The iToken presale scam is a sophisticated cryptocurrency-related phishing operation that targets potential crypto investors by impersonating a legitimate digital token offering associated with well-known companies. First identified in April 2025 on domains like ipresales[.]top, this fraudulent scheme displays logos of reputable organizations such as Apple, Tesla, OpenAI, and Squarespace to create a false sense of legitimacy. Victims are lured into providing personal information through a deceptive registration process, potentially exposing them to identity theft, account compromise, and cryptocurrency theft. This comprehensive analysis examines the technical aspects of the scam, its operational methods, detection indicators, and provides detailed protection measures to help users avoid falling victim to this and similar cryptocurrency investment scams.
Threat Summary
Name: “iToken Presale” Phishing Scam
Type: Phishing, Scam, Social Engineering, Fraud
Disguise: Fake cryptocurrency presale event
Related Domains: ipresales[.]top, isale[.]digital (potentially others)
Discovery Date: April 14, 2025
Serving IP Address: 172.67.208.239
Distribution Methods: Social media spam, compromised websites, malvertising, rogue pop-ups
Fig. 1: The iToken presale scam website displaying logos of legitimate companies to appear authentic
Technical Analysis of the iToken Presale Scam
The iToken presale scam represents a sophisticated form of cryptocurrency-related phishing that targets individuals interested in early-stage crypto investments. Security researchers have identified this scam operating primarily through the domain ipresales[.]top, though it’s likely that similar campaigns use multiple other domains to evade detection and blocking. The fraudulent website is designed to mimic legitimate token presale platforms, complete with professional design elements and counterfeit associations with established technology companies.
What makes this scam particularly concerning is its strategic use of trusted brand imagery. The website prominently displays logos of well-known companies such as Apple, Tesla, OpenAI, and Squarespace, creating a false impression of partnership or endorsement. This technique, known as “brand hijacking,” exploits the trust users have in established companies to lend credibility to the fraudulent operation. It’s important to note that none of these companies have any association with the iToken presale.
The technical implementation of the scam follows a common phishing pattern:
Professional-Looking Landing Page: Utilizes modern web design elements, professional typography, and high-quality graphics to create an appearance of legitimacy
Counterfeit Authentication Mechanisms: Implements a registration system that appears secure but actually funnels all submitted information directly to the scammers
HTTPS Implementation: Uses SSL/TLS certificates to display the padlock icon in browsers, which many users mistakenly interpret as an indicator of site legitimacy
Mobile-Responsive Design: Optimized to work across multiple devices, increasing the potential victim pool
Time-Limited Offers: Creates artificial scarcity and urgency using countdown timers or “limited allocation” messaging
Data Collection and Exploitation Methods
The primary goal of the iToken presale scam is to collect valuable personal information through a deceptive registration process. Victims are prompted to provide comprehensive personal details including full names, email addresses, phone numbers, and passwords. This data collection serves multiple malicious purposes and creates several avenues for further exploitation.
The scammers can leverage the collected information in several ways:
Credential Harvesting: Many users recycle passwords across multiple platforms. By capturing a victim’s email and password combination, attackers can attempt credential stuffing attacks against other services, potentially gaining access to email accounts, financial platforms, or legitimate cryptocurrency exchanges
Identity Theft: The personal information collected can be used to build profiles for identity theft or sold on dark web marketplaces to other cybercriminals
Targeted Phishing: Information gathered enables highly personalized follow-up phishing attempts with greater success rates due to the inclusion of accurate personal details
Cryptocurrency Theft: In later stages, the scam may direct victims to connect their cryptocurrency wallets to the platform or send funds to a specific wallet address, resulting in direct financial loss
SIM Swapping: Phone numbers can be used in SIM swapping attacks, where attackers convince mobile carriers to transfer a victim’s phone number to a new device, potentially bypassing two-factor authentication on various accounts
In more sophisticated versions of this scam, victims may encounter crypto drainers – malicious scripts that automatically transfer funds from connected cryptocurrency wallets without explicit authorization. These operate by requesting connection permissions that, when granted, allow the drainer to initiate transactions on behalf of the victim.
