Cryptocurrency Scam Recovery and Legal Remedies in the Philippines

A Philippine Legal Article

I. Introduction

Cryptocurrency scams in the Philippines have become common because digital assets can be transferred quickly, pseudonymously, across borders, and often without the chargeback protections found in traditional banking. Victims may lose money through fake exchanges, investment schemes, romance scams, impersonation, phishing, wallet-draining links, fake mining platforms, pump-and-dump groups, bogus trading bots, “pig butchering” scams, fake airdrops, fake customer support, recovery scams, and fraudulent online sellers accepting crypto payments.

The legal question is not only whether the victim can “reverse” a crypto transaction. In most cases, blockchain transfers cannot simply be reversed. The more important questions are:

  1. who induced the transfer;
  2. what representations were made;
  3. where the crypto went;
  4. whether any identifiable exchange, wallet provider, bank, e-wallet, or local person was involved;
  5. whether the scammer can be traced;
  6. whether funds can be frozen before they move further;
  7. whether criminal, civil, regulatory, or data privacy remedies are available;
  8. whether the victim can avoid further loss through fake “recovery” schemes.

The central principle is this: cryptocurrency transactions may be technologically irreversible, but fraud involving cryptocurrency is still legally actionable. A scammer cannot avoid liability merely because the asset used was Bitcoin, Ether, USDT, or another digital token.


II. What Is a Cryptocurrency Scam?

A cryptocurrency scam is a fraudulent scheme involving digital assets. It may involve inducing a victim to buy, transfer, deposit, invest, stake, swap, or reveal access to cryptocurrency through deception.

Common crypto assets involved include:

  1. Bitcoin;
  2. Ether;
  3. USDT;
  4. USDC;
  5. BNB;
  6. SOL;
  7. XRP;
  8. TRX;
  9. meme coins;
  10. newly issued tokens;
  11. NFTs;
  12. stablecoins;
  13. wrapped tokens;
  14. liquidity pool tokens.

A scam may involve actual cryptocurrency transfers, fake balances on a website, fraudulent investment contracts, or theft of wallet credentials.


III. Common Cryptocurrency Scam Types

A. Fake Investment Platform

The victim is invited to invest in a crypto platform promising high returns. The website shows profits, but withdrawals are blocked unless the victim pays additional fees, taxes, or verification charges.

B. Pig Butchering Scam

The scammer builds trust over weeks or months, often through romance, friendship, or business networking. The victim is gradually persuaded to invest in a fake crypto platform. The platform shows artificial profits, then blocks withdrawal.

C. Fake Exchange

A website or app pretends to be a crypto exchange. Victims deposit crypto or fiat, but the platform is controlled by scammers.

D. Phishing

The victim enters seed phrases, private keys, exchange credentials, or one-time passwords into a fake website. The wallet or account is then drained.

E. Wallet Drainer

The victim connects a wallet to a malicious website or signs a malicious transaction. Tokens are transferred or approvals are abused.

F. Fake Airdrop or Giveaway

Victims are told they will receive free tokens if they connect a wallet, send a “verification” amount, or provide seed phrases.

G. Impersonation Scam

Scammers impersonate exchanges, celebrities, government agencies, lawyers, crypto support staff, or trusted friends.

H. Fake Mining or Staking

Victims are told they can earn passive income through cloud mining, liquidity mining, or staking. The platform is fake or locks withdrawals.

I. Pump-and-Dump or Rug Pull

Promoters hype a token, attract buyers, then sell their holdings or drain liquidity, causing the token price to collapse.

J. Fake Crypto Loan or Recovery Fee

Victims are told they must pay fees to unlock crypto, pay taxes, activate withdrawal, or recover stolen funds. Each fee leads to another demand.

K. Fake Job or Task Scam

The victim is asked to complete tasks and deposit crypto to unlock commissions. The platform later blocks withdrawal.

L. Online Seller Crypto Scam

The seller accepts crypto payment for goods or services but never delivers.


IV. Why Crypto Scams Are Difficult to Recover

Crypto recovery is difficult because:

  1. blockchain transactions are usually irreversible;
  2. wallets may be pseudonymous;
  3. scammers move funds quickly;
  4. funds may pass through multiple wallets;
  5. funds may be swapped across chains;
  6. mixers or privacy tools may be used;
  7. exchanges may be foreign;
  8. scammers use fake identities;
  9. victims often delay reporting;
  10. scammers demand additional payments after the first loss;
  11. recovery scammers target victims;
  12. law enforcement may need cross-border cooperation.

However, recovery is not impossible. Recovery chances improve if funds reach a regulated exchange, a local bank or e-wallet was used, a scammer is identifiable, or the victim acts quickly.


V. Legal Characterization in the Philippines

A crypto scam may be treated as:

  1. estafa or swindling;
  2. cyber-related fraud;
  3. unauthorized investment solicitation;
  4. securities law violation, depending on the scheme;
  5. money laundering-related activity;
  6. theft or qualified theft in some contexts;
  7. identity theft;
  8. phishing or illegal access;
  9. falsification, if fake documents were used;
  10. violation of consumer protection or financial regulations;
  11. civil fraud;
  12. breach of contract;
  13. unjust enrichment;
  14. violation of data privacy law.

The legal theory depends on facts. A fake investment platform differs from a stolen wallet. A failed legitimate investment differs from fraud. A bad trade is not automatically a scam.


VI. Cryptocurrency as Property or Value

Although cryptocurrency is not ordinary cash, it represents value and may be treated as property, asset, or virtual asset for legal and regulatory purposes. It can be owned, transferred, stolen, traced, valued, and subjected to legal claims.

A victim should document:

  1. type of token;
  2. amount transferred;
  3. date and time;
  4. blockchain network;
  5. transaction hash;
  6. wallet address sent from;
  7. wallet address sent to;
  8. peso value at time of transfer;
  9. exchange used;
  10. communications inducing the transfer.

The legal complaint should translate crypto loss into understandable value.


VII. Estafa or Swindling

Many crypto scams fit the concept of estafa because the victim transfers money or assets due to deceit.

Possible estafa theory:

  1. the scammer represented that the investment, exchange, wallet, mining operation, or trading opportunity was legitimate;
  2. the representation was false;
  3. the victim relied on the representation;
  4. the victim transferred crypto or money;
  5. the scammer misappropriated, retained, or diverted the value;
  6. the victim suffered damage.

Deceit may be shown through fake profits, fake dashboards, guaranteed return promises, fake licenses, fake company names, fake customer support, fake tax demands, false withdrawal instructions, or impersonation.


VIII. Cybercrime Aspect

Crypto scams are usually committed through information and communications technology. This may involve:

  1. websites;
  2. mobile apps;
  3. social media accounts;
  4. messaging platforms;
  5. email;
  6. QR codes;
  7. phishing pages;
  8. exchange accounts;
  9. wallet apps;
  10. smart contracts;
  11. fake trading dashboards;
  12. online advertisements.

The online nature of the scam may support cybercrime-related complaints or investigation by cybercrime authorities.


IX. Unauthorized Investment Solicitation

Some crypto scams are investment schemes. They promise returns from trading, mining, staking, arbitrage, AI bots, token presales, or pooled funds.

Red flags include:

  1. guaranteed profits;
  2. fixed daily or weekly returns;
  3. referral commissions;
  4. promise of principal protection;
  5. “no risk” claims;
  6. unlicensed investment solicitation;
  7. use of corporate registration as if it were investment authority;
  8. fake certificates;
  9. pressure to recruit;
  10. inability to explain actual business model;
  11. withdrawal blocked by fake taxes;
  12. payments made from later investors.

If the scheme involves solicitation of investments from the public, securities and investment regulations may become relevant.


