Criminals are using in-person crypto events to launch phishing campaigns and impersonation scams, Kraken warns.
By now, itâs no secret that crypto is becoming mainstream, and with it, a bigger target. From Dubaiâs skyline to Singaporeâs high-tech halls, crypto conferences have exploded in size and scope. But amid the panels and pitches, Krakenâs chief security officer Nick Percoco warns of a troubling pattern: people in the space may be letting their guard down at the exact moment they should be more alert.
âPersonal security hygiene at crypto conferences has taken a back seat,â Percoco wrote in a blog post. His team at Kraken has been quietly observing â and what theyâve seen is hard to ignore.
At recent events, Kraken staff spotted unattended laptops with wallet access left open on expo tables, phones buzzing with wallet notifications while their owners chatted nearby. âIf youâre in crypto, your digital device is not just a phone or a laptop,â Percoco reminds, adding that âitâs a vault.â
In a commentary for crypto.news, Percoco explained that phishing remains the most prevalent and effective scam at conferences â not because itâs technically sophisticated, but because of how easily it blends in. âThe nature of these events â including constant networking, QR code scanning, and information sharing â creates ideal conditions for scammers to blend in and launch attacks with minimal effort,â he said.
âBy exploiting common conference behaviors, attackers can easily distribute malicious links or fake scheduling invites under the guise of professional follow-ups. Itâs a low-friction tactic that requires little technical sophistication but can yield significant access and financial rewards if successful.â
Nick Percoco
Crypto conferences have always been social hubs, but now theyâre also a goldmine of unguarded intel. Percoco shared one scene: a group of conference-goers openly discussing high-value trades on a public sidewalk â lanyards displaying their names and companies in plain view.
Even if you donât think anyoneâs listening, someone probably is. Public Wi-Fi or QR codes can easily be hijacked. Percoco says itâs not paranoia â itâs pattern recognition. The suggestion: use burner wallets with minimal funds, and never scan a QR code you canât verify.
âIt only takes a single sticker swap for a bad actor to replace a legitimate QR code on a marketing material with a fake one, putting dozens (if not hundreds) of attendees at risk.â
Nick Percoco
The threats arenât theoretical anymore. In France, a series of violent attacks on crypto professionals has underscored the very real danger of being too visible in this space.
In January, David Balland â co-founder of Ledger, a company known for secure crypto wallets â was kidnapped at gunpoint from his home. His captors severed his finger and sent it to his business partner as proof, demanding a â¬10 million ransom in crypto. His wife was later found tied in the trunk of a car. Both survived, but the ordeal left the community shaken.
The attackers? Young, organized, and tech-savvy, and reportedly familiar with Ballandâs holdings and business ties.
Itâs not an isolated case. Other attacks in France have also targeted crypto holders, sometimes extending threats to their families. These are not online scams. These are physical, deliberate abductions. The old âdonât tell people youâre in cryptoâ rule just got a lot more literal.
Percocoâs biggest concern isnât necessarily complex hacks. Itâs basic situational awareness. Crypto folks know how to use cold storage. But when it comes to not leaving a MacBook Pro unlocked in a crowded room? Apparently not so much.
âIn todayâs high-stakes environment, crypto complacency isnât just a personal risk, itâs a threat to our broader movement.â
Nick Percoco
That sentiment echoes what a16z crypto has also been telling its community for months if not years: in web3, the perimeter is you. A data breach â even of your phone number â can snowball into full-blown identity theft.
Every piece of information attackers glean âmakes it easier for and likelier that they will acquire more,â wrote in a blog post Matt Gleason, a security engineer for a16z crypto. Once your personal data is out there, itâs a waiting game. Gleason advises freezing credit at credit bureaus, enabling multi-factor authentication with hardware keys like YubiKey, and locking down sensitive apps behind Face ID. SIM protection with mobile carrier is also a must.
On top of that, Gleason suggests to rethink passwords. Use a manager, create a vault and donât reuse passwords. And watch for red flags like unsolicited calls or unexpected login notifications. The goal isnât just to react â itâs to make yourself a harder target.
Back on the conference floor, Percoco urged attendees to adopt a more security-conscious mindset. He particularly emphasized the importance of verifying identities, avoiding sensitive discussions in public areas, keeping an eye on personal belongings, and steering clear of free charging stations, which could potentially install malware through a method known as âjuice jacking.â
According to Percoco, attackers donât operate at random. They often assess visible details like names and company affiliations on lanyards to quickly identify high-value targets such as developers, DAO contributors, or startup teams. Once a target is chosen, they may receive phishing links disguised as calendar invites or Zoom calls, designed to establish a foothold on the victimâs device. As Percoco says, the first step âcan be all it takes to breach a device and move laterally from there.â
This isnât about paranoia. Itâs about catching up with reality. As the crypto industry gains legitimacy, itâs also gaining enemies â from state-sponsored hackers to opportunistic criminals. Security culture has to evolve with it.
Percoco also believes thereâs no silver bullet for eliminating scammers from industry events entirely. But he pointed out that conferences already collect significant attendee data â including names, emails, and phone numbers â for legitimate logistical purposes. Under the wrong circumstances, that same data âcan be leveraged by malicious actors under the right circumstances,â he adds.
A16z crypto emphasizes that cybersecurity is âno longer optional,â adding forward that it has become a ânecessity.â