Source: Analysis of cryptocurrency phishing scam operations by Gridinsoft Research Team, April 2025
Distribution Methods and Victim Targeting
The iToken presale scam is primarily distributed through social media platforms, particularly on X (formerly Twitter), where cryptocurrency discussions are prevalent. Security researchers have identified posts promoting the fake presale that are designed to reach users interested in cryptocurrency investments, blockchain technology, and financial opportunities. These promotional messages often employ urgency tactics, exclusive access claims, and promises of significant returns to motivate quick action from potential victims.
The scam utilizes multiple distribution channels to reach potential victims:
Social Media Spam: Posts and advertisements on platforms like X, Facebook, Instagram, and Reddit that target cryptocurrency enthusiasts
Compromised Accounts: Hijacked social media accounts belonging to influencers, celebrities, or cryptocurrency projects to lend credibility to promotional messages
Direct Messages: Unsolicited private messages sent to users who follow cryptocurrency-related accounts or participate in crypto discussions
Malicious Advertisements: Paid advertising campaigns on various platforms that bypass content moderation systems
Rogue Browser Pop-ups: Intrusive advertisements appearing on websites using questionable advertising networks
Typosquatting: Registering domains similar to legitimate cryptocurrency projects with slight misspellings to capture mistyped URLs
Email Campaigns: Targeted phishing emails sent to lists of users interested in cryptocurrency investments
Fig. 2: Example of a social media post promoting the iToken presale scam with false promises of association with Apple
The scam specifically targets individuals with the following characteristics:
Cryptocurrency investors looking for early investment opportunities
Technology enthusiasts interested in potential Apple-related products
Individuals with limited knowledge of how legitimate token presales operate
Users who follow cryptocurrency news, influencers, and trading platforms
People attracted by promises of significant financial returns
Detection Indicators: How to Identify the iToken Presale Scam
Identifying cryptocurrency scams like the iToken presale requires awareness of common red flags and suspicious elements. While these scams often present professionally designed interfaces, they contain subtle but telling indicators that can help alert potential victims before personal information or funds are compromised. Understanding these warning signs is crucial for protecting yourself from this and similar cryptocurrency-related scams.
Key indicators that the iToken presale is a scam include:
Unauthorized Brand Association: Use of logos from major companies like Apple, Tesla, OpenAI, and Squarespace without actual partnerships or endorsements
Suspicious Domain Name: Use of unusual domains like ipresales[.]top rather than official company domains
Lack of Verifiable Information: Absence of verifiable team members, company registration details, or legitimate contact information
Too-Good-To-Be-True Promises: Unrealistic claims about investment returns or token value appreciation
Urgency Tactics: Countdown timers or limited allocation notices designed to rush decision-making
Grammatical Errors: Despite professional appearance, many scam sites contain spelling or grammatical mistakes
Excessive Data Collection: Requesting unnecessary personal information beyond what would be needed for a legitimate presale
Missing or Vague Whitepaper: Lack of a detailed technical document explaining the token’s purpose, technology, and roadmap
No Smart Contract Verification: Inability to verify the token’s smart contract on blockchain explorers like Etherscan
Security software may detect the iToken presale scam website under various detection names, with Trustwave correctly identifying it as a phishing attempt. However, technical detection is insufficient, as new domains can be rapidly deployed to evade blocklists.
Protection Measures and Best Practices
Protecting yourself from cryptocurrency scams like the iToken presale requires a combination of technical safeguards and informed practices. The cryptocurrency space is particularly vulnerable to scams due to its decentralized nature, irreversible transactions, and the high potential rewards that can cloud judgment. Implementing these protection measures will significantly reduce your risk of falling victim to crypto-related scams.