X. Difference Between Fraud and Market Loss

Not every crypto loss is a scam. A person may lose money because:

  1. token price fell;
  2. market volatility occurred;
  3. the project failed despite genuine effort;
  4. the user made a wrong trade;
  5. the user sent to the wrong address;
  6. gas fees were high;
  7. liquidity was low;
  8. the user misunderstood DeFi risks;
  9. the exchange lawfully froze the account for compliance review;
  10. the user violated platform terms.

A legal complaint is stronger when it shows deception, unauthorized access, misrepresentation, theft, or bad-faith refusal to release funds.

The core question is: was the loss caused by fraud or by ordinary investment risk?


XI. Immediate Steps After a Crypto Scam

A victim should act quickly:

  1. stop sending more money or crypto;
  2. do not pay withdrawal taxes, clearance fees, or recovery fees;
  3. preserve all chats, emails, websites, and receipts;
  4. copy transaction hashes;
  5. screenshot wallet addresses;
  6. screenshot fake platform dashboards;
  7. report to the exchange or wallet provider used;
  8. request freezing or flagging if funds went to an exchange;
  9. report to banks or e-wallets if fiat was used;
  10. file a report with cybercrime authorities or police;
  11. prepare a complaint-affidavit;
  12. secure all accounts and devices;
  13. revoke malicious wallet permissions;
  14. move remaining assets to a clean wallet;
  15. warn contacts if identity or accounts were compromised.

Speed matters because scammers move assets quickly.


XII. Evidence Checklist

A strong crypto scam complaint should include:

  1. complainant’s valid ID;
  2. full narrative of what happened;
  3. scammer’s name, alias, username, phone number, email, and profile links;
  4. website URL or app name;
  5. screenshots of advertisements;
  6. screenshots of investment promises;
  7. chat history;
  8. emails;
  9. fake licenses or certificates;
  10. fake dashboards showing profits;
  11. deposit instructions;
  12. wallet addresses;
  13. QR codes;
  14. transaction hashes;
  15. blockchain explorer screenshots;
  16. exchange deposit or withdrawal records;
  17. bank or e-wallet receipts used to buy crypto;
  18. proof of peso value;
  19. withdrawal request screenshots;
  20. fee or tax demands;
  21. evidence of blocked account or disappearance;
  22. IP, domain, or hosting details if available;
  23. names of other victims, if known;
  24. timeline of events;
  25. device compromise evidence, if phishing or wallet draining occurred.

The more complete the evidence, the better the chances of investigation.


XIII. Blockchain Evidence

Blockchain transactions are public on many networks. Useful information includes:

  1. transaction hash;
  2. sender wallet;
  3. receiving wallet;
  4. token contract address;
  5. chain or network used;
  6. timestamp;
  7. amount;
  8. transaction status;
  9. subsequent transfers;
  10. exchange deposit address, if identifiable.

A transaction hash is very important. It allows investigators or exchanges to verify the transfer independently.


XIV. How to Document Transaction Hashes

For every transfer, record:

  1. date and time;
  2. token;
  3. amount;
  4. network;
  5. transaction hash;
  6. sender address;
  7. recipient address;
  8. exchange or wallet used;
  9. screenshot from wallet app;
  10. screenshot from blockchain explorer.

Do not provide only cropped screenshots. Save the full transaction page where possible.


XV. Wallet Addresses and Networks

A common mistake is giving only a wallet address without the network. The same-looking address may be used on different chains.

For example, USDT may move through:

  1. Ethereum;
  2. Tron;
  3. BNB Smart Chain;
  4. Polygon;
  5. Arbitrum;
  6. Optimism;
  7. Solana;
  8. other supported networks.

A complaint should specify the network. A transaction on Tron is not the same as a transaction on Ethereum.


XVI. Reporting to Exchanges

If the victim used a centralized exchange, report immediately to that exchange.

Provide:

  1. account email or user ID;
  2. transaction hash;
  3. deposit or withdrawal record;
  4. receiving address;
  5. scam description;
  6. police report, if available;
  7. request to freeze or flag destination account if within exchange control;
  8. request for preservation of records.

If funds were sent to another exchange’s deposit address, report to that exchange as well. Some exchanges may freeze funds if contacted quickly with sufficient evidence and official law enforcement follow-up.


XVII. Limits of Exchange Assistance

Exchanges may not be able to reverse blockchain transactions. They may assist if:

  1. the recipient is an exchange user;
  2. funds are still within their system;
  3. the account can be identified;
  4. a law enforcement request is made;
  5. funds have not been withdrawn;
  6. internal compliance rules allow freezing.

If funds were sent to a self-custody wallet controlled by the scammer, exchange recovery may be limited.


XVIII. Reporting to Banks and E-Wallets

Many crypto scams start with fiat payment through bank transfer, GCash, Maya, remittance, or card payment. Report these immediately.

Provide:

  1. recipient account name;
  2. account number or wallet number;
  3. amount;
  4. date and time;
  5. reference number;
  6. screenshots of scam communications;
  7. proof that payment was induced by fraud;
  8. request for freezing, reversal, or investigation.

If the victim bought crypto through a legitimate exchange using fiat, the bank may not reverse the purchase merely because the victim later sent crypto to a scammer. But the bank report may still help if a local mule account was involved.


XIX. Reporting to Law Enforcement

A victim may report to police cybercrime units, NBI cybercrime authorities, or the prosecutor’s office depending on the circumstances.

The report should include:

  1. complete timeline;
  2. identities or aliases;
  3. platform details;
  4. communications;
  5. transaction hashes;
  6. wallet addresses;
  7. bank or e-wallet transactions;
  8. amount lost in pesos;
  9. explanation of deception;
  10. request for investigation.

Authorities may use the complaint to trace accounts, coordinate with exchanges, issue subpoenas, or request data preservation.


XX. Complaint-Affidavit Structure

A crypto scam complaint-affidavit may be structured as follows:

  1. personal details of complainant;
  2. how the complainant encountered the scammer or platform;
  3. what the scammer represented;
  4. why the complainant believed the representation;
  5. dates and amounts transferred;
  6. crypto assets involved;
  7. transaction hashes and wallet addresses;
  8. withdrawal or recovery attempts;
  9. excuses, fee demands, or account blocking;
  10. total loss in crypto and peso value;
  11. evidence attached;
  12. request for investigation and prosecution.

The complaint should be factual and chronological.


XXI. Sample Complaint Narrative

A concise narrative may read:

“On 15 February 2026, I was contacted through Telegram by a person using the name ___. The person introduced a cryptocurrency trading platform at ___. The platform represented that deposits would be traded through an automated arbitrage system producing daily profits. I was shown a dashboard reflecting profits and was told I could withdraw at any time. Relying on these representations, I transferred 2,000 USDT through the Tron network to wallet address ___. The transaction hash is ___. After the dashboard showed a balance of 3,800 USDT, I requested withdrawal. The platform refused and demanded that I first pay 500 USDT as tax. After I refused, my account was frozen and the Telegram account blocked me. I later discovered that the website and profits were fake. Attached are screenshots of chats, website, dashboard, wallet transfer, transaction hash, and withdrawal demand.”

This narrative identifies deception, reliance, transfer, and loss.


XXII. Civil Remedies

A victim may pursue civil remedies where the scammer or responsible party is identifiable.

Possible civil claims include:

  1. recovery of money or property;
  2. damages for fraud;
  3. rescission of fraudulent transaction;
  4. unjust enrichment;
  5. breach of contract;
  6. tort damages;
  7. moral damages in proper cases;
  8. exemplary damages in proper cases;
  9. attorney’s fees where legally allowed.

Civil recovery depends on identifying defendants and locating assets. If the scammer is anonymous or abroad, civil litigation may be difficult.


