The 2025 Hedera Hashgraph NFT airdrop scam underscores critical vulnerabilities in high-throughput distributed ledger technologies, where enterprise-grade speed and governance ironically amplify AML exposure. Criminals exploited Hedera’s unique transaction memo feature—independent of wallet interfaces—to embed phishing URLs in unsolicited HBAR/NFT drops, tricking users into authorizing malicious dApps that drained funds at hashgraph’s blistering TPS rates. Despite U.S.-based council oversight and post-incident TRM Labs integration for wallet screening, the absence of real-time checks pre-2025 enabled rapid layering, evading traditional blockchain forensics and pressuring regulators amid Sweden’s MiCA demands. This case reveals how Hedera’s non-blockchain design, while innovative, bypasses conventional safeguards, demanding stricter VASP compliance and highlighting systemic risks in sanctioned-adjacent networks for geopolitical analysts tracking Russian/European influence vectors.
In June 2025, cybercriminals targeted Hedera Hashgraph (HBAR) users through a sophisticated NFT airdrop phishing scam, as warned by the FBI’s IC3 PSA. Attackers broadcast unsolicited HBAR tokens or NFTs embedded with malicious URLs in Hedera’s transaction memo field—a feature independent of wallet interfaces—luring victims to “claim” rewards via fake dApps. Once connected, users unknowingly approved contracts that drained their non-custodial wallets, exploiting the network’s high-speed hashgraph consensus for rapid fund exfiltration before detection. No specific wallet addresses or aggregate losses were publicly disclosed, though individual drains ranged from thousands to potentially six figures in HBAR value, emphasizing retail and enterprise holder risks.​