Skip to content

We're upgrading our operations to serve you better. Orders ship as usual from Laval, QC. Questions? Contact us

Bitcoin accepted at checkout  |  Ships from Laval, QC, Canada  |  Expert support since 2016

Bitcoin Scams in 2026: A Miner’s Guide to Protecting Your Sats and Your Hardware
Bitcoin Culture

Bitcoin Scams in 2026: A Miner’s Guide to Protecting Your Sats and Your Hardware

· D-Central Technologies · 17 min read

The Bitcoin network is the most robust, battle-tested monetary system ever built. Over 800 EH/s of computational power secures a network that has operated with near-perfect uptime since January 3, 2009. A 3.125 BTC block reward still flows every ten minutes to miners around the world — from industrial operations to Bitaxe solo miners running quietly on a desk in someone’s home.

But the same properties that make Bitcoin powerful — irreversible transactions, pseudonymous addresses, no central authority to call when something goes wrong — also make it a target for scammers. The scams targeting Bitcoiners in 2026 are not the same crude phishing emails of a decade ago. They are sophisticated, technically literate, and specifically designed to exploit the trust and enthusiasm of the Bitcoin community.

This guide is written by D-Central Technologies, Canada’s Bitcoin Mining Hackers, for the miners, builders, and Bitcoiners who form the backbone of decentralization. We have been repairing ASICs, building mining solutions, and educating the community since 2016. We have seen every scam pattern in the book — and we want to make sure you never fall for one.

Why Bitcoin Scams Are Different

Traditional financial fraud depends on exploiting centralized intermediaries — banks, credit card processors, wire services. A victim can often call their bank, dispute a charge, and have funds reversed. The centralized system, for all its flaws, has a built-in “undo” button.

Bitcoin has no undo button. That is a feature, not a bug. Irreversibility is what makes Bitcoin’s settlement final and its monetary policy credible. But it also means that once you send bitcoin to a scammer, those sats are gone. No customer service line. No chargeback. No regulatory body to petition for a refund.

The Pseudonymity Factor

Bitcoin addresses are pseudonymous, not anonymous. Every transaction is permanently recorded on a public ledger. Chain analysis firms can and do trace funds across addresses. But scammers use mixing services, chain-hopping, and freshly generated addresses to make tracing difficult and recovery expensive.

Irreversibility as a Weapon

Scammers exploit the urgency that irreversibility creates. They pressure victims into sending bitcoin quickly — “this deal expires in 10 minutes,” “your account will be locked,” “the price is about to change.” Once the transaction hits the mempool and gets even a single confirmation, it is done. Understanding this fundamental property of Bitcoin is your first line of defense.

Common Bitcoin Scams Targeting Miners and Bitcoiners

Fake Mining Hardware Sellers

This is the scam that hits closest to home for our community. Scammers set up professional-looking websites or social media accounts selling ASIC miners, Bitcoin space heaters, or open-source mining devices at prices that seem too good to be true.

How it works: A website offers Antminer S21 units at 40% below market price, or claims to have rare hardware in stock. They accept bitcoin or wire transfer only. After payment, the hardware never arrives — or the victim receives a dead unit, a completely different model, or a box of scrap parts.

Red flags:

  • Prices significantly below what established retailers charge
  • No verifiable physical address or phone number
  • Website domain registered within the last few months
  • No social media history or community reputation
  • Pressure to pay immediately via bitcoin or wire transfer only
  • Stock photos instead of actual product images

How to protect yourself: Buy from established companies with years of track record. D-Central has been selling and repairing mining hardware since 2016 with a physical presence in Laval, Quebec. Check a seller’s history, look for real customer reviews, and verify their business registration. If someone is selling an S21 for half price, ask yourself why.

Cloud Mining Scams

Cloud mining promises that you can rent hashrate from a remote data center and earn bitcoin without owning hardware. While some legitimate cloud mining operations exist, the space is overwhelmingly dominated by Ponzi schemes that pay early users with deposits from later users until the whole structure collapses.