XXIII. Criminal Remedies

Criminal remedies may include complaints for:

  1. estafa;
  2. cyber-related fraud;
  3. illegal access or hacking;
  4. identity theft;
  5. falsification;
  6. theft-related offenses;
  7. money laundering-related investigation;
  8. unauthorized investment-taking;
  9. threats or coercion, if used;
  10. other offenses based on facts.

Criminal proceedings may help compel production of records, identify account holders, and support asset freezing. They may also include civil liability arising from the offense.


XXIV. Regulatory Remedies

Regulatory complaints may be appropriate when the scam involves:

  1. unauthorized investment solicitation;
  2. fake exchange;
  3. misuse of corporate registration;
  4. fake SEC or government approval;
  5. financial product misrepresentation;
  6. payment provider involvement;
  7. virtual asset service provider misconduct;
  8. data privacy violation;
  9. consumer deception.

Regulatory remedies can help stop the scheme and support enforcement, though they may not guarantee individual recovery.


XXV. Data Privacy Remedies

Crypto scams often involve misuse of personal data. Victims may have submitted:

  1. passports;
  2. driver’s licenses;
  3. national IDs;
  4. selfies;
  5. proof of address;
  6. bank statements;
  7. exchange KYC details;
  8. wallet screenshots;
  9. phone numbers;
  10. email addresses.

If scammers misuse personal data, threaten exposure, or use IDs for identity theft, the victim may file data privacy-related complaints and take protective steps.


XXVI. Device and Wallet Security After a Scam

After a scam, legal action is not enough. The victim must secure remaining assets.

Steps include:

  1. disconnect wallet from suspicious sites;
  2. revoke token approvals;
  3. move remaining assets to a new clean wallet;
  4. create new seed phrase offline;
  5. never reuse compromised seed phrase;
  6. scan device for malware;
  7. uninstall suspicious apps or browser extensions;
  8. change exchange passwords;
  9. enable two-factor authentication;
  10. change email password;
  11. check API keys;
  12. check withdrawal whitelist;
  13. revoke remote access apps;
  14. secure SIM and phone number;
  15. monitor accounts.

If the seed phrase was exposed, the wallet should be treated as permanently compromised.


XXVII. Seed Phrase and Private Key Theft

A wallet seed phrase or private key gives control over crypto. No legitimate exchange, wallet support, airdrop, or recovery agent should ask for it.

If a victim gave a seed phrase:

  1. assume the wallet is compromised;
  2. immediately move remaining assets to a new wallet if any remain;
  3. do not send more funds to the old wallet;
  4. revoke approvals if possible;
  5. preserve scam communications;
  6. report theft.

Legal complaints should state how the seed phrase was obtained through deception.


XXVIII. Malicious Token Approvals

In DeFi scams, victims may sign approvals allowing a malicious contract to spend tokens. The funds may be drained later.

Evidence includes:

  1. wallet connection history;
  2. signed transaction hash;
  3. malicious contract address;
  4. approval transaction;
  5. draining transaction;
  6. website used;
  7. screenshots of fake airdrop or staking page.

The victim should revoke approvals and move remaining assets.


XXIX. Fake Recovery Services

Recovery scams are extremely common. After a victim loses crypto, fake recovery agents claim they can recover funds for a fee.

Red flags include:

  1. guaranteed recovery;
  2. demand for upfront fee;
  3. request for seed phrase;
  4. request for remote access;
  5. claim of hacking the blockchain;
  6. fake court or regulator certificate;
  7. payment required to release recovered funds;
  8. fake screenshots of recovered balance;
  9. pressure to act quickly;
  10. refusal to provide real identity or contract;
  11. claim of insider access to exchanges;
  12. use of Gmail, Telegram, or WhatsApp only.

Most “crypto recovery” offers online are scams. Real recovery usually involves evidence preservation, exchange reports, blockchain tracing, legal complaints, and law enforcement cooperation.


XXX. Difference Between Blockchain Tracing and Recovery

Blockchain tracing can identify where funds moved. It does not automatically recover funds.

Tracing may show:

  1. scam wallet;
  2. intermediate wallets;
  3. exchange deposit;
  4. bridge transactions;
  5. swaps;
  6. mixer use;
  7. cash-out points;
  8. related victim deposits.

Recovery requires action against a person, exchange account, bank account, or asset. Tracing is a tool, not a guarantee.


XXXI. Asset Freezing

Asset freezing may be possible if funds reach a centralized exchange or identifiable account. The victim should act quickly and provide evidence.

Possible freezing channels include:

  1. exchange internal fraud report;
  2. law enforcement request;
  3. court order;
  4. regulator coordination;
  5. anti-money laundering procedures;
  6. payment provider hold;
  7. bank account freeze in proper cases.

Self-custody wallets generally cannot be frozen by ordinary legal request unless the private key holder is identified or an exchange controls the wallet.


XXXII. Anti-Money Laundering Dimension

Large crypto scams may involve money laundering concerns, especially when proceeds pass through exchanges, banks, e-wallets, mule accounts, or multiple wallets.

Victims should not attempt vigilante recovery or participate in suspicious fund transfers. If a scammer asks the victim to receive or forward crypto “to help unlock funds,” that may expose the victim to legal risk.

Report suspicious flows to proper authorities and regulated platforms.


XXXIII. If the Scammer Is Known Personally

Some crypto scams are committed by acquaintances, relatives, coworkers, romantic partners, or local investment promoters.

This improves recovery chances because the respondent can be identified.

Possible steps:

  1. send demand letter;
  2. preserve communications;
  3. request written accounting;
  4. file barangay complaint if applicable and appropriate;
  5. file criminal complaint;
  6. file civil action;
  7. seek provisional remedies where legally available;
  8. gather other victims.

Avoid informal settlement without written acknowledgment and payment schedule.


XXXIV. If the Scammer Is Abroad

If the scammer is abroad, recovery is harder but not impossible.

Important evidence includes:

  1. foreign phone number;
  2. social media accounts;
  3. exchange account details;
  4. bank accounts;
  5. wallet addresses;
  6. passport or identity claimed;
  7. platform domain registration;
  8. emails;
  9. language and location clues;
  10. other victims in same country.

Cross-border enforcement may require cooperation through exchanges, foreign law enforcement, or civil proceedings abroad. For small losses, practical recovery may be limited. For large losses, specialized legal assistance may be necessary.


XXXV. If the Platform Is Fake but Uses a Real Company Name

Scammers often impersonate real exchanges, banks, investment firms, or government agencies. The victim should identify the exact website, app, and account used.

Do not automatically accuse the real company if the scammer used a cloned site. The complaint should state:

  1. exact domain;
  2. exact app link;
  3. exact user account;
  4. exact payment address;
  5. how it differs from official channels.

The legitimate company may help confirm impersonation.


XXXVI. Fake Government or Tax Demands

Scammers often claim that withdrawals are blocked because the victim must pay:

  1. tax;
  2. AML clearance;
  3. anti-terrorism fee;
  4. wallet activation fee;
  5. exchange certification fee;
  6. regulator approval fee;
  7. notarization fee;
  8. blockchain gas fee;
  9. insurance;
  10. account upgrade.

A legitimate tax or regulatory obligation is not usually paid by sending crypto to a platform’s random wallet. Demands for additional crypto before withdrawal are major scam indicators.


XXXVII. Withdrawal Fee Trap

A common pattern:

  1. victim deposits crypto;
  2. fake dashboard shows profit;
  3. victim requests withdrawal;
  4. platform demands tax or fee;
  5. victim pays;
  6. platform demands another fee;
  7. account is frozen;
  8. scammer disappears.

The victim should stop at the first additional-fee demand and document it. Paying more rarely results in recovery.


XXXVIII. Fake Profit Dashboard

Many scam websites show fake balances and profits. These numbers do not prove that real crypto exists.

