The FBI’s New York Field Office issued a warning on March 19 about a phishing campaign using fake TRC-20 tokens impersonating the agency on the Tron blockchain, with fraudulent tokens already reaching at least 728 wallets, some holding over $1 million in USDT.
According to official tweet by FBI, the attack combines a technical delivery mechanism with psychological pressure in a two-stage structure. The first stage is the unsolicited airdrop. Victims find fake FBI-branded tokens in their wallets without having initiated any transaction. The tokens appear through standard Tron wallet interfaces and blockchain explorers exactly as any legitimate TRC-20 token would.
The second stage is the threat. Messages attached to the tokens, visible through blockchain explorer transaction data, falsely claim the recipient’s wallet is under investigation for anti-money laundering violations. A total block on all assets is threatened unless the user completes a verification process through an external link. That link leads to a phishing site designed to harvest identifying information and wallet credentials.
The combination is deliberately engineered to override rational skepticism. An unexpected government investigation notice carrying asset seizure threats creates urgency that bypasses the caution most crypto users apply to unsolicited contact. The FBI’s name is the specific psychological lever being pulled. Few institutions carry more authority as a compliance threat in the minds of retail crypto holders.
At least 728 wallets have received the fake tokens as of March 2026. The presence of wallets holding over $1 million in USDT among the targets indicates the campaign is not limited to small retail accounts. High-value wallets are being targeted alongside smaller ones, suggesting the attacker is conducting broad distribution rather than surgically targeting specific addresses.
The campaign fits inside a significantly larger pattern. Impersonation scams increased 1,400% year-over-year as of 2025 according to reported figures. That acceleration reflects both the growing value of crypto assets making them worth targeting and the maturation of social engineering tactics that exploit institutional branding. Government agency impersonation is a specific category within that trend that carries outsized effectiveness because recipients have limited ability to verify the authenticity of a government token through conventional channels.
The FBI’s New York Field Office was explicit in its warning. The agency does not issue tokens. It does not conduct identity verification through blockchain transactions. Any token claiming FBI affiliation is fraudulent by definition. No interaction with these tokens or their associated links serves any legitimate compliance purpose.
The clarification matters because the scam’s effectiveness depends on ambiguity. A recipient who is uncertain whether government agencies could legitimately use blockchain for enforcement communications is more likely to follow the phishing link than one who knows with certainty that they cannot.
The FBI’s New York Office recommends three specific actions. Do not interact with the token and do not visit any website linked to it. Do not provide identifying information or wallet details to any site accessed through the token’s messages. Report the incident to the FBI’s Internet Crime Complaint Center at IC3.gov.
The token’s presence in a wallet does not itself constitute a security breach. Receiving an unsolicited airdrop does not expose private keys or wallet credentials. The risk is entirely in the interaction that follows. Ignoring the token completely eliminates the attack vector.
The post The FBI’s Name Is Being Used to Scam Crypto Wallets on Tron – 728 Wallets Have Already Been Hit appeared first on ETHNews.