How it works: A slick website shows a “mining dashboard” with real-time hashrate displays and daily payout counters. You deposit bitcoin, and for the first few weeks, you receive small “payouts.” Then the payouts slow, the website goes offline, and the operators vanish with all deposited funds.

Why real miners see through this: Anyone who has actually operated mining hardware understands the economics. Electricity costs, hardware depreciation, difficulty adjustments, and cooling requirements eat into margins constantly. No cloud mining service can guarantee fixed returns when the mining difficulty retargets every 2,016 blocks and the bitcoin price fluctuates daily. If the returns they promise exceed what you could earn running your own hardware, it is almost certainly a scam.

The real alternative: If you want to mine without the noise and heat of industrial ASICs, look at solo mining with a Bitaxe or convert your miner into a space heater that earns bitcoin while heating your home. You control the hardware. You control the keys. That is real mining.

Fake Exchange and Custodian Scams

Fraudulent exchanges mimic the look and feel of legitimate trading platforms. They may have professional interfaces, fake order books, and fabricated trading volume. Some even allow small withdrawals initially to build trust before blocking larger withdrawal requests.

Notable examples: BitKRX posed as a South Korean exchange, complete with a name designed to sound like Korea’s legitimate stock exchange. Users deposited funds and eventually found themselves unable to withdraw. The QuadrigaCX collapse in 2019 — a Canadian exchange — revealed that its founder had been operating it as a personal piggy bank, and approximately $190 million CAD in user funds were lost when he died under suspicious circumstances.

How to protect yourself: Use well-established exchanges with regulatory compliance in your jurisdiction. For Canadian Bitcoiners, ensure your exchange is registered with FINTRAC. Better yet, minimize the amount of bitcoin you keep on any exchange. Move your sats to self-custody — a hardware wallet you control. Not your keys, not your coins.

Impersonation and Fake Support Scams

Scammers impersonate customer support agents from exchanges, wallet providers, or mining pool operators. They reach out via social media, Telegram, Discord, or email, claiming there is an issue with your account that requires immediate action.

How it works: You post a question in a public Bitcoin or mining forum. Within minutes, someone DMs you claiming to be “support.” They ask you to “verify” your account by entering your seed phrase into a website, or they send you a “diagnostic tool” that is actually malware designed to steal your wallet credentials.

Critical rule: No legitimate company will ever ask for your seed phrase, private keys, or wallet password. D-Central’s support team will never DM you first on social media asking for sensitive information. If someone contacts you claiming to be from our team, verify through our official channels at d-central.tech/contact.

SIM Swapping and Phone Porting

SIM swapping is one of the most dangerous attacks against Bitcoiners who use SMS-based two-factor authentication. The attacker convinces your mobile carrier to transfer your phone number to a SIM card they control. Once they have your number, they can intercept SMS verification codes, reset passwords on exchanges, and drain your accounts.

How it works: Attackers gather personal information about you from social media, data breaches, or social engineering. They call your carrier, impersonate you, and request a SIM swap. Canadian carriers have been repeatedly targeted — the RCMP has investigated multiple SIM-swapping rings operating in Canada.

How to protect yourself:

  • Never use SMS as your second factor for any bitcoin-related account
  • Use hardware security keys (YubiKey) or TOTP authenticator apps (not Google Authenticator — use an open-source option like Aegis on Android or Raivo on iOS)
  • Set a PIN or passphrase with your mobile carrier to prevent unauthorized SIM changes
  • Minimize personal information you share publicly on social media

Phishing Sites and Cloned Wallets

Phishing attacks target Bitcoiners with fake websites that look identical to legitimate services. A cloned version of a popular hardware wallet’s firmware update page, a fake exchange login, or a spoofed mining pool dashboard — all designed to capture your credentials or trick you into sending bitcoin to a wrong address.

Recent evolution: In 2025 and 2026, phishing attacks have become more sophisticated with AI-generated content. Scammers create convincing fake websites, write grammatically flawless emails, and even generate deepfake video of known Bitcoin figures endorsing their schemes.