Evidence of a fake dashboard includes:

  1. no verifiable exchange order history;
  2. no blockchain proof of profits;
  3. withdrawal blocked;
  4. profits too consistent;
  5. platform only accessible through referral link;
  6. domain recently created;
  7. support only through chat;
  8. taxes or fees required before withdrawal;
  9. no real company identity;
  10. identical dashboard used by other victims.

The legal claim should focus on actual money or crypto sent by the victim, not only displayed profits.


XXXIX. Recovery of Displayed Profits Versus Actual Deposits

Victims often ask whether they can recover the profits shown on the fake platform.

There is a distinction:

  1. Actual deposits — money or crypto actually transferred by the victim. These are easier to prove as loss.
  2. Additional fees — crypto or money paid to unlock withdrawal. These are also actual losses.
  3. Displayed profits — numbers shown by the scam platform. These may be fake and harder to claim unless there is a valid contract or actual trading proof.

A complaint should compute direct losses clearly.

Example:

  • Initial deposit: 5,000 USDT
  • Additional “tax” paid: 1,000 USDT
  • Displayed balance: 25,000 USDT
  • Direct loss: 6,000 USDT

The direct loss is the strongest claim.


XL. Romance and Crypto Scams

Romance-based crypto scams often involve emotional manipulation. The scammer may build intimacy, discuss marriage, share fake trading success, and pressure the victim to invest.

Red flags:

  1. refuses video calls or uses excuses;
  2. quickly becomes romantic;
  3. claims to be wealthy trader;
  4. introduces exclusive investment platform;
  5. discourages independent research;
  6. tells victim to keep it secret;
  7. helps victim make small successful withdrawal;
  8. pressures larger deposits;
  9. withdrawal blocked after large investment;
  10. asks for taxes or fees.

The complaint should include both emotional deception and financial transfers.


XLI. Job and Task Crypto Scams

In task scams, victims are offered online jobs rating products, clicking ads, or completing orders. They must deposit crypto to unlock tasks or commissions.

Legal theory:

  1. false employment or earning opportunity;
  2. deceptive platform balance;
  3. induced crypto deposits;
  4. withdrawal blocked;
  5. escalating deposit requirements.

Evidence includes job ad, recruiter chats, task dashboard, deposit addresses, transaction hashes, and withdrawal messages.


XLII. Fake Trading Bot or AI Investment

Scammers may claim an AI bot will trade crypto with guaranteed returns. They may show fake results and testimonials.

Red flags:

  1. guaranteed profit;
  2. secret algorithm;
  3. no audited performance;
  4. no risk disclosure;
  5. referral rewards;
  6. withdrawal fees;
  7. fake exchange integration;
  8. control of funds by promoter;
  9. pressure to increase capital;
  10. no real company or license.

A legitimate trading bot cannot guarantee profits.


XLIII. Rug Pulls and Token Scams

A rug pull occurs when developers or insiders abandon a token project, drain liquidity, mint excessive tokens, disable selling, or manipulate smart contracts.

Legal issues may include fraud if there were false representations, hidden control, misappropriation of funds, or deceptive promotion.

Evidence includes:

  1. whitepaper;
  2. website;
  3. developer statements;
  4. token contract;
  5. liquidity pool transactions;
  6. promoter posts;
  7. wallet movements;
  8. promises made;
  9. investor funds raised;
  10. sudden disappearance.

Not every failed token is a rug pull. Fraud must be shown.


XLIV. NFT Scams

NFT scams may involve fake collections, stolen art, fake minting sites, wallet drainers, fake marketplace links, or unfulfilled roadmaps.

Possible remedies depend on whether there was:

  1. stolen intellectual property;
  2. phishing;
  3. fraudulent sale;
  4. rug pull;
  5. breach of promised utility;
  6. impersonation;
  7. unauthorized wallet access.

Evidence includes marketplace links, transaction hashes, wallet addresses, project communications, and promotional promises.


XLV. Phishing Through Fake Exchange Support

Scammers impersonate exchange support and ask for:

  1. password;
  2. OTP;
  3. seed phrase;
  4. remote access;
  5. screen share;
  6. API keys;
  7. verification deposit;
  8. wallet connection.

No legitimate support staff should ask for seed phrases or passwords. If the victim disclosed credentials, immediately contact the real exchange and secure accounts.


XLVI. SIM Swap and Account Takeover

Crypto theft may involve SIM swap or email compromise. The scammer gains access to OTPs and exchange accounts.

Evidence includes:

  1. sudden loss of mobile signal;
  2. unauthorized SIM replacement;
  3. password reset emails;
  4. exchange login alerts;
  5. unauthorized withdrawals;
  6. telecom reports;
  7. bank or e-wallet alerts;
  8. IP address logs, if available.

Remedies may involve telecom complaint, exchange report, cybercrime complaint, and data privacy issues.


XLVII. Unauthorized Exchange Withdrawal

If crypto was withdrawn from an exchange account without authorization, report immediately to the exchange.

Provide:

  1. account ID;
  2. time of unauthorized login;
  3. withdrawal transaction;
  4. destination address;
  5. device and IP logs, if available;
  6. proof of 2FA compromise;
  7. police report, if available;
  8. request account freeze and record preservation.

The exchange may investigate whether the withdrawal was caused by compromised credentials, phishing, SIM swap, malware, or internal issue.


XLVIII. Wrong Address or Wrong Network Transfers

A mistaken transfer is different from a scam. If the user sent crypto to the wrong address or wrong network, recovery depends on whether the recipient can be identified and whether the receiving platform supports recovery.

Legal remedies are limited if no fraud occurred. However, if someone knowingly retains crypto received by mistake and can be identified, civil remedies may be explored.


XLIX. Crypto Sent to a Scammer’s Exchange Deposit Address

If the receiving address belongs to an exchange account, recovery chances may be better.

Steps:

  1. identify exchange if possible;
  2. report transaction hash to sending exchange;
  3. report to receiving exchange;
  4. file police or cybercrime report;
  5. request preservation and freeze;
  6. provide proof of scam;
  7. follow up quickly.

Exchanges may require law enforcement request before disclosing account information or freezing assets.


L. Crypto Sent to Self-Custody Wallet

If funds were sent to a private wallet controlled by the scammer, recovery is harder. There is no central party to reverse the transaction.

Possible steps:

  1. trace subsequent transfers;
  2. monitor if funds reach an exchange;
  3. report wallet address to exchanges and blockchain analytics services where available;
  4. include address in legal complaint;
  5. coordinate with authorities;
  6. avoid sending more money.

LI. Use of Mixers and Privacy Coins

Scammers may use mixers, privacy coins, chain-hopping, or bridges to obscure funds.

This complicates tracing but does not erase evidence of the original fraudulent transfer. The complaint can still proceed against identifiable persons, platforms, promoters, or accounts.


LII. Cross-Chain Bridges and Swaps

Scammers may move funds through bridges or decentralized exchanges. Victims should preserve:

  1. original transaction hash;
  2. bridge transaction;
  3. destination chain;
  4. swapped token;
  5. new wallet addresses;
  6. timestamps;
  7. blockchain explorer links.

Specialized tracing may be needed for large losses.


LIII. Demand Letter

A demand letter may be useful if the respondent is identifiable. It may demand:

  1. return of crypto or peso equivalent;
  2. accounting of funds;
  3. preservation of records;
  4. cessation of harassment;
  5. confirmation of identity and address;
  6. response within a fixed period.

A demand letter may not be useful against anonymous scammers because it may warn them to move funds or destroy evidence.


LIV. Settlement

If a scammer offers settlement, be cautious. Scammers may use settlement talks to delay, extract more money, or obtain more personal information.

