Această pagină are doar un rol de informare. Este posibil ca anumite servicii și caracteristici să nu fie disponibile în jurisdicția dvs.

Don’t Panic: What To Do in a Crypto Social Engineering Attack

In a separate article, we explore what social engineering is and some common crypto scams that use it to manipulate and defraud crypto users. Understanding what social engineering is raises another important consideration: what to do if you find yourself caught up in such a scam?

In this article, we'll explore the best action to take for each type of social engineering scam you may encounter. Before we get started, remember: prevention is better than cure. OKX Protect, our security hub, is full of actionable guidance and resources to help protect you and your crypto from fraud.

So you think you're being scammed?

In our previous article, we highlighted some of the signs you might have been targeted by social engineering. If you believe you're a victim — even if no funds have been lost — what should your next move be? Read on to understand the immediate steps to take, alongside specific guidance depending on how you've been targeted.

Immediate action to take

  • Disconnect from the internet — this is especially important if you believe you've been targeted by malware and your device has been compromised.

  • Stop all communication with the suspected scammer to avoid any further sensitive information from being shared.

  • Document everything to gather a record of all communications sent and actions taken.

  • Report the attack to the relevant platform and the local authorities. This is a key step towards potentially recovering funds, while helping prevent others from being targeted.

1. If you've shared credentials or seed phrases: access exploits

You'll need to act fast if you've unknowingly provided access to your wallet or a platform, because the scammer now has access to your assets. Here's what you may want to do:

  • Create a new wallet with a trusted provider and transfer all your funds to it

  • Reset passwords to any connected accounts

  • Revoke smart contract approvals for decentralized applications (dApps). This reduces the opportunities hackers and scammers have to target you.

  • Scan your network for malware. Alongside the auto-scan conducted by your chosen software, it's also wise to frequently complete a manual scan for added protection.

2. If you were manipulated by someone you trusted: trust exploits

You've been in regular contact with someone and grown to trust them, but now you're suspicious. Thankfully, you've not handed over any funds or credentials, but you have discussed finances.

  • Stop all communication immediately. Block the suspected scammer if needed.

  • Audit recent transactions. Even if you're confident you've not handed over sensitive information, it's wise to check all transactions during the period you were in touch with the suspected scammer. That allows you to spot any unauthorized activity.

  • Report the scam to any platforms you believe were affected. That could be a messaging platform, or an exchange the suspected scammer was pushing you to trade with it.

  • Warn others. Spread the word of what's happened in any relevant groups on Telegram and X, which is where some scammers choose to target crypto users.

  • Reflect on what happened. Think about the social engineering tactics used against you and what made you susceptible to them. That'll help protect you from any future exploitation.

3. If you send crypto to a suspicious platform or individual: transaction exploits

You've not shared any sensitive details such as seed phrases or private keys, but you have been persuaded to send funds. That could be to invest in a seemingly unmissable opportunity, or to use a particular platform they've suggested. Now you have regrets and suspicions.

  • Use a block explorer like OKX Explorer to track where your crypto went. This helps support efforts to recover your funds.

  • Revoke access to smart contracts to prevent further transactions you didn't authorize.

  • Contact your exchange if onramps or offramps were used. This can also support the recovery process, while limiting the scammer's ability to cash out the stolen funds.

  • Employ a crypto forensics company: Specialist crypto tracing firms can help to identify perpetrators and recover lost assets on your behalf.

  • Warn your community: Help others to avoid falling victim by explaining the scam and how it unfolded.

Safeguard your funds: OKX Protect

Because social engineering scams use psychological tricks to deceive victims, your best defense against them is education and vigilance online. Meanwhile, wider threats exist that you can take action to protect against. OKX is there to help.

Over on our security hub, OKX Protect, you'll find insight to the various features on our platform that are designed to safeguard you and your digital assets. That includes the self-custodial OKX Wallet, 24/7 proactive threat detection, and our dedicated cyber defense unit.

