The second scenario’s story is somewhat similar in the main body, but the beginning is different. The main tool in a cybercriminal's hands is spoofing. A victim is sure that they use a legitimate website or app, enter information, and buy crypto. In reality, they use a cloned platform, and all assets go to malicious actors. One more direction of this scenario is a giveaway by famous bankers, investors, etc., who appear to be scammers when it comes to the test.