A safe settlement should include:

  1. written acknowledgment of amount owed;
  2. clear payment schedule;
  3. no additional fees by victim;
  4. payment through traceable channel;
  5. no sharing of seed phrases or credentials;
  6. legal review for large amounts;
  7. no withdrawal of complaint until funds are actually received, unless legally advised.

LV. Civil Case and Provisional Remedies

In larger cases where the defendant is known and assets exist, a civil action may include requests for provisional remedies if legally justified. These may aim to preserve assets while the case is pending.

The availability of such remedies depends on evidence, urgency, and court approval. They are technical and require legal counsel.


LVI. Criminal Case and Civil Liability

In a criminal case, the court may also address civil liability arising from the crime unless separately reserved or waived. This may include return of value or damages.

However, criminal conviction and actual recovery are different. Even if liability is established, collection depends on the defendant’s assets.


LVII. Valuation of Crypto Loss

A complaint should state both crypto amount and peso equivalent.

Possible valuation points:

  1. value at time of transfer;
  2. value at time of discovery;
  3. value at filing;
  4. amount originally paid to acquire the crypto;
  5. amount represented by scammer.

For clarity, use the value at time of loss and attach exchange records where possible.

Example:

“On 10 March 2026, I transferred 1 BTC, then valued at approximately ₱___ based on my exchange purchase record.”


LVIII. Tax Issues for Victims

Victims often worry about tax issues. A scam loss does not automatically mean tax liability, but crypto gains, trading, and business activity may have tax consequences. If the scam involved investment profits shown only on a fake dashboard, those may not be real income.

For large losses or business-related crypto activity, tax advice may be necessary. The legal complaint should focus on actual transfers and losses.


LIX. If the Victim Participated in an Illegal Scheme

Some crypto scams involve illegal or questionable activities, such as money mule arrangements, illegal gambling, unregistered securities, or promises to help launder funds.

Victims should be truthful and seek legal advice. The fact that the victim was deceived may matter, but knowingly participating in illegal conduct can create exposure.

Do not fabricate facts to make the transaction appear lawful.


LX. Crypto Used in Online Casino Scams

Crypto may be used to fund fake online casinos. The same principles apply:

  1. false promotion;
  2. deposit induced by deception;
  3. fake winnings dashboard;
  4. withdrawal blocked;
  5. extra fee demanded;
  6. crypto transferred to scam wallet.

The claim should focus on fraud, not merely gambling loss.


LXI. Crypto Used in Fake Seller Scams

If a fake seller accepts crypto and fails to deliver, evidence should include:

  1. item listing;
  2. chat agreement;
  3. wallet address;
  4. transaction hash;
  5. promised delivery;
  6. non-delivery proof;
  7. seller disappearance;
  8. peso value.

Legal remedies may include estafa and civil recovery if the seller is identifiable.


LXII. Crypto Used in Loan or Lending Scams

Some scammers offer crypto loans but require advance collateral, processing fees, or wallet activation fees. After payment, no loan is released.

Evidence includes:

  1. loan offer;
  2. promised terms;
  3. fees requested;
  4. wallet address;
  5. transaction hashes;
  6. refusal or disappearance.

This may be treated as advance-fee fraud.


LXIII. Crypto Mining Scams

Mining scams promise returns from cloud mining or mining equipment. They may show fake mining dashboards and require reinvestment.

Red flags:

  1. guaranteed daily mining income;
  2. no proof of mining facility;
  3. no equipment ownership records;
  4. referral bonuses;
  5. locked withdrawals;
  6. maintenance fees before withdrawal;
  7. fake hash rate display;
  8. anonymous operators.

The complaint should show false representations and payments.


LXIV. Crypto Staking and Liquidity Mining Scams

Fake staking platforms claim users can earn high yields. Victims deposit tokens or connect wallets. Funds are then locked or drained.

Evidence includes:

  1. staking website;
  2. smart contract address;
  3. wallet approval;
  4. deposit transaction;
  5. promised APY;
  6. withdrawal refusal;
  7. messages from support;
  8. fee demands.

Legitimate DeFi also carries risk, so fraud evidence is essential.


LXV. Referral Commission and Pyramid Features

Some crypto scams rely on recruitment. Victims earn or appear to earn commissions from inviting others.

Red flags:

  1. income depends on recruitment;
  2. fixed returns paid from new members;
  3. high referral bonuses;
  4. leadership ranks;
  5. deposit packages;
  6. withdrawal limits;
  7. pressure to invite friends;
  8. no real product or trading proof.

This may support claims of unauthorized investment solicitation or fraudulent scheme.


LXVI. Corporate Registration Does Not Equal Investment Authority

Scammers often show corporate registration documents to prove legitimacy. Corporate registration alone does not necessarily authorize the company to solicit investments, operate an exchange, or offer financial products.

A victim should preserve any registration documents shown, but the complaint should explain how the documents were used to mislead.


LXVII. Fake Licenses and Certifications

Scammers use fake certificates from:

  1. SEC;
  2. BSP;
  3. foreign regulators;
  4. tax agencies;
  5. blockchain associations;
  6. fake auditors;
  7. fake insurance companies;
  8. fake anti-money laundering offices.

Using fake documents may support falsification, fraud, and misrepresentation claims.


LXVIII. Public Warnings and Advisories

Regulators may issue advisories against crypto investment schemes. These can support a complaint, but the victim’s own evidence remains necessary.

A victim should not rely solely on a public warning. Attach personal transaction proof and communications.


LXIX. Social Media Evidence

Crypto scams often operate through:

  1. Facebook;
  2. Telegram;
  3. WhatsApp;
  4. Viber;
  5. Discord;
  6. X/Twitter;
  7. Instagram;
  8. TikTok;
  9. YouTube;
  10. dating apps.

Preserve:

  1. profile links;
  2. usernames;
  3. group names;
  4. invite links;
  5. pinned messages;
  6. admin names;
  7. deleted message notices;
  8. videos and livestreams;
  9. promotional posts;
  10. comments from other victims.

Groups can disappear quickly.


LXX. Telegram and WhatsApp Scams

Messaging apps are common because scammers can delete accounts or use foreign numbers.

Evidence tips:

  1. screenshot profile info;
  2. save phone number or username;
  3. export chat if possible;
  4. screenshot group members and admins;
  5. preserve payment instructions;
  6. record dates and times;
  7. do not rely only on display names.

LXXI. Domain and Website Evidence

For scam websites, preserve:

  1. domain name;
  2. full URL;
  3. login page;
  4. dashboard;
  5. terms;
  6. company claims;
  7. license claims;
  8. deposit page;
  9. withdrawal page;
  10. support page;
  11. error messages;
  12. date screenshots were taken.

A screen recording navigating the site may help.


LXXII. App Evidence

For scam apps, preserve:

  1. app name;
  2. app icon;
  3. app store link or APK source;
  4. developer name;
  5. version number;
  6. permissions requested;
  7. screenshots of dashboard;
  8. withdrawal page;
  9. customer support page;
  10. installation file if safe and relevant.

Do not install suspicious APKs on a primary device if avoidable.


LXXIII. Evidence From Other Victims

Other victims may show a pattern. Useful group evidence includes:

  1. same wallet address;
  2. same website;
  3. same agent;
  4. same fake tax demand;
  5. same withdrawal refusal;
  6. same Telegram group;
  7. same bank or e-wallet account;
  8. same fake documents.

Each victim should still prepare an individual statement.


LXXIV. Public Posting About the Scam

Victims often want to warn others. Public warnings should be factual and careful.

Avoid:

  1. posting unverified personal information;
  2. posting IDs that may belong to identity theft victims;
  3. threatening scammers;
  4. making accusations against legitimate companies impersonated by scammers;
  5. revealing your own sensitive wallet or account details;
  6. posting seed phrases or private keys.

