How Did the Scam Unfold?

A 66-year-old retiree in Hong Kong lost 6.6 million Hong Kong dollars, or roughly $840,000, after falling victim to three consecutive crypto investment scams, according to the city’s CyberDefender unit. The case highlights how fraud schemes can build on each other, repeatedly targeting the same individual over time.

The first approach came in September 2025, when a scammer contacted the victim through WhatsApp, claiming to be a “virtual currency investment expert” and offering steady returns. The retiree transferred $180,000 and sent cryptocurrency to a wallet controlled by the fraudster, who then disappeared.

After reporting the incident to police, the victim sought help online and was contacted by another self-described expert who claimed he could recover the lost funds. That second scam required a $75,000 “security deposit.” Once paid, the second operator also vanished.

In January, a third individual reached out with a similar promise to recover both prior losses, instructing the victim to purchase $585,000 worth of cryptocurrency and transfer it to a specified address. That transfer marked the final stage of the scheme, bringing total losses to approximately $840,000 over a six-month period.

Investor Takeaway

Repeated losses often follow the same pattern: initial fraud, then “recovery” offers that extract additional funds. Victims are frequently targeted again once identified as responsive.

Why Do Scams Repeat on the Same Victim?

Authorities say the structure of the case reflects a broader tactic in crypto fraud, where attackers reuse victims across multiple schemes. Once an individual has already transferred funds, scammers treat them as a high-probability target for follow-up operations.

The transition from an investment pitch to a recovery offer is a common escalation path. The first loss creates urgency and emotional pressure, making the victim more likely to trust someone offering a solution. Each stage relies less on technical complexity and more on timing and persuasion.

Hong Kong’s CyberDefender unit warned that unsolicited outreach is a consistent warning sign. “Life has no take two; but scams can have take three,” the team wrote, adding that genuine professionals do not rely on random contact and that claims such as “guaranteed returns” or “inside information” are typical indicators of fraud.

How Does This Fit Into Broader Crypto Fraud Trends?

The incident comes as crypto-related fraud continues to expand globally. Web3 platforms recorded around $3.95 billion in losses in 2025, according to security firm Hacken, with a mix of hacking, phishing, and social engineering driving activity.

Authorities across multiple jurisdictions have reported similar patterns. These include fake token promotions, impersonation scams, and investment schemes that rely on messaging platforms and informal communication channels rather than regulated intermediaries.

Recent enforcement actions have targeted a range of operations, from phishing campaigns to multi-state investment fraud cases involving stablecoins. The scale and variety of cases suggest that fraud remains one of the most persistent risks tied to digital asset adoption.

Investor Takeaway

Unsolicited contact, recovery promises, and requests to transfer funds to private wallets remain the most consistent red flags across crypto-related scams.

What Can Users Do to Reduce Risk?

The case underlines the importance of verifying counterparties and avoiding transactions initiated through direct messages. Legitimate investment services and recovery firms operate through established channels and do not require upfront transfers to personal wallets.

Users are also advised to treat recovery offers with caution, particularly when they follow a recent loss. Fraud networks often monitor public complaints or online searches to identify and approach victims already affected by previous scams.

As digital asset markets expand, the mechanics of fraud are becoming more repetitive rather than more complex. The methods rely on trust, urgency, and repeated engagement, making awareness and basic verification steps one of the most effective forms of protection.

Author