Sign Up Free
Illustration of approval phishing in crypto, showing a fake wallet confirmation screen hiding a dangerous smart contract permission trap

Approval Phishing: The Crypto Scam That Doesn't Need Your Password

beginner defi security wallets

Most people assume crypto theft requires a stolen password or a compromised seed phrase. Approval phishing needs neither, and that's exactly what makes it so effective.

Key Takeaways

  • Approval phishing tricks you into signing a blockchain transaction that grants a malicious smart contract permission to move tokens from your wallet, without you ever sending anything directly.
  • The scam exploits a normal DeFi mechanism: token approvals, which are required every time you interact with a decentralized application.
  • Wallet drainer phishing attacks caused $83.85 million in losses across 106,106 victims in 2025, according to Scam Sniffer, down from $494 million in 2024.
  • Hardware wallets protect your private keys but do not protect against approval phishing, because the dangerous permission is one you signed yourself.
  • You can check and revoke existing token approvals using free tools like Revoke.cash or Etherscan's Token Approval Checker.

Approval phishing is a type of cryptocurrency scam that steals funds without ever needing your password, seed phrase, or private key. At Blockready, we track how scam techniques evolve, and approval phishing stands out because it exploits a mechanism that most crypto users interact with regularly without fully understanding: token approvals. The scam doesn't hack your wallet. It asks for permission, and you grant it.

This post explains how approval phishing works at the smart contract level (without requiring you to read code), why it catches even experienced users, and what you can do right now to check whether your wallet has approvals you never meant to give.

What Approval Phishing Is (And Why It's Different)

Approval Phishing
Approval phishing is a type of cryptocurrency scam where an attacker tricks you into signing a blockchain transaction that grants their smart contract permission to move tokens from your wallet. Unlike traditional phishing, which steals passwords or keys, approval phishing exploits the token approval mechanism that decentralized applications use to interact with your funds.

Here's the distinction that matters. In a typical crypto scam, someone tricks you into sending cryptocurrency to an address. You initiate the transfer. You watch it leave. In approval phishing, you don't send anything. You sign what looks like a routine permission, and then the attacker drains your wallet hours, days, or even weeks later. You might not even notice until your balance hits zero.

That delay is what makes this scam category so disorienting for victims. There's no moment of "I just sent my crypto to a stranger." Instead, there's a quiet approval buried among a dozen other transactions, followed by a drain you didn't authorize but technically permitted.

How Token Approvals Work (The 60-Second Version)

Before you can understand why approval phishing is dangerous, you need to understand why token approvals exist in the first place. They're not a flaw. They're a feature, and a necessary one.

Every time you use a decentralized application (a DEX, a lending protocol, an NFT marketplace), the dApp needs permission to move tokens on your behalf. Want to swap USDC for ETH on Uniswap? Uniswap's smart contract needs your approval before it can access your USDC. That's the approve() function in action. You're telling the token's smart contract: "This other contract is allowed to spend up to X amount of my tokens."

For legitimate dApps, this is routine and safe. The problem surfaces in two places. First, many dApps request unlimited approval by default. Instead of asking to spend the 100 USDC you need for one swap, they ask for permission to spend an unlimited amount of USDC, forever. Convenient, yes. But if that contract is later compromised, the attacker inherits your unlimited permission.

Second, approvals don't expire. They persist on the blockchain until you explicitly revoke them. An approval you signed eighteen months ago for a DeFi protocol you forgot about? Still active. Still valid. Still exploitable if that protocol gets hacked or turns out to be malicious. And here's what trips up even careful users: disconnecting your wallet from a website does not revoke your approvals. Disconnecting only stops the site from seeing your address. The on-chain permission remains.

