Ця сторінка надається лише з інформаційною метою. Певні послуги й функції можуть бути недоступні у вашій юрисдикції.

Don’t Panic: What To Do in a Crypto Social Engineering Attack

In a separate article, we explore what social engineering is and some common crypto scams that use it to manipulate and defraud crypto users. Understanding what social engineering is raises another important consideration: what to do if you find yourself caught up in such a scam?

In this article, we'll explore the best action to take for each type of social engineering scam you may encounter. Before we get started, remember: prevention is better than cure. OKX Protect, our security hub, is full of actionable guidance and resources to help protect you and your crypto from fraud.

So you think you're being scammed?

In our previous article, we highlighted some of the signs you might have been targeted by social engineering. If you believe you're a victim — even if no funds have been lost — what should your next move be? Read on to understand the immediate steps to take, alongside specific guidance depending on how you've been targeted.

Immediate action to take

  • Disconnect from the internet — this is especially important if you believe you've been targeted by malware and your device has been compromised.

  • Stop all communication with the suspected scammer to avoid any further sensitive information from being shared.

  • Document everything to gather a record of all communications sent and actions taken.

  • Report the attack to the relevant platform and the local authorities. This is a key step towards potentially recovering funds, while helping prevent others from being targeted.

1. If you've shared credentials or seed phrases: access exploits

You'll need to act fast if you've unknowingly provided access to your wallet or a platform, because the scammer now has access to your assets. Here's what you may want to do:

  • Create a new wallet with a trusted provider and transfer all your funds to it

  • Reset passwords to any connected accounts

  • Revoke smart contract approvals for decentralized applications (dApps). This reduces the opportunities hackers and scammers have to target you.

  • Scan your network for malware. Alongside the auto-scan conducted by your chosen software, it's also wise to frequently complete a manual scan for added protection.

2. If you were manipulated by someone you trusted: trust exploits

You've been in regular contact with someone and grown to trust them, but now you're suspicious. Thankfully, you've not handed over any funds or credentials, but you have discussed finances.

  • Stop all communication immediately. Block the suspected scammer if needed.

  • Audit recent transactions. Even if you're confident you've not handed over sensitive information, it's wise to check all transactions during the period you were in touch with the suspected scammer. That allows you to spot any unauthorized activity.

  • Report the scam to any platforms you believe were affected. That could be a messaging platform, or an exchange the suspected scammer was pushing you to trade with it.

  • Warn others. Spread the word of what's happened in any relevant groups on Telegram and X, which is where some scammers choose to target crypto users.

  • Reflect on what happened. Think about the social engineering tactics used against you and what made you susceptible to them. That'll help protect you from any future exploitation.

3. If you send crypto to a suspicious platform or individual: transaction exploits

You've not shared any sensitive details such as seed phrases or private keys, but you have been persuaded to send funds. That could be to invest in a seemingly unmissable opportunity, or to use a particular platform they've suggested. Now you have regrets and suspicions.

  • Use a block explorer like OKX Explorer to track where your crypto went. This helps support efforts to recover your funds.

  • Revoke access to smart contracts to prevent further transactions you didn't authorize.

  • Contact your exchange if onramps or offramps were used. This can also support the recovery process, while limiting the scammer's ability to cash out the stolen funds.

  • Employ a crypto forensics company: Specialist crypto tracing firms can help to identify perpetrators and recover lost assets on your behalf.

  • Warn your community: Help others to avoid falling victim by explaining the scam and how it unfolded.

Safeguard your funds: OKX Protect

Because social engineering scams use psychological tricks to deceive victims, your best defense against them is education and vigilance online. Meanwhile, wider threats exist that you can take action to protect against. OKX is there to help.

Over on our security hub, OKX Protect, you'll find insight to the various features on our platform that are designed to safeguard you and your digital assets. That includes the self-custodial OKX Wallet, 24/7 proactive threat detection, and our dedicated cyber defense unit.