Limitarea răspunderii
Acest conținut este doar cu titlu informativ și se poate referi la produse care nu sunt disponibile în regiunea dvs. Nu are rolul de a furniza (i) un sfat de investiție sau o recomandare de investiție; (ii) o ofertă sau solicitare de cumpărare, vânzare, sau deținere de active digitale, sau (iii) consultanță financiară, contabilă, juridică, sau fiscală. Deținerile de active digitale, inclusiv criptomonede stabile, prezintă un grad ridicat de risc și pot fluctua în mod semnificativ. Trebuie să analizați cu atenție dacă tranzacționarea sau deținerea de cripto / active digitale este potrivită pentru dvs., luând în calcul propria situație financiară. Consultați-vă cu un profesionist din domeniul juridic / fiscal / de investiții pentru întrebări despre circumstanțele dvs. specifice. Informațiile (inclusiv datele de piață și informațiile statistice, dacă există) care apar în această postare sunt doar cu titlu informativ general. Deși s-au luat toate măsurile de precauție rezonabile la întocmirea acestor date și grafice, nu se acceptă nicio responsabilitate sau răspundere pentru nicio eroare materială sau omisiune exprimată în prezenta.

© 2025 OKX. Acest articol poate fi reprodus sau distribuit în întregime sau pot fi folosite extrase ale acestui articol de maximum 100 de cuvinte, cu condiția ca respectiva utilizare să nu fie comercială. Orice reproducere sau distribuire a întregului articol trebuie, de asemenea, să precizeze în mod vizibil: "Acest articol este © 2025 OKX și este utilizat cu permisiune." Extrasele permise trebuie să citeze numele articolului și să includă atribuirea, de exemplu „Numele articolului, [numele autorului, dacă este cazul], © 2025 OKX.” Unele conținuturi pot fi generate sau asistate de instrumente de inteligență artificială (AI). Nu este permisă nicio lucrare derivată sau alte utilizări ale acestui articol.

Articole similare

Vizualizați mai mult
trade-academy-beginner-4
Order Types

What are iceberg orders?

An iceberg order is an algorithmic order allowing users to slice large orders into multiple small orders. These orders will be placed on the market according to their preferred mode (quick execution/price-speed balance/passive queuing). When one of the smaller orders has been completely filled, or the level has been changed from the initial orders, the system will check the depth and place the order accordingly.
18 iul. 2025
2
Forward Contracts vs. Futures Contracts What Are the Differences
Trading tools
Trading guide
Trading basics

How to use the iceberg trading bot

What are iceberg orders? Iceberg orders are large buys or sells broken down into many smaller orders. They may be useful when making a significant trade relative to the size of a given market. Even small orders can risk moving the asset price in an illiquid market, resulting in less favorable entry or exit prices for traders. Iceberg orders are designed to mask large orders and limit the impact of price slippage.
18 iul. 2025
7
The Four Pillars of Engineering Management
Order Types

Time-Weighted Average Price (TWAP) Strategy: A Comprehensive Guide

TWAP, or Time-Weighted Average Price, is a popular trading strategy that is used by traders and investors aiming to minimize market impact and achieve a more accurate average price for an instrument o
18 iul. 2025
Generic tokens thumbnail
DeFi
Staking

Top 13 ways to earn passive income from crypto in 2025

Cryptocurrencies have become increasingly popular over the past decade. Crypto assets such as Bitcoin, Ethereum, and other altcoins, have gained widespread adoption and recognition. However, the crypto market is known for being highly volatile. With that being said, trading isn't the only ways you can earn income in the world of crypto. Now, market participants are able to earn passive income with relatively little effort.
17 iul. 2025
Intermediar
78
Generic charts thumbnail
Technical analysis

Divergence Pattern explained: Understanding the basics

Cryptocurrencies have grown to become one of the most popular assets to trade in recent years, due the opportunities they present. However, these opportunities are only rewarding because they come wit
15 iul. 2025
2
P2P vs. DEX blog
Web3
P2P

P2P vs. DEX: How should you swap your crypto?

The OKX Wallet offers two powerful ways to swap assets: DEX and P2P. While both are easy and secure, they each come with different benefits. Let's dive into which one might be best for you. What's a Decentralized Exchange (DEX) swap?
15 iul. 2025
3
Vizualizați mai mult