Safer wording:

“I transferred crypto to this wallet after being promised withdrawal from this platform. Withdrawal was blocked and additional fees were demanded. I have reported the matter.”


LXXV. Defamation and Privacy Risks

Even victims should avoid reckless public accusations. If a name or ID was stolen and used by scammers, publicly accusing that person may harm an innocent party.

Use official complaint channels for sensitive information.


LXXVI. How to Avoid Further Loss

After discovering a scam:

  1. do not chase losses;
  2. do not pay recovery fees;
  3. do not send more crypto to unlock withdrawals;
  4. do not share seed phrases;
  5. do not install remote access software;
  6. do not trust “refund officers” on Telegram;
  7. do not borrow to pay fake taxes;
  8. do not move money for strangers;
  9. do not panic-send credentials;
  10. do not delete evidence.

Stopping further payments is often the most important recovery step.


LXXVII. Warning Signs of Crypto Scams

Common red flags:

  1. guaranteed returns;
  2. fixed daily profit;
  3. no risk;
  4. secret trading algorithm;
  5. pressure to invest quickly;
  6. romantic or emotional manipulation;
  7. refusal of video call;
  8. fake dashboard profits;
  9. withdrawal fees;
  10. tax before withdrawal;
  11. anonymous team;
  12. fake licenses;
  13. referral rewards;
  14. copied website;
  15. support only through chat;
  16. seed phrase request;
  17. remote access request;
  18. promise to double crypto;
  19. deposit to personal wallet;
  20. profits too consistent;
  21. inability to withdraw principal;
  22. group admins deleting questions;
  23. newly created domain;
  24. celebrity endorsements that cannot be verified;
  25. payment through crypto only.

LXXVIII. Legal Strategy: Focus on Actual Loss

A strong complaint focuses on actual transfers and deceit.

Include:

  1. what was promised;
  2. why it was false;
  3. what you transferred;
  4. where it was sent;
  5. how the scammer blocked recovery;
  6. what evidence proves the scam.

Avoid focusing only on paper profits. Authorities need clear, verifiable losses.


LXXIX. Legal Strategy: Identify Cash-Out Points

Crypto can be traced, but recovery often depends on finding where it becomes controllable by a regulated entity.

Possible cash-out points:

  1. centralized exchange;
  2. local bank;
  3. e-wallet;
  4. OTC broker;
  5. remittance center;
  6. payment processor;
  7. merchant account;
  8. identifiable person.

Reports to exchanges and law enforcement should emphasize known cash-out points.


LXXX. Legal Strategy: Preserve Before Confronting

Before confronting the scammer:

  1. save chats;
  2. screenshot website;
  3. export records;
  4. copy wallet addresses;
  5. capture transaction hashes;
  6. record profile links;
  7. save bank and e-wallet receipts.

If confronted too early, the scammer may delete accounts and move funds.


LXXXI. Legal Strategy: Separate Claims

Separate the case into parts:

  1. fiat money sent to buy crypto;
  2. crypto sent to scam wallet;
  3. fees paid after withdrawal refusal;
  4. identity documents submitted;
  5. harassment or threats;
  6. other victims;
  7. platform evidence.

This helps identify which agencies and remedies apply.


LXXXII. Role of Lawyers

A lawyer may help:

  1. prepare complaint-affidavit;
  2. organize blockchain evidence;
  3. send preservation requests;
  4. communicate with exchanges;
  5. file civil or criminal complaints;
  6. assess regulatory issues;
  7. handle cross-border matters;
  8. avoid self-incrimination in questionable schemes;
  9. seek asset preservation remedies;
  10. negotiate settlements.

For large losses, legal assistance is strongly advisable.


LXXXIII. Role of Blockchain Analytics

Blockchain analytics can help trace funds. For high-value cases, professional tracing may identify:

  1. exchange deposit addresses;
  2. clusters of scam wallets;
  3. related victim funds;
  4. bridges and swaps;
  5. cash-out locations;
  6. links to known scam networks.

However, analytics reports should be used carefully and may need proper authentication in legal proceedings.


LXXXIV. What Recovery Companies Can Legitimately Do

A legitimate recovery professional may:

  1. analyze transactions;
  2. prepare tracing reports;
  3. help organize evidence;
  4. assist counsel;
  5. advise on exchange reporting;
  6. support law enforcement coordination.

They cannot usually:

  1. hack wallets;
  2. reverse blockchain transfers;
  3. guarantee recovery;
  4. recover funds by magic software;
  5. access exchange accounts without legal process;
  6. recover funds by asking for your seed phrase.

Be suspicious of guaranteed recovery.


LXXXV. If the Scam Involves a Philippine-Licensed Virtual Asset Service Provider

If the issue involves a regulated virtual asset service provider or local exchange, possible complaints may involve:

  1. account compromise;
  2. unauthorized withdrawal;
  3. failure to act on fraud report;
  4. KYC or transaction dispute;
  5. account freezing;
  6. customer support failure;
  7. suspicious merchant or recipient account;
  8. internal policy violations.

The victim should file an internal complaint first and preserve ticket numbers, then escalate to appropriate regulators or legal channels if unresolved.


LXXXVI. If the Scam Involves a Foreign Exchange

Foreign exchanges may still cooperate with law enforcement or victims, especially if given transaction hashes and official reports.

Practical steps:

  1. file support ticket;
  2. submit scam evidence;
  3. provide police report when available;
  4. request preservation of records;
  5. ask what legal process they require;
  6. preserve all responses;
  7. coordinate with local authorities.

Foreign exchanges may not disclose user information directly to victims without lawful process.


LXXXVII. If the Victim Used Peer-to-Peer Trading

P2P crypto trading scams may involve payment reversal, fake receipts, mule accounts, or non-release of crypto.

Evidence includes:

  1. P2P order number;
  2. platform chat;
  3. payment proof;
  4. release status;
  5. counterparty profile;
  6. bank or e-wallet details;
  7. dispute records.

If the trade occurred on a legitimate platform, use the platform dispute system immediately.


LXXXVIII. Fake P2P Payment Receipts

A scammer may send a fake bank or e-wallet receipt to induce release of crypto.

A seller should confirm actual receipt in the bank or wallet app before releasing crypto. If crypto was released based on fake proof, preserve the receipt and file a complaint.


LXXXIX. Chargeback and Crypto Purchases

If a victim bought crypto by card or bank transfer and then voluntarily sent it to a scammer, card chargeback may be difficult because the exchange provided the purchased crypto. The fraud occurred after the purchase.

However, if the card was used without authorization, or the exchange transaction itself was fraudulent, chargeback may be possible depending on the payment rules.


XC. Insurance Coverage

Some victims ask whether insurance covers crypto scams. Coverage is uncommon but possible under certain cyber insurance, crime insurance, or business policies.

Review:

  1. policy definitions;
  2. covered property;
  3. exclusions for virtual currency;
  4. social engineering fraud coverage;
  5. computer fraud coverage;
  6. notice requirements;
  7. proof of loss deadlines.

Personal policies rarely cover ordinary crypto investment scams unless specifically included.


XCI. Employer or Business Crypto Loss

If a business loses crypto due to employee action, compromised wallet, or fraudulent vendor, issues may include:

  1. employee negligence;
  2. internal controls;
  3. corporate authority;
  4. accounting treatment;
  5. cyber insurance;
  6. data breach;
  7. board reporting;
  8. criminal complaint;
  9. civil recovery;
  10. tax and audit implications.

Businesses should preserve logs, wallet access records, approval workflows, and communications.