How the Attack Actually Works

ANATOMY OF AN APPROVAL PHISHING ATTACK

LURE Social Engineering
 
DRAIN Wallet Emptied
1
The Lure
A fake dApp, airdrop claim, governance vote, or NFT mint site reaches the victim through social media, Discord, email, or a romance scam relationship. The site looks legitimate.
2
The Approval Request
The site prompts the user to "connect wallet" and sign a transaction. The transaction looks routine but grants the attacker's contract unlimited permission to spend the victim's tokens.
3
The Wait
The attacker may not act immediately. Hours, days, or weeks pass. The victim has no idea the permission exists. No funds have moved yet.
4
The Drain
The attacker's contract initiates a transferFrom() call, moving the victim's tokens to a separate destination wallet. The victim never signed this transfer. The approval they signed earlier was sufficient.

Sources: Chainalysis, Scam Sniffer, Revoke.cash documentation

The social engineering layer is evolving. Chainalysis research published in 2024 documented how romance scam operations (also called "pig butchering") have adopted approval phishing as their extraction mechanism. The attacker builds a relationship with the victim over weeks or months, eventually guiding them to a fake investment platform where the victim signs an approval thinking they're making a deposit. The relationship is the delivery vehicle. The approval is the weapon.

In March 2026, the US Secret Service, UK National Crime Agency, and Canadian law enforcement launched Operation Atlantic, the largest international law enforcement action targeting approval phishing to date. The operation identified over 20,000 potential victims and froze more than $12 million in suspected criminal proceeds, with an additional $45 million flagged across related fraud networks.

The Scale of the Damage

APPROVAL PHISHING BY THE NUMBERS

$83.85M
Lost in 2025
Down 83% from $494M in 2024
106,106
Victims in 2025
Down 68% year-over-year
$12M+
Frozen (Op Atlantic)
March 2026, 20,000+ victims ID'd

Sources: Scam Sniffer 2025 Annual Report, NCA Operation Atlantic (March 2026)

The numbers are declining. That's the good news. According to Scam Sniffer's 2025 annual report, wallet drainer phishing losses fell 83% compared to 2024, from $494 million to $83.85 million. The number of victims dropped 68%, from 332,000 to 106,106. Only 11 individual incidents exceeded $1 million, compared to 30 the year before.

But that decline comes with a significant caveat. Scam Sniffer's data covers only wallet drainer attacks through phishing websites on EVM-compatible chains. It doesn't capture private key compromises, supply chain attacks, or social engineering that leads to direct transfers. The trackable losses are falling, but the scam infrastructure remains active, with new drainer kits replacing old ones as they're shut down. And losses correlated directly with market activity: Q3 2025, during Ethereum's strongest rally, saw $31 million in phishing losses alone.

Understanding how this threat operates at a structural level is something a single article can introduce but not fully cover. Blockready's Module 13 (Legal) dedicates specific lessons to phishing, rug pulls, and impersonation fraud, walking through the scam mechanics, verification frameworks, and incident response steps that help you recognize these patterns before signing anything.

How to Spot a Malicious Approval

Not every approval request is malicious. Most are perfectly legitimate. The skill is learning to tell the difference, and it comes down to a handful of specific signals.

RED FLAGS IN TOKEN APPROVAL REQUESTS

  Unlimited token access requested: The approval asks for permission to spend an unlimited amount of a token. Legitimate dApps sometimes do this for convenience, but if you don't recognize the contract, this is the highest-risk pattern.
  Unfamiliar contract address: You're approving a contract you've never interacted with before. Check the contract address on Etherscan or the relevant block explorer before confirming.
  Urgency or scarcity tactics: "Claim your airdrop in the next 10 minutes" or "Only 50 spots left." Legitimate protocols rarely create artificial time pressure around approvals.
  Slightly wrong URL: The domain looks like a real protocol but has subtle differences (uniswap-claim.com vs app.uniswap.org). Bookmark the official URLs of dApps you use regularly.
  Approval for an unrelated token: You came to a site to mint an NFT, but the approval request is for your USDC or WETH. The approval should match the action you're trying to perform.

Framework: Adapted from Blockready scam verification methodology and Revoke.cash documentation

Hardware Wallets Don't Protect You Here
A hardware wallet secures your private keys, which means nobody can steal your keys remotely. But approval phishing doesn't need your keys. If you sign an approval on a hardware wallet, that permission is just as valid and just as dangerous as one signed on a browser extension wallet. The approval lives on the blockchain, not on your device.

