How Attackers Make Balances “Appear” (Show and Steal Scam / Fake Confirmation Scam)
Fake screenshots / UI overlays: An altered image or a browser DOM overlay displays a deposit in the victim’s account (BTC flash scam)
Unconfirmed / mempool tx: Attacker provides a txid with 0 confirmations (mempool only). Scammers urge victims to move before confirmations finalize a classic unconfirmed tx scam.
Replace-by-fee / double-spending tricks: Attacker broadcasts an apparent incoming tx and then replaces it with a conflicting transaction or it is orphaned, removing the incoming funds. (fake confirmation scam)
Cloned explorers: Links to counterfeit block explorers that display false confirmations. (show and steal ploy)
The Scam Sequence (Simplified)
The method consists of the attacker displaying an “incoming balance” using a screenshot, fake transaction id, or a cloned interface. (Bitcoin Flash Scam)
The victim is then convinced to send funds, pay a “release fee,” or finalize a trade.
The attacker waits until the victim sends funds, at which point they either cancel / invalidate the incoming transaction, or they just disappear.
The victim no longer has the funds that they sent, and the “Incoming” balance never existed. (BTC Flash Scam / unconfirmed transaction scam)
Attackers use the mismatch between displayed balances and actual blockchain confirmations to create convincing “flash” scams that trick users into releasing funds.