Примітка
Цей контент надається виключно в інформаційних цілях і може стосуватися продуктів, недоступних у вашому регіоні. Він не призначений для надання (i) порад або рекомендацій щодо інвестування; (ii) пропозицій або прохань купити, продати або утримувати криптовалютні/цифрові активи; (iii) фінансових, бухгалтерських, юридичних або податкових консультацій. Утримування криптовалютних/цифрових активів, зокрема стейблкоїнів, пов’язане з високим ризиком, а вартість таких активів може сильно коливатися. Ви маєте ретельно зважити, чи підходить вам торгівля криптовалютними/цифровими активами або володіння ними з огляду на свій фінансовий стан. Якщо у вас виникнуть запитання щодо доречності будь-яких дій за конкретних обставин, зверніться до юридичного, податкового або інвестиційного консультанта. Інформація (включно з ринковими даними й статистичними відомостями, якщо такі є), що з’являється в цій публікації, призначена лише для загальних інформаційних цілей. Хоча під час підготовки цих даних і графіків було вжито всіх належних заходів, ми не несемо відповідальності за будь-які помилки у фактах або упущення в них.

© OKX, 2025. Цю статтю можна відтворювати або поширювати повністю чи в цитатах обсягом до 100 слів за умови некомерційного використання. Під час відтворення або поширення всієї статті потрібно чітко вказати: «Ця стаття використовується з дозволу власника авторських прав © OKX, 2025». Цитати мають наводитися з посиланням на назву й авторство статті, наприклад: «Назва статті, [ім’я та прізвище автора, якщо є], © OKX, 2025». Деякий вміст може бути згенеровано інструментами штучного інтелекту (ШІ) або з їх допомогою. Використання статті в похідних і інших матеріалах заборонено.

Схожі статті

Показати більше
golpe de investimento
Security

How To Avoid Rug Pulls: Stay Safe Against Crypto Product Purchase Scams

Have you ever been sent a direct message on your preferred social platform, asking you to join an airdrop? Did you later realize that the name seemed suspicious, with a "1" instead of an "i"? These scams artfully blend technology with psychological tactics to exploit the unwary. Common strategies include offering unrealistically high returns on your deposited funds, stealing sensitive personal information for extortion, and creating elaborate phishing schemes that mimic legitimate crypto platforms.
15 серп. 2025 р.
Початковий
27
Your money your choice
Technical analysis

Understanding the concept of an all-time high (ATH) in crypto

As the crypto market continues its powerful surge following the April 2024 Bitcoin halving, we’re witnessing breathtaking gains across a wide range of coins and tokens. The rally has reignited memories of past bull market frenzies, only this time, prices have already shattered previous records. Bitcoin, which set its former all-time high of around $68,742 on November 10, 2021, has since stormed past the $100,000 mark in late 2024 and reached over $123,000 in August 2025. With fear of missing out (FOMO) running high, traders are now asking not if the market can reclaim old highs, but how far this cycle can push the boundaries of what’s possible.
14 серп. 2025 р.
Початковий
33
Lightning Network explainer thumbnail
Bitcoin
Protocols

How the Lightning Network could solve Bitcoin's speed and scale conundrums

The emergence of  ordinals  and  BRC-20 tokens  sparked a lively debate within the Bitcoin community. On the one hand, enthusiasts celebrated the newfound potential these innovations bring to the Bitcoin blockchain. On the other hand, concerns have been raised about the rise in gas fees, longer transaction times, and the potential occupation of valuable block space by ordinals and BRC-20 tokens.
13 серп. 2025 р.
4
OKX Bot Trading
Trading tools
OKX
Trading guide

How to use OKX's crypto trading bots

On top of our extensive trading pairs, decentralized finance offerings and opportunities to earn crypto , we provide customizable crypto trading bots to help traders leverage various automated trading strategies. In this guide we will cover:
8 серп. 2025 р.
17
trade responsibly
Spot trading guide
Technical analysis
Strategies

Stick to the plan: building a disciplined trading strategy

Crypto trading can be an exciting and potentially lucrative venture, but it's also risky — especially if you rush in blindly without a plan. A solid crypto trading strategy is crucial to success in this market. A trading strategy provides a clear action plan and helps to set boundaries that support one crucial trait for all traders to possess: discipline.
7 серп. 2025 р.
Початковий
68
Copy trading thumbnail
OKX
Trading

Introducing OKX Copy Trading

OKX is excited to introduce Copy Trading, a new tool under OKX Social Trading that gives you a whole new trading experience. With OKX Copy Trading, you’ll be able to share your best trading strategies for a profit, or learn and copy trade with 600+ trading pairs from pro traders around the world.
4 серп. 2025 р.
24
Показати більше