How to protect yourself:

  • Bookmark the real URLs of every service you use and navigate only through those bookmarks
  • Always verify the SSL certificate and domain name character-by-character
  • Never click links in emails or DMs — type the URL manually
  • Verify firmware updates and software downloads through official GPG signatures or checksums
  • Use a password manager that auto-fills only on the correct domain — it will not fill credentials on a phishing site

Celebrity and Influencer Endorsement Scams

Scammers use the names and likenesses of public figures — from tech CEOs to Bitcoin podcasters — to promote fake giveaways, trading platforms, or “investment opportunities.” The typical format: “Send 0.01 BTC and receive 0.1 BTC back!” This is always a scam. Always. No one is doubling your bitcoin.

The AI deepfake escalation: As of 2026, deepfake technology has made these scams significantly more convincing. Scammers generate realistic video and audio of well-known Bitcoin figures promoting fraudulent schemes. Always verify any “giveaway” or endorsement through the person’s official, verified accounts.

Mining Hardware Repair Scams

This is a scam category that affects our community directly. Unlicensed “repair shops” advertise cheap ASIC repair services, collect your hardware, and either never return it, return it with parts stripped out, or charge exorbitant fees for work they never performed.

How to protect yourself: Work with established repair services that have a physical location, published repair processes, and a track record in the community. D-Central operates from our facility in Laval, Quebec, and has been repairing ASICs professionally since 2016 — covering Bitmain, MicroBT, Innosilicon, Canaan, and more. We provide diagnostic reports and transparent pricing.

Fake Mining Pool Scams

Fraudulent mining pools collect your hashrate and either never pay out or skim a much larger percentage than advertised. Some operate normally for months to build reputation before executing an exit scam.

How to protect yourself: Use well-established pools with transparent block-finding records visible on the blockchain. For solo miners using a Bitaxe or NerdAxe, you can point your device at public solo mining pools like Solo CKPool where your hashrate contributions and any block finds are independently verifiable. The beauty of solo mining is that the block reward goes directly to your address — no pool operator can withhold it.

High-Profile Scams: Lessons for the Bitcoin Community

FTX: The Centralization Cautionary Tale

The 2022 collapse of FTX was not just a scam — it was a masterclass in why Bitcoiners do not trust centralized intermediaries. FTX, run by Sam Bankman-Fried (who was subsequently convicted of fraud and sentenced to 25 years in prison), used customer deposits to fund speculative bets through its sister company Alameda Research. Billions in customer funds were lost.

The lesson for Bitcoiners is straightforward: custodial risk is real. Every satoshi you leave on an exchange is an IOU, not actual bitcoin. FTX reinforced what cypherpunks have said since the beginning — self-custody is not optional, it is essential.

Mt. Gox: The Original Exchange Failure

The 2014 collapse of Mt. Gox, which at its peak handled over 70% of all Bitcoin transactions, resulted in the loss of approximately 850,000 BTC. The saga dragged on for over a decade, with creditors only beginning to receive partial repayments in 2024. Another painful reminder that leaving bitcoin on an exchange is an unacceptable risk.

Bitconnect: The Textbook Ponzi

Bitconnect promised guaranteed daily returns through an alleged “trading bot.” It was a straightforward Ponzi scheme that collapsed in 2018, wiping out billions in user funds. The key lesson: guaranteed returns in a system with variable mining difficulty and market-driven pricing are mathematically impossible. Anyone promising them is lying.

The Pattern

Every major scam in Bitcoin’s history shares common elements: centralized control of user funds, promises of guaranteed returns, opacity about actual operations, and charismatic leadership that substitutes personality for transparency. The antidote is always the same — verify, do not trust. Self-custody. Run your own node. Mine your own bitcoin.