The four exploit vectors behind every crypto scam follow predictable patterns, and approval phishing fits neatly into the social engineering category. But what makes it particularly tricky is that the action it asks you to take (signing an approval) is something you do dozens of times in normal DeFi usage. The scam hides in plain sight, disguised as routine.

How to Check and Revoke Your Existing Approvals

If you've ever used a decentralized exchange, minted an NFT, or interacted with a lending protocol, you have active token approvals on the blockchain right now. Some of them may be for dApps you haven't used in months or years. Some may be unlimited. Here's how to find them and clean them up.

Revoke.cash is the most widely used tool for managing token approvals. It supports over 100 networks, works with all major wallets, and lets you inspect and revoke individual approvals. Connect your wallet or enter your address, select the network you want to check, sort by "newest to oldest" if you suspect a recent malicious approval, and revoke anything you no longer need. Each revocation is an on-chain transaction that requires a small gas fee.

Etherscan's Token Approval Checker provides similar functionality for Ethereum mainnet. Navigate to the Token Approvals section, enter your address, and review your active permissions across ERC-20, ERC-721, and ERC-1155 tokens.

A few principles worth keeping in mind. Revoking an approval removes the permission going forward, but cannot reverse a drain that already happened. If you suspect you signed a malicious approval and your tokens are still in your wallet, revoke immediately and transfer remaining assets to a fresh wallet. And set a recurring reminder, once a month, to audit your approvals. Think of it like checking your bank statements, except the consequences of neglect are permanent.

The common mistake here is assuming that securing your crypto wallet means only protecting your seed phrase. Seed phrase security is necessary but not sufficient. Your wallet's security surface extends to every approval you've ever signed, and each one is a potential entry point if the contract on the other side is compromised. Most people who lose funds to approval phishing had strong passwords and properly stored seed phrases. What they didn't have was awareness of their approval exposure.

Frequently Asked Questions

Can approval phishing happen on Bitcoin?
No. Approval phishing targets smart contract platforms like Ethereum and other EVM-compatible chains (BNB Chain, Polygon, Arbitrum, etc.) because it exploits the token approval mechanism built into ERC-20 and ERC-721 smart contracts. Bitcoin does not have this approval architecture, so this specific attack vector does not apply to BTC held on the Bitcoin network.
Is disconnecting my wallet the same as revoking approvals?
No. Disconnecting your wallet from a website only stops that site from seeing your address and balances. The on-chain token approval remains fully active. The smart contract you approved can still move your tokens regardless of whether you're "connected" to the website. You must explicitly revoke the approval using a tool like Revoke.cash or Etherscan.
How much does it cost to revoke a token approval?
Revoking an approval is an on-chain transaction that requires a gas fee. On Ethereum mainnet, this typically costs a few dollars depending on network congestion. On Layer 2 networks like Arbitrum, Optimism, or Base, revocation costs are usually less than $0.01.
Can I recover funds that were already drained through approval phishing?
Recovery is extremely difficult because blockchain transactions are irreversible. Law enforcement operations like Operation Atlantic (March 2026) have frozen some stolen funds, but this is the exception, not the norm. The most effective response is to revoke the malicious approval immediately to prevent further losses, transfer remaining assets to a new wallet, and report the incident to local law enforcement and relevant fraud reporting agencies.
Should I revoke all my token approvals?
Revoking all approvals is the safest approach if you are not actively using the associated dApps. For dApps you use regularly (like a primary DEX), you may choose to keep the approval active for convenience but should set it to a limited amount rather than unlimited. Prioritize revoking approvals to contracts you don't recognize, dApps you no longer use, and any approvals that grant unlimited token access.

Build the Knowledge That Prevents the Mistakes

Blockready's structured cryptocurrency masterclass covers scam mechanics, wallet security, and DeFi risk across 13 modules and 150+ lessons. No hype. No shortcuts. Just the understanding that keeps your assets safe.

Explore Blockready