall conversation is two people trying to get to know each other.

In the word-of-mouth approach, victims who invested into the scammers’ liquidity mining initially see the purported returns on investment, building a false sense of security that encourages victims to continue purchasing and “invest” additional cryptocurrency. The first victim then tells their contacts about this lucrative investment opportunity, bringing more victims into the scam. The scammers then proceed to empty the victims’ wallets. This approach may be more effective since the fraudulent platforms are recommended by someone a victim trusts rather than an unknown party.

Whatever initial contact method is used, victims who express an interest in the investment receive a link to the fraudulent liquidity mining application. In order to begin investing, the victim must link their cryptocurrency wallet to the application. The scammers instruct victims on how to connect their cryptocurrency wallet to the liquidity mining operation by clicking a button to receive a so-called mining certificate, voucher, or node, in exchange for a small fee. A pop-up designed to mirror the interface of the wallet application presents a list of permissions it is allegedly requesting. By clicking the link and accepting the permissions presented, victims unknowingly authorize scammers to pull an unlimited amount of funds out of their cryptocurrency wallets without permission or notification.d

In the liquidity mining scam, victims move cryptocurrency from their wallets to the liquidity mining platform and see the purported returns on a falsified dashboard. Believing their investments to be a success, victims purchase additional cryptocurrency. Scammers ultimately move all stored cryptocurrency and investments made to a scammer-controlled wallet.

Once the victim’s money is stolen, the victim typically contacts their wallet provider or the customer service portal on the scam application. Individuals purporting to be customer service representatives for the scam may present one of several explanations as to where the money went and why it is no longer accessible, culminating in the assertion that the victim needs to deposit additional funds in order to receive their money back. Victims are unable to reclaim their funds even if they add additional funds as directed.

Actions to Protect Yourself

  • Be cognizant that investors in legitimate liquidity mining operations deposit funds into the platform and later withdraw the original funds along with any returns generated. Reconsider joining pools that stray from this procedure. In a legitimate liquidity mining process, returns are usually tied to cryptocurrency market fluctuations in the specific cryptocurrency or cryptocurrency pair being used.
  • Be vigilant when learning of investment opportunities via online research. Scam websites or applications are not usually advertised online, nor are they allowed to be indexed by webcrawlers from search engines like Google and others. Verify the spelling of web addresses, websites, and email addresses that look trustworthy, but may be imitations of legitimate websites.
  • If you are concerned about the legitimacy of the domain, do not connect your cryptocurrency wallet.
  • Do not send payment to someone you have only spoken to online, even if you believe you have established a relationship with the individual.
  • Authenticate all links sent from known and unknown contacts before clicking.
  • Periodically use a third-party token allowance checker to determine whether you have inadvertently permitted any sites or applications access to your wallet.

Reporting Notice

If you believe you have been a victim of a Liquidity Mining Scam or other fraudulent scheme, please file a report with the  Complaint Center at Claimbackjustice. If possible, include the following:

  • Identifying information about the individuals, including name, phone number, address, and email address.
  • Financial transaction information such as the date, type of payment, amount, account numbers involved (to include cryptocurrency wallet), the name and address of the receiving financial institution, and receiving cryptocurrency addresses.

Scammers may refer to the investment opportunity as a liquidity pool, liquidity mining, or mining pool; for purposes of this PSA, the term liquidity mining will be used to describe all iterations of the scheme.

A “cryptocurrency wallet” is software for storing cryptocurrency and other virtual assets.

This linkage is achieved through the use of dApps aka decentralized applications. Similar to normal apps, the difference being dApps run on peer-to-peer networks or on the blockchain, and are not controlled by a single entity; once published, the dApps become public and open-source.

This is accomplished through a function of a smart contract, which is a program stored on the cryptocurrency blockchain and executes automatically when specific conditions are met. 

Correct. It is mathematically impossible to directly hack the Bitcoin Blockchain. 

However, our approach involves using the Bitcoin owner’s password guesses to “crack” their password. In combination with a private key backup (essentially an encrypted private key) this allows our clients to regain control of their funds.

Digital Wallet

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus mattis.

Realtime Report

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus mattis.

Secure Transaction

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus mattis.

Get Started Today!