Protecting Yourself: A Miner’s Security Checklist

Self-Custody Fundamentals

  • Hardware wallets: Store your bitcoin on a hardware wallet. Verify the device is genuine and purchased directly from the manufacturer or an authorized reseller
  • Seed phrase security: Write your seed phrase on steel or titanium backup plates. Never store it digitally — not in a notes app, not in cloud storage, not in an email draft
  • Multi-signature: For larger holdings, consider a multi-sig setup that requires multiple keys to authorize a transaction
  • Test transactions: Always send a small test amount before transferring large sums to a new address

Mining Operation Security

  • Buy hardware from trusted sources: Purchase mining equipment from established companies with verifiable track records. D-Central’s shop carries everything from Bitaxe solo miners to full ASIC units, all tested before shipping
  • Verify power requirements: A Bitaxe Supra, Ultra, or Gamma requires a 5V power supply via a 5.5×2.1mm DC barrel jack — NOT USB-C. The USB-C port on these devices is for firmware flashing only. Buying from unknown sellers who give you wrong power information can fry your device
  • Secure your mining pool credentials: Use unique, strong passwords for every mining pool. Enable 2FA where available. Set payout addresses to your own hardware wallet
  • Network security: Isolate your mining hardware on a separate VLAN or network segment. Keep firmware updated. Change default passwords on all mining devices
  • Verify hosting providers: If you use a hosting service for your ASICs, verify the facility with a physical visit if possible. D-Central’s hosting operates exclusively in Quebec — be wary of any service claiming to host in a region with unfavorable energy economics

Digital Hygiene

  • Authentication: Use hardware security keys or TOTP apps for 2FA. Never SMS. Never email-based codes
  • Password management: Use a reputable, open-source password manager with a strong master password
  • Email security: Use a dedicated email address for bitcoin-related accounts, separate from your personal and work emails
  • Browser security: Use a hardened browser. Disable unnecessary extensions. Be extremely cautious with any extension that interacts with financial services
  • Operating system: Keep your OS updated. Consider a dedicated, clean machine for bitcoin transactions
  • Social media discipline: Never post about your bitcoin holdings, mining revenue, or hardware purchases publicly. This makes you a target

What to Do If You Have Been Scammed

If you suspect you have been a victim of a bitcoin scam:

  1. Act immediately: If any of your exchange accounts may be compromised, change passwords and disable API keys right away. Move funds to a secure wallet you control
  2. Document everything: Save all communications, transaction IDs, wallet addresses, website URLs, and screenshots. This evidence is critical for any investigation
  3. Report to law enforcement: In Canada, report to the Canadian Anti-Fraud Centre (CAFC) at 1-888-495-8501 or online. File a report with your local police as well
  4. Report to the platform: If the scam involved an exchange or service, report it to that platform. They may be able to flag or freeze associated accounts
  5. Warn the community: Share your experience (without revealing sensitive personal details) on Bitcoin forums and social media to help others avoid the same scam
  6. Do not pay “recovery” services: Scammers often target victims a second time, posing as “recovery experts” who can retrieve stolen bitcoin for a fee. This is almost always a secondary scam

D-Central’s Commitment to the Community

At D-Central Technologies, we have been building for the Bitcoin ecosystem since 2016. Our mission — decentralization of every layer of Bitcoin mining — means we are not just selling hardware. We are equipping individuals with the tools and knowledge to participate in securing the Bitcoin network on their own terms.

Every Bitaxe we ship, every ASIC we repair, every space heater we build is a small act of decentralization. We believe that the more miners there are — spread across homes, garages, and workshops around the world — the more resilient Bitcoin becomes.

Scammers thrive where there is ignorance and trust in centralized intermediaries. The Bitcoin community thrives where there is knowledge, self-sovereignty, and verification. We are proud to be on the right side of that equation.

Explore our full range of mining hardware, learn about solo mining with Bitaxe, or get your ASIC back in service with our professional repair services.

Frequently Asked Questions

What is the most common scam targeting Bitcoin miners in 2026?

Fake hardware sellers are the most prevalent scam targeting miners. Scammers create professional-looking websites or social media profiles offering ASICs and open-source miners at deeply discounted prices. After receiving payment — usually in bitcoin or wire transfer — they either never ship the hardware, send a non-functional unit, or ship a completely different model. Always buy from established companies with a verifiable physical presence and years of community trust.

How can I tell if a cloud mining service is a scam?

