Scams are becoming increasingly sophisticated — and the latest threat is the fake “Claim Kaspa” website. Masquerading as a legitimate token airdrop from the official Kaspa project, this malicious campaign is designed to steal digital assets directly from users’ cryptowallets.
Discovered during an investigation into suspicious domains, this scam attempts to mimic the real Kaspa site (kaspa.org) to trick users into connecting their wallets under the pretense of claiming unallocated KAS tokens. Victims unknowingly authorize a smart contract that enables a crypto drainer, allowing cybercriminals to siphon off funds.
It is important to note that this scam is in no way affiliated with the real Kaspa project, a reputable Proof-of-Work (PoW) blockchain initiative. This fake promotion is purely a product of phishing and social engineering techniques used to commit fraud and cryptocurrency theft.
What Happens When You Connect Your Wallet?
Once a user connects their wallet to the malicious “Claim Kaspa” site (kaspacurrency-registration[.]co), they trigger a hidden smart contract designed to extract cryptocurrencies. These drainers can prioritize and steal the most valuable assets in your wallet in seconds. Victims may not even notice the theft until it’s too late due to the stealthy nature of these transactions.
And since crypto transactions are irreversible and mostly untraceable, recovering lost funds is nearly impossible.
Threat Summary Table
Attribute | Details |
---|---|
Name | “Claim Kaspa” Crypto Drainer |
Threat Type | Phishing, Scam, Social Engineering, Cryptocurrency Drainer |
Disguise | Fake Kaspa Airdrop |
Associated Domain(s) | kaspacurrency-registration[.]co |
Detection Names | alphaMountain.ai (Phishing), CRDF (Malicious), Fortinet (Phishing), G-Data (Phishing), Sophos (Phishing) |
Symptoms | Sudden loss of funds from cryptowallet, suspicious wallet activity, unknown contract approvals |
Damage | Financial theft, loss of digital assets |
Distribution Methods | Compromised websites, social media spam, rogue ads, PUPs |
Danger Level | High |
Serving IP Address | 104.21.91.42 |
Recommended Removal Tool | SpyHunter |
Important FTC Warning
According to the Federal Trade Commission (FTC), more than 46,000 people have reported losing over $1 billion in crypto scams since 2021. That’s approximately one out of every four dollars reported lost to scams — higher than any other payment method.
Eliminating Crypto Scam Threats
Step 1: Identify and Report the Scam
- Gather evidence (screenshots, emails, transaction IDs).
- Report the fraud to:
- Your crypto exchange (Binance, Coinbase, Kraken, etc.).
- Law enforcement agencies like the FBI’s IC3 (ic3.gov) or the SEC (sec.gov/tcr).
- The Federal Trade Commission (reportfraud.ftc.gov).
- Blockchain explorers (like Etherscan) to check your wallet transactions.
Step 2: Uninstall Suspicious Software & Apps
- On Windows: Open Control Panel > Programs & Features → Find & Uninstall suspicious programs.
- On macOS:Go to Finder > Applications → Drag unwanted apps to Trash.
- On Android & iOS: Go to Settings > Apps → Uninstall fake crypto wallets or trading apps.
Step 3: Remove Malicious Browser Extensions
- Google Chrome:
- Open
chrome://extensions/
- Remove any unfamiliar or crypto-related suspicious add-ons.
- Open
- Firefox / Edge / Safari:
- Go to browser settings > extensions → Delete suspicious ones.
- Clear browser cache & cookies:
- Open browser settings → Privacy → Clear browsing data.
Step 4: Secure Your Accounts & Wallets
Change passwords immediately for:
- Crypto wallets
- Exchanges
- Email & social media
Enable Two-Factor Authentication (2FA):
- Use Google Authenticator, YubiKey, or Authy.
Move remaining funds to a secure wallet:
- Use a hardware wallet (Ledger, Trezor) instead of online wallets.
Step 5: Scan for Hidden Malware & Keyloggers
Your system may still have spyware, tracking your keystrokes or redirecting you to scam sites. A deep scan is essentialto detect and remove threats.
⏳ For a thorough malware check, use SpyHunter. (See Method 2 below.)
Automatic Removal with SpyHunter
If you suspect hidden malware, SpyHunter can detect and remove crypto scam-related malware, trojans, and browser hijackers.
Step 1: Download SpyHunter
Follow SpyHunter installation instructions here: SpyHunter Download Guide
Step 2: Install and Run SpyHunter
- Run the SpyHunter installer.
- Follow the on-screen installation steps.
- Launch SpyHunter after installation.
Step 3: Perform a Full Malware Scan
- Click “Start Scan Now”.
- Let SpyHunter scan for:
- Crypto-stealing malware
- Browser hijackers redirecting to fake exchanges
- Phishing-related spyware
Step 4: Remove All Detected Threats
- Click “Fix Threats” to eliminate malicious programs.
- Restart your system to complete the cleanup.
Step 5: Enable Real-Time Protection for Future Security
Activate SpyHunter’s real-time protection to:
- Block phishing & scam websites
- Prevent future infections
- Monitor system vulnerabilities
Proactive Prevention: How to Avoid Crypto Scams
- NEVER share your private keys or seed phrases – even with “support teams.”
- Always verify URLs before logging in to exchanges.
- Use only official wallet apps from trusted sources.
- Ignore unsolicited investment offers via Telegram, Discord, and social media.
- Check for HTTPS & security certificates before entering login details.
- Regularly scan your device for hidden malware and spyware.
- Store crypto in a hardware wallet (Ledger, Trezor) rather than online wallets.
Final Thoughts
The fake “Claim Kaspa” site is yet another alarming example of how scammers exploit cryptocurrency trends and popular projects to deceive users. By mimicking legitimate blockchain ventures, they capitalize on user excitement and FOMO (fear of missing out).
Always verify URLs, avoid connecting wallets to unfamiliar websites, and steer clear of unsolicited airdrop offers. If you suspect your device has been compromised or want to scan for potential malware associated with phishing threats, we recommend using SpyHunter, a trusted anti-malware solution.