If You Are a Victim of Telegram Crypto Scams—Read This Carefully
1. How Telegram Crypto Scams Work & Common Tactics
Telegram itself is merely a messaging app. The scams exploit anonymity, closed private groups, and bots to deceive victims and induce mistakes.
In practice, perpetrators use false information or exaggerated profit promises to mislead victims into making incorrect decisions and then misappropriate their assets.
They often rush decisions with phrases like “signal room,” “VIP,” “inside information,” “kimchi premium,” “airdrop,” or “high-yield staking,” following a recurring pattern:
deposit inducement (deception) → withdrawal restrictions (retaining proceeds and concealing losses) → requests for additional payments (secondary deception) → disappearance (evidence destruction and flight).
Legally, fraud can already be established at the moment of the initial deposit inducement. Subsequent stages may constitute a continuation of the offense or separate counts of fraud.
Common scam types include:
-
Signal-room schemes: Promising “multiple-X returns” or “stop-loss lines,” then charging membership or commission fees.
-
Fake exchanges/apps: Luring users via links, showing fake profits, then blocking withdrawals.
-
Advance withdrawal fee schemes: Demanding extra transfers for “fees,” “taxes,” or “KYC costs” before withdrawal.
-
Wallet connection/signature scams: Inducing wallet connections or signatures under the guise of verification or airdrops to drain assets.
-
OTC direct-deal scams: Promising USDT exchange or similar services, taking the transfer, then cutting contact.
2. Telegram Crypto Scam Red Flags
The more of the following that apply, the higher the likelihood of deception:
-
Guaranteed principal or profits.
-
Pressure to decide quickly and discouragement of external verification.
-
Claims that additional deposits are required to withdraw.
-
Vague or unverifiable exchange/project information; difficulty confirming official channels.
-
Requests to transfer funds to third-party accounts or personal wallet addresses.
-
Instructions to delete chats, prohibit screenshots, or otherwise avoid leaving evidence.
3. What to Do Within 24 Hours & How to Secure Evidence
First, stop all additional transfers immediately. Claims like “withdrawal will be released once you pay the fee” often lead to secondary losses.
Preserve evidence: Telegram chats can be auto-deleted or removed by the other party. Immediately save screenshots, screen recordings, and exported chats for group rooms, DMs, announcements, and instructions.
Collect evidence: Counterparty IDs, room links/names, inducement messages, deposit/withdrawal records, TXIDs, wallet addresses, timestamps and amounts, and KRW transfer records (recipient name and account).
Create a timeline: Summarize on a single page “when–who–what was said–where–how much was sent.”
Immediate actions:
-
KRW transfers: Contact the relevant financial institution at once to request payment suspension for suspected scam accounts pursuant to the Electronic Financial Transactions Act. Upon report, the institution should promptly suspend payments where scam use is suspected.
-
Crypto transfers: As virtual assets are not directly covered by the Act, contact the relevant exchange immediately to request withdrawal blocking under its terms, and file a report with investigative authorities to seek exchange cooperation and on-chain tracing.
Parallel legal steps:
-
Criminal complaint: File promptly for fraud (Criminal Act Art. 347) to enable investigation, suspect identification, and asset tracing.
-
Civil action: If the perpetrator’s identity and assets can be identified, consider a damages claim (Civil Act Arts. 750, 751) and pre-judgment attachment to prevent asset dissipation.
-
Recovery options: Consider compensation orders within criminal proceedings or applications for crime-victim relief funds, where applicable.
4. How Decent Law Firm Can Help
Decent Law Firm structures the facts to identify key deception points and fund flows required for complaints and petitions.
We systematize chat records, transaction histories, and wallet movements into evidentiary packages aligned with investigative tracing and recovery procedures, while assessing the practicality of civil measures such as attachments and damages claims to maximize cost-effectiveness.
Above all, we focus on preventing secondary losses at the most vulnerable stage—additional payment inducements—by providing clear, timely guidance. If you have been affected, we encourage you to seek advice before it’s too late.