Nearly all cloud mining services are scams or, at best, money-losing propositions. The red flags include guaranteed daily returns, vague information about actual mining operations, no verifiable hashrate on the blockchain, and aggressive referral programs that reward recruitment over actual mining. If the returns they promise exceed what you could earn running equivalent hardware yourself — accounting for electricity, maintenance, and difficulty adjustments — it is almost certainly fraudulent. Real mining means controlling your own hardware.

What should I do if someone on Telegram or Discord claims to be from D-Central support?

Do not share any personal information, seed phrases, private keys, or wallet addresses. D-Central’s support team will never initiate contact via unsolicited DMs on social media platforms. If you need support, reach out through our official website at d-central.tech/contact or our verified social media accounts. Any unsolicited “support” message should be treated as a scam attempt.

Is SMS-based two-factor authentication safe for my exchange accounts?

No. SMS-based 2FA is vulnerable to SIM-swapping attacks, where an attacker convinces your mobile carrier to transfer your phone number to their device. Once they control your number, they can intercept verification codes and access your accounts. Use hardware security keys (like YubiKey) or TOTP authenticator apps instead. This single change dramatically reduces your risk of account compromise.

How do I verify that a Bitcoin exchange is legitimate?

Check that the exchange is registered with the appropriate financial regulatory body in its jurisdiction. In Canada, look for FINTRAC registration. Check for a verifiable physical address, published leadership team, independent security audits, and years of operational history. Search for the exchange name plus “scam” or “review” online. If the exchange is very new, has no public leadership, or promises unusually high returns, proceed with extreme caution — or better yet, do not proceed at all.

Can stolen bitcoin ever be recovered?

In rare cases, law enforcement agencies with chain analysis capabilities have recovered stolen bitcoin, particularly from large-scale fraud operations. However, for individual victims, recovery is extremely unlikely. Bitcoin transactions are irreversible by design. This is why prevention — self-custody, strong authentication, verified vendors, and healthy skepticism — is infinitely more valuable than any recovery effort after the fact.

What power connector does a Bitaxe use? I have seen conflicting information online.

Bitaxe models including the Supra, Ultra, and Gamma use a 5V power supply with a 5.5×2.1mm DC barrel jack connector, requiring a 5V/6A PSU. The USB-C port on these devices is for firmware flashing and serial communication only — it does NOT provide power. The Bitaxe GT and Bitaxe Hex use a 12V DC XT30 connector. Scam sellers and uninformed resellers often provide incorrect power specifications, which can damage or destroy the device. Buy from authorized sellers who understand the hardware.

Are “guaranteed return” mining programs ever legitimate?

No. Bitcoin mining revenue depends on variables that no one controls: network difficulty (which retargets every 2,016 blocks), the bitcoin price, electricity costs, and hardware performance over time. With the current block reward at 3.125 BTC and network hashrate exceeding 800 EH/s, mining economics are dynamic and constantly shifting. Any program guaranteeing fixed returns is either lying about its operations or running a Ponzi scheme. Legitimate mining means accepting variable returns in exchange for contributing to Bitcoin’s security and decentralization.

Should I trust “bitcoin recovery” services that claim they can get my stolen funds back?

Almost never. The vast majority of “bitcoin recovery” services are secondary scams that prey on victims who have already lost funds. They charge upfront fees for services they cannot deliver. While there are legitimate blockchain forensics firms that work with law enforcement (such as Chainalysis), these firms typically work on large-scale cases and do not solicit individual victims through social media ads or unsolicited messages. If someone contacts you offering to recover your lost bitcoin, it is overwhelmingly likely to be another scam.

How does mining my own bitcoin with a Bitaxe help protect against scams?

Solo mining with a Bitaxe eliminates nearly every scam vector in the Bitcoin mining space. There is no cloud mining operator to abscond with your funds. There is no custodial exchange holding your mining rewards. The block reward — if you find a block — goes directly to your own wallet address. You control the hardware sitting on your desk, you control the private keys, and you verify your own transactions. This is Bitcoin the way it was designed to work: trustless, permissionless, and under your complete control. Explore the full Bitaxe lineup at D-Central’s Bitaxe Hub.

Related Posts