此网页仅供信息参考之用。部分服务和功能可能在您所在的司法辖区不可用。

Don’t Panic: What To Do in a Crypto Social Engineering Attack

In a separate article, we explore what social engineering is and some common crypto scams that use it to manipulate and defraud crypto users. Understanding what social engineering is raises another important consideration: what to do if you find yourself caught up in such a scam?

In this article, we'll explore the best action to take for each type of social engineering scam you may encounter. Before we get started, remember: prevention is better than cure. OKX Protect, our security hub, is full of actionable guidance and resources to help protect you and your crypto from fraud.

So you think you're being scammed?

In our previous article, we highlighted some of the signs you might have been targeted by social engineering. If you believe you're a victim — even if no funds have been lost — what should your next move be? Read on to understand the immediate steps to take, alongside specific guidance depending on how you've been targeted.

Immediate action to take

  • Disconnect from the internet — this is especially important if you believe you've been targeted by malware and your device has been compromised.

  • Stop all communication with the suspected scammer to avoid any further sensitive information from being shared.

  • Document everything to gather a record of all communications sent and actions taken.

  • Report the attack to the relevant platform and the local authorities. This is a key step towards potentially recovering funds, while helping prevent others from being targeted.

1. If you've shared credentials or seed phrases: access exploits

You'll need to act fast if you've unknowingly provided access to your wallet or a platform, because the scammer now has access to your assets. Here's what you may want to do:

  • Create a new wallet with a trusted provider and transfer all your funds to it

  • Reset passwords to any connected accounts

  • Revoke smart contract approvals for decentralized applications (dApps). This reduces the opportunities hackers and scammers have to target you.

  • Scan your network for malware. Alongside the auto-scan conducted by your chosen software, it's also wise to frequently complete a manual scan for added protection.

2. If you were manipulated by someone you trusted: trust exploits

You've been in regular contact with someone and grown to trust them, but now you're suspicious. Thankfully, you've not handed over any funds or credentials, but you have discussed finances.

  • Stop all communication immediately. Block the suspected scammer if needed.

  • Audit recent transactions. Even if you're confident you've not handed over sensitive information, it's wise to check all transactions during the period you were in touch with the suspected scammer. That allows you to spot any unauthorized activity.

  • Report the scam to any platforms you believe were affected. That could be a messaging platform, or an exchange the suspected scammer was pushing you to trade with it.

  • Warn others. Spread the word of what's happened in any relevant groups on Telegram and X, which is where some scammers choose to target crypto users.

  • Reflect on what happened. Think about the social engineering tactics used against you and what made you susceptible to them. That'll help protect you from any future exploitation.

3. If you send crypto to a suspicious platform or individual: transaction exploits

You've not shared any sensitive details such as seed phrases or private keys, but you have been persuaded to send funds. That could be to invest in a seemingly unmissable opportunity, or to use a particular platform they've suggested. Now you have regrets and suspicions.

  • Use a block explorer like OKX Explorer to track where your crypto went. This helps support efforts to recover your funds.

  • Revoke access to smart contracts to prevent further transactions you didn't authorize.

  • Contact your exchange if onramps or offramps were used. This can also support the recovery process, while limiting the scammer's ability to cash out the stolen funds.

  • Employ a crypto forensics company: Specialist crypto tracing firms can help to identify perpetrators and recover lost assets on your behalf.

  • Warn your community: Help others to avoid falling victim by explaining the scam and how it unfolded.

Safeguard your funds: OKX Protect

Because social engineering scams use psychological tricks to deceive victims, your best defense against them is education and vigilance online. Meanwhile, wider threats exist that you can take action to protect against. OKX is there to help.

Over on our security hub, OKX Protect, you'll find insight to the various features on our platform that are designed to safeguard you and your digital assets. That includes the self-custodial OKX Wallet, 24/7 proactive threat detection, and our dedicated cyber defense unit.

免责声明
本文章可能包含不适用于您所在地区的产品相关内容。本文仅致力于提供一般性信息,不对其中的任何事实错误或遗漏负责任。本文仅代表作者个人观点,不代表欧易的观点。 本文无意提供以下任何建议,包括但不限于:(i) 投资建议或投资推荐;(ii) 购买、出售或持有数字资产的要约或招揽;或 (iii) 财务、会计、法律或税务建议。 持有的数字资产 (包括稳定币) 涉及高风险,可能会大幅波动,甚至变得毫无价值。您应根据自己的财务状况仔细考虑交易或持有数字资产是否适合您。有关您具体情况的问题,请咨询您的法律/税务/投资专业人士。本文中出现的信息 (包括市场数据和统计信息,如果有) 仅供一般参考之用。尽管我们在准备这些数据和图表时已采取了所有合理的谨慎措施,但对于此处表达的任何事实错误或遗漏,我们不承担任何责任。 © 2025 OKX。本文可以全文复制或分发,也可以使用本文 100 字或更少的摘录,前提是此类使用是非商业性的。整篇文章的任何复制或分发亦必须突出说明:“本文版权所有 © 2025 OKX,经许可使用。”允许的摘录必须引用文章名称并包含出处,例如“文章名称,[作者姓名 (如适用)],© 2025 OKX”。部分内容可能由人工智能(AI)工具生成或辅助生成。不允许对本文进行衍生作品或其他用途。

相关推荐

查看更多
9 Best AI Crypto Trading Bots To Use in 2024 Cover
Strategies

What are Telegram trading bots: how to trade crypto in Telegram

Blink and you’ll miss it. That’s how quickly some potential crypto trading opportunities can seemingly pass you by if you’re new to the crypto trading scene. Fortunately, many crypto trading tools today help ease beginners into the process of and navigating the onchain trading process. Enter Telegram trading bots: the new kid on the block that’s become increasingly popular among crypto enthusiasts because of the unmatched convenience on offer.
2025年11月21日
中级
21
trade-academy-spot-3
Bitcoin
Strategies

Bitcoin Rainbow Chart: A Concise Overview and User Guide

If you wish to become a professional trader or investor, you have to learn how to use trading tools. This is the only way to be able to predict the price accurately and make educated moves. Otherwise,
2025年11月21日
1
Generic tokens thumbnail
Bitcoin
Technical analysis
Strategies

How to short Bitcoin: a step-by-step guide to short-selling BTC

With its limited supply, protocol-regulated rate of issuance, and generally rising popularity and demand, Bitcoin has — over the decade or so of its existence — managed to outperform typical assets by a large margin. However, this long-term price appreciation hasn't happened without sharp drops and several bearish phases along the way.
2025年11月21日
中级
42
Cyberpunk trading generic
Strategies
Order Types

What is margin? Leverage your crypto trades for amplified results

There's no shortage of exciting possibilities in crypto. For the crypto-curious, the potential for significant returns can be incredibly enticing. But what if there was a way to amplify your gains (or losses) in the market? Enter margin trading and leverage, both powerful tools that can supercharge your returns — but also magnify your risks.
2025年11月21日
高级
38
Crypto adoption generic thumbnail
Strategies

Crypto vs forex trading: which is right for you?

Cryptocurrency trading and forex trading are two popular investment options in the financial world. Cryptocurrency trading involves buying and selling digital currencies like Bitcoin, Ethereum and Litecoin on a decentralized digital exchange.
2025年11月21日
14
Options trading generic thumb
Technical analysis

How to read candlestick charts for effective crypto trading

Candlestick charts are a popular type of financial chart traders use to analyze price movements in various markets, including cryptocurrencies. They were initially developed by Japanese traders in the 18th century and are now widely used across the world.
2025年11月21日
新手
255
查看更多