“We Won $7,146,325.16…” — The Crypto Scam That Didn’t Need Your Password
The email looked exciting. The message felt urgent. The reward looked real.
But none of it made sense.
This Agent Foskett briefing breaks down a modern crypto phishing attack where the attacker did not try to break in — they tried to convince the user to willingly hand over access.
No password theft. No exploit. Just a well-crafted story designed to trigger action before the victim stopped to think.
Briefing summary
A practical Microsoft Defender investigation into crypto reward phishing, wallet connection instructions, suspicious URLs, external support channels and the psychology behind “proceed anyway” scams.
What the attacker included
What was actually happening
What we would look for in Microsoft Defender
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
EmailEvents
| where Timestamp > ago(30d)
| where Subject has_any ("PENDING PAYMENT", "UNCLAIMED REWARDS", "Airdrop", "Reward", "Claim")
| project
Timestamp,
SenderFromAddress,
SenderFromDomain,
RecipientEmailAddress,
Subject,
DeliveryAction,
ThreatTypesThen pivot into URLs
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
EmailUrlInfo
| where Timestamp > ago(30d)
| where Url has_any ("wallet", "claim", "airdrop", "crypto", "whatsapp")
| project
Timestamp,
NetworkMessageId,
UrlQuery: connect suspicious emails to URLs
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
EmailEvents
| where Timestamp > ago(30d)
| where Subject has_any ("PENDING PAYMENT", "UNCLAIMED REWARDS", "Airdrop", "Reward", "Claim")
| project Timestamp, NetworkMessageId, SenderFromAddress, RecipientEmailAddress, Subject, DeliveryAction
| join kind=leftouter (
EmailUrlInfo
| where Timestamp > ago(30d)
| where Url has_any ("wallet", "claim", "airdrop", "crypto", "whatsapp")
| project NetworkMessageId, Url
) on NetworkMessageId
| order by Timestamp descWhy this attack works
Investigation checklist
Review delivered failures →
Review sender alignment →
Review click investigation →
Related investigations
Open EmailEvents guide →
Open spoofing guide →
Open KQL hub →