XCII. Internal Controls to Prevent Crypto Scam Loss

For businesses and serious crypto users:

  1. use hardware wallets;
  2. require multi-signature approvals;
  3. verify addresses out of band;
  4. use withdrawal whitelists;
  5. separate hot and cold wallets;
  6. limit permissions;
  7. train staff on phishing;
  8. use dedicated devices;
  9. avoid blind signing;
  10. verify smart contracts;
  11. document transactions;
  12. require dual approval for large transfers;
  13. keep incident response plan;
  14. maintain secure backups.

Prevention is far easier than recovery.


XCIII. Psychological Manipulation and Victim Shame

Crypto scam victims often feel shame, especially in romance or investment scams. Scammers exploit trust, urgency, greed, fear, loneliness, and authority.

Shame causes delay, and delay reduces recovery chances. Victims should report quickly and focus on evidence.


XCIV. Prescription and Delay

Legal claims may be subject to prescriptive periods. Victims should act promptly. Delay can also cause loss of records, deleted accounts, moved funds, and weaker memory.

Even if time has passed, a complaint may still be possible. Preserve whatever evidence remains.


XCV. Practical Recovery Expectations

Recovery chances are higher when:

  1. funds are reported quickly;
  2. funds reached a centralized exchange;
  3. scammer is local or identifiable;
  4. bank or e-wallet accounts were used;
  5. multiple victims coordinate;
  6. transaction records are complete;
  7. law enforcement acts promptly;
  8. scammer has recoverable assets.

Recovery chances are lower when:

  1. funds went to self-custody wallets;
  2. funds were mixed or bridged repeatedly;
  3. scammer is anonymous and abroad;
  4. victim paid in privacy coins;
  5. months have passed;
  6. evidence is incomplete;
  7. victim continued paying fake fees;
  8. no cash-out point is identified.

XCVI. Practical Reporting Package

Prepare a folder containing:

  1. one-page timeline;
  2. complaint narrative;
  3. identity documents of complainant;
  4. scammer profile screenshots;
  5. platform screenshots;
  6. chat logs;
  7. transaction hashes;
  8. wallet addresses;
  9. exchange records;
  10. bank or e-wallet receipts;
  11. fake documents or licenses;
  12. withdrawal refusal messages;
  13. fee demands;
  14. computation of loss;
  15. list of other victims, if any.

This makes reporting more effective.


XCVII. Timeline Template

Date/Time Event Evidence
Jan. 5, 2026 Contacted by Telegram user Screenshot A
Jan. 7, 2026 Registered on fake platform Screenshot B
Jan. 8, 2026 Bought 1,000 USDT Exchange record C
Jan. 8, 2026 Sent 1,000 USDT to wallet address Transaction hash D
Jan. 12, 2026 Dashboard showed 1,450 USDT Screenshot E
Jan. 13, 2026 Withdrawal requested Screenshot F
Jan. 13, 2026 Platform demanded 200 USDT tax Screenshot G
Jan. 14, 2026 Account frozen after refusal Screenshot H

A timeline should match attached evidence.


XCVIII. Computation of Loss Template

Item Amount Proof
Initial USDT deposit 1,000 USDT Transaction hash
Second deposit 500 USDT Transaction hash
Withdrawal “tax” paid 200 USDT Transaction hash
Total crypto sent 1,700 USDT Wallet records
Peso value at time of transfers ₱___ Exchange records
Actual amount recovered 0 N/A

Separate actual loss from fake displayed profit.


XCIX. What Not to Include in a Complaint

Avoid:

  1. unverifiable accusations;
  2. speculation stated as fact;
  3. edited screenshots without originals;
  4. irrelevant arguments about crypto generally;
  5. threats against respondents;
  6. false claims of government confirmation;
  7. inflated losses based only on fake dashboard profits;
  8. names of innocent people whose IDs may have been stolen;
  9. seed phrases or private keys;
  10. passwords or OTPs.

Submit sensitive information only through proper official channels.


C. If the Scam Involves Threats or Blackmail

Some crypto scammers threaten to expose private photos, personal data, or investment losses unless paid. This may involve extortion, coercion, or privacy violations.

Steps:

  1. do not pay if possible;
  2. preserve threats;
  3. secure accounts;
  4. report to law enforcement;
  5. warn close contacts if necessary;
  6. request platform takedown if material is posted;
  7. seek legal help.

Paying blackmail often leads to more demands.


CI. If the Scam Involves Intimate Images

If crypto extortion involves intimate images, additional laws may apply. The victim should report urgently and avoid further engagement. Preserve evidence but do not distribute the images further.

Protection, takedown, and criminal remedies may be available.


CII. If the Scam Involves Minors

If minors are involved, the matter becomes more serious. Report immediately to appropriate authorities. Do not share or repost any sensitive content.


CIII. If the Scam Involves Identity Theft

If the scammer used the victim’s ID to open accounts or scam others:

  1. file police or cybercrime report;
  2. notify exchanges and financial institutions;
  3. notify data privacy authorities if appropriate;
  4. preserve proof of where ID was submitted;
  5. monitor accounts;
  6. warn contacts;
  7. request account closures where fraudulent accounts exist.

CIV. If the Victim Is Accused of Scamming Others

Sometimes scammers use a victim’s bank, e-wallet, or identity. If the victim is contacted by other victims:

  1. do not ignore them;
  2. preserve messages;
  3. explain carefully if identity was stolen;
  4. file identity theft report;
  5. notify affected platforms;
  6. secure accounts;
  7. seek legal advice before making public statements.

CV. Interaction With Banks, E-Wallets, and Exchanges

Crypto scams often move between fiat and crypto. The victim should report to every relevant entity:

  1. bank used to fund exchange;
  2. e-wallet used to transfer funds;
  3. exchange used to buy or send crypto;
  4. receiving exchange if known;
  5. platform that hosted scam;
  6. app store or social media site.

Each entity may preserve a different part of the evidence.


CVI. Subpoenas and Record Requests

Victims usually cannot personally obtain confidential account records from exchanges, banks, or telecom companies. Law enforcement, prosecutors, courts, or regulators may need to issue proper requests.

This is why formal reporting matters.


CVII. Barangay Proceedings

Barangay proceedings may help if the scammer is known and located in the same city or municipality and the dispute is appropriate for barangay conciliation. However, many crypto scams involve cyber fraud, unknown respondents, multiple jurisdictions, or urgent law enforcement issues. In those cases, direct reporting to police, cybercrime authorities, or prosecutor may be more appropriate.

Barangay settlement should not replace urgent fraud reporting where funds may still be frozen.


CVIII. Small Claims

Small claims may be useful where:

  1. respondent is known;
  2. amount is within applicable threshold;
  3. claim is for money owed or return of funds;
  4. evidence is clear;
  5. respondent has address for service.

It is less useful against anonymous foreign scammers.


CIX. Demand for Accounting

If the respondent claims the investment was legitimate but failed, request accounting:

  1. where funds were placed;
  2. wallet addresses used;
  3. trades made;
  4. exchange records;
  5. profits and losses;
  6. fees charged;
  7. authority to manage funds;
  8. remaining balance.

Refusal to account may support claims of misappropriation or fraud.


CX. If the Crypto Was Given to a Friend to Trade

If a friend or trader accepted crypto to trade on the victim’s behalf, issues include:

  1. was there a contract;
  2. were returns guaranteed;
  3. was the person authorized to solicit funds;
  4. did the person actually trade;
  5. were losses genuine;
  6. were funds commingled;
  7. were reports fabricated;
  8. did the trader refuse to return remaining funds.

A trading loss is not automatically a crime, but deception or misappropriation may be.


CXI. If the Scheme Was a Group Investment

Group crypto investment schemes may involve pooled funds and shared wallets. Evidence should include:

  1. group chat records;
  2. investment terms;
  3. list of members;
  4. wallet addresses;
  5. payment records;
  6. promoter statements;
  7. withdrawal requests;
  8. accounting reports;
  9. refusal to return funds;
  10. referral incentives.