1. Perform Thorough Due Diligence
Official Channels Verification: Only trust information from official company websites and verified social media accounts
Team Background Checks: Research the team behind any crypto project – legitimate projects have verifiable team members with relevant experience
Smart Contract Verification: For legitimate token sales, verify the smart contract on blockchain explorers and check if it has been audited by reputable security firms
Community Validation: Check established cryptocurrency forums and communities for discussions about the project
Regulatory Compliance: Verify if the project complies with relevant financial regulations and has necessary registrations
2. Implement Website Security Practices
URL Verification: Always check the website URL carefully – legitimate companies use their own domains (e.g., apple.com for Apple)
Bookmark Official Sites: Create bookmarks for legitimate cryptocurrency platforms rather than following links
Use Web Security Tools: Install browser extensions that warn about phishing sites and block malicious domains
Check for HTTPS: While scam sites also use HTTPS, legitimate sites always will – absence of HTTPS is an immediate red flag
Use Anti-Phishing Software: Security tools like Trojan Killer can provide additional protection against phishing attempts
Wallet Protection: If you connected a cryptocurrency wallet, transfer any remaining funds to a new, secure wallet immediately
Scan for Malware: Run a comprehensive security scan on all devices used to access the scam site
Report the Scam: Report the scam to relevant authorities:
FBI Internet Crime Complaint Center (IC3) for US residents
Action Fraud for UK residents
Your local cybercrime unit for other regions
The domain registrar hosting the scam website
The social media platform where you encountered the scam
Related Cryptocurrency Scams and Attack Vectors
The iToken presale scam exists within a broader ecosystem of cryptocurrency-related fraud. Understanding the connections between these various scams helps in developing a more comprehensive protective strategy. Many of these schemes employ similar social engineering tactics, technical infrastructure, and monetization methods, suggesting potential links between the groups operating them.
Related cryptocurrency scams include:
Solana L2 Presale Scam: Similar fake presale claiming association with the Solana blockchain
$TWOCS Token Presale Scam: Fraudulent token offering using similar data collection techniques
$SHADOW Presale Scam: Another cryptocurrency presale scam targeting similar victim profiles
Similar registration forms designed to harvest the same types of personal information
Comparable visual design elements and website structures
Use of unauthorized company logos and false partnership claims
Urgency tactics and limited-time offer messaging
Distribution through the same channels, particularly social media platforms
Conclusion
The iToken presale scam represents a sophisticated attempt to exploit interest in cryptocurrency investments by misleadingly associating with reputable companies like Apple, Tesla, OpenAI, and Squarespace. Through deceptive registration processes, the scam collects valuable personal information that can lead to identity theft, account compromise, and financial loss. Its distribution primarily through social media platforms highlights the importance of vigilance when encountering investment opportunities online.
The cryptocurrency space, while offering legitimate investment opportunities, remains particularly vulnerable to scams due to its relative newness, technical complexity, and the irreversible nature of blockchain transactions. As cryptocurrency adoption continues to grow, we can expect similar scams to evolve in sophistication, requiring heightened awareness and security practices from all participants in the ecosystem.
Protection against cryptocurrency scams like the iToken presale requires a multi-layered approach combining technical safeguards, informational awareness, and cautious investment practices. By verifying information through official channels, conducting thorough research, implementing strong security measures, and approaching investment opportunities with healthy skepticism, users can significantly reduce their risk of falling victim to such scams. If you encounter suspicious cryptocurrency offerings, especially those claiming affiliation with major companies without clear verification, exercise extreme caution and report them to relevant authorities to help protect others.
Founded in 2003, GridinSoft LLC is a Kyiv, Ukraine-based cybersecurity company committed to safeguarding users from the ever-growing threats in the digital landscape. With over two decades of experience, we have earned a reputation as a trusted provider of innovative security solutions, protecting millions of users worldwide.