Group complaints may be more effective.


CXII. If the Scam Involved a DAO or Decentralized Project

Some scams use decentralized terminology to avoid responsibility. But if identifiable persons made fraudulent representations, raised funds, controlled wallets, or misappropriated assets, they may still face liability.

Evidence should identify real-world promoters, admins, developers, signers, and fund controllers where possible.


CXIII. If the Scam Involved Smart Contract Code

A smart contract may execute automatically, but humans may still be liable if they created or promoted it fraudulently.

Issues include:

  1. malicious code;
  2. hidden mint function;
  3. owner withdrawal function;
  4. honeypot selling restriction;
  5. fake audit;
  6. false representations;
  7. liquidity removal;
  8. admin wallet control.

Technical analysis may be needed.


CXIV. If the Scam Involved a Fake Audit

A fake audit or security certificate may be evidence of deceit. Preserve:

  1. audit report;
  2. auditor name;
  3. website where audit was shown;
  4. project statements about audit;
  5. proof auditor denies issuing it, if available.

CXV. If the Scam Involved a Celebrity or Influencer

Promoters may be liable if they knowingly or recklessly misrepresented the scheme. Evidence includes:

  1. posts;
  2. videos;
  3. referral links;
  4. promo codes;
  5. claims of guaranteed returns;
  6. disclosure of sponsorship or lack thereof;
  7. responses to complaints;
  8. continued promotion after warnings.

However, some celebrity images are used without permission. Identify whether the endorsement was real or impersonated.


CXVI. If the Scam Involved Fake Customer Support

Fake support may impersonate exchanges or wallet providers. Preserve:

  1. support username;
  2. email address;
  3. website link;
  4. ticket number, if fake;
  5. instructions given;
  6. seed phrase requests;
  7. remote access requests;
  8. transaction hashes after compromise.

Report impersonation to the real company.


CXVII. Preventive Measures for Individuals

To avoid crypto scams:

  1. never share seed phrases;
  2. never share private keys;
  3. never share OTPs;
  4. verify website URLs;
  5. use hardware wallets for large amounts;
  6. avoid unknown wallet-draining links;
  7. test small transactions;
  8. distrust guaranteed returns;
  9. verify licenses independently;
  10. avoid pressure tactics;
  11. do not invest through romance contacts;
  12. use reputable exchanges;
  13. enable two-factor authentication;
  14. avoid remote access requests;
  15. revoke unused token approvals;
  16. keep separate wallets for experiments;
  17. never pay taxes or fees to unlock fake profits;
  18. research project teams;
  19. avoid APKs and fake apps;
  20. keep records of all transfers.

CXVIII. Preventive Measures for Families

Families should discuss crypto scams openly, especially with OFWs, retirees, and young adults.

Practical advice:

  1. verify before investing;
  2. do not keep secret investments with strangers;
  3. consult trusted persons before large transfers;
  4. avoid borrowing to invest;
  5. do not believe fixed returns;
  6. do not send crypto to online romantic partners;
  7. report early if suspicious.

Scammers often instruct victims to keep the opportunity secret.


CXIX. Preventive Measures for Businesses

Businesses dealing with crypto should:

  1. establish approval workflows;
  2. use multi-signature wallets;
  3. maintain transaction logs;
  4. use whitelisted addresses;
  5. verify vendors;
  6. segregate duties;
  7. train employees;
  8. require legal review for investments;
  9. avoid informal wallet transfers;
  10. maintain cyber insurance where available;
  11. secure private keys;
  12. audit smart contract interactions;
  13. document board approval for material crypto exposure.

CXX. Common Myths

Myth 1: “Crypto scams cannot be reported because crypto is unregulated.”

False. Fraud is still actionable even if cryptocurrency is involved.

Myth 2: “Blockchain transactions can always be reversed by hackers.”

False. Most transactions cannot be reversed. Be wary of recovery scammers.

Myth 3: “If a website shows profits, the profits are real.”

False. Scam dashboards can display fake numbers.

Myth 4: “Paying tax or clearance fee will unlock withdrawal.”

Usually false in scams. This is a common fee trap.

Myth 5: “A company registration certificate means the investment is safe.”

False. Registration does not automatically authorize investment solicitation or guarantee legitimacy.

Myth 6: “If the scammer is abroad, nothing can be done.”

Not always. Exchanges, wallets, and local payment channels may still provide leads, though recovery is harder.

Myth 7: “A private key or seed phrase is safe to give to support.”

False. Giving it gives control of your funds.

Myth 8: “Stablecoins are safe from scams.”

False. Stablecoins may be used in scams even if their value is relatively stable.

Myth 9: “Small successful withdrawals prove legitimacy.”

False. Scammers often allow small withdrawals to build trust.

Myth 10: “Recovery agents on social media can retrieve stolen crypto.”

Usually false. Many are secondary scammers.


CXXI. Practical Step-by-Step Recovery Plan

Step 1: Stop Sending Funds

Do not pay taxes, fees, gas charges, or recovery fees demanded by the scammer.

Step 2: Secure Remaining Assets

Move remaining crypto from compromised wallets and secure exchange accounts.

Step 3: Preserve Evidence

Save chats, transaction hashes, wallet addresses, website screenshots, and payment receipts.

Step 4: Report to Exchanges

Notify sending and receiving exchanges if known.

Step 5: Report Fiat Transfers

Notify banks, e-wallets, or remittance services used.

Step 6: File Law Enforcement Report

Submit a clear complaint with transaction evidence.

Step 7: Consider Regulatory Complaints

File with relevant regulators if investment solicitation, fake exchange, payment provider issues, or privacy violations are involved.

Step 8: Avoid Recovery Scams

Do not trust anyone promising guaranteed recovery for upfront crypto payment.

Step 9: Coordinate With Other Victims

Group evidence can help establish pattern.

Step 10: Seek Legal Advice for Large Losses

For significant amounts, counsel can assist with preservation, tracing, complaints, and asset recovery.


CXXII. Document Checklist for Filing

Bring or prepare:

  1. valid government ID;
  2. written complaint narrative;
  3. complete timeline;
  4. scammer identity details;
  5. social media profile links;
  6. website or app screenshots;
  7. chat logs;
  8. emails;
  9. transaction hashes;
  10. blockchain explorer printouts;
  11. wallet addresses;
  12. exchange records;
  13. bank or e-wallet receipts;
  14. peso valuation;
  15. withdrawal refusal evidence;
  16. fake tax or fee demands;
  17. device compromise evidence, if any;
  18. other victim statements, if any;
  19. computation of total loss;
  20. copies in digital and printed form.

CXXIII. Conclusion

Cryptocurrency scam recovery in the Philippines is difficult but not hopeless. A blockchain transfer may be irreversible, but the fraud surrounding that transfer remains legally actionable. Victims may pursue criminal complaints, civil recovery, regulatory reports, exchange freezes, bank or e-wallet investigations, data privacy complaints, and coordinated group actions depending on the facts.

The strongest case is built on evidence: transaction hashes, wallet addresses, screenshots, chat logs, fake platform records, payment receipts, identity details, and a clear timeline. Victims should act quickly because crypto funds can move across wallets, exchanges, bridges, and jurisdictions within minutes.

The most important practical rule is to stop the loss immediately. Do not pay additional “taxes,” “clearance fees,” “gas fees,” “verification fees,” or “recovery fees” to unlock funds. Do not share seed phrases, private keys, passwords, OTPs, or remote access. Report quickly, preserve evidence, secure remaining assets, and use lawful recovery channels.

Crypto may be new technology, but the legal principle is old and clear: fraud is fraud, whether the stolen value is cash, bank money, e-wallet funds, or cryptocurrency.

Disclaimer: This content is not legal advice and may involve AI assistance. Information may be inaccurate.