هذه الصفحة هي لأغراض إعلامية فقط. قد لا تتوفر بعض الخدمات والميزات في منطقتك.

Don’t Panic: What To Do in a Crypto Social Engineering Attack

In a separate article, we explore what social engineering is and some common crypto scams that use it to manipulate and defraud crypto users. Understanding what social engineering is raises another important consideration: what to do if you find yourself caught up in such a scam?

In this article, we'll explore the best action to take for each type of social engineering scam you may encounter. Before we get started, remember: prevention is better than cure. OKX Protect, our security hub, is full of actionable guidance and resources to help protect you and your crypto from fraud.

So you think you're being scammed?

In our previous article, we highlighted some of the signs you might have been targeted by social engineering. If you believe you're a victim — even if no funds have been lost — what should your next move be? Read on to understand the immediate steps to take, alongside specific guidance depending on how you've been targeted.

Immediate action to take

  • Disconnect from the internet — this is especially important if you believe you've been targeted by malware and your device has been compromised.

  • Stop all communication with the suspected scammer to avoid any further sensitive information from being shared.

  • Document everything to gather a record of all communications sent and actions taken.

  • Report the attack to the relevant platform and the local authorities. This is a key step towards potentially recovering funds, while helping prevent others from being targeted.

1. If you've shared credentials or seed phrases: access exploits

You'll need to act fast if you've unknowingly provided access to your wallet or a platform, because the scammer now has access to your assets. Here's what you may want to do:

  • Create a new wallet with a trusted provider and transfer all your funds to it

  • Reset passwords to any connected accounts

  • Revoke smart contract approvals for decentralized applications (dApps). This reduces the opportunities hackers and scammers have to target you.

  • Scan your network for malware. Alongside the auto-scan conducted by your chosen software, it's also wise to frequently complete a manual scan for added protection.

2. If you were manipulated by someone you trusted: trust exploits

You've been in regular contact with someone and grown to trust them, but now you're suspicious. Thankfully, you've not handed over any funds or credentials, but you have discussed finances.

  • Stop all communication immediately. Block the suspected scammer if needed.

  • Audit recent transactions. Even if you're confident you've not handed over sensitive information, it's wise to check all transactions during the period you were in touch with the suspected scammer. That allows you to spot any unauthorized activity.

  • Report the scam to any platforms you believe were affected. That could be a messaging platform, or an exchange the suspected scammer was pushing you to trade with it.

  • Warn others. Spread the word of what's happened in any relevant groups on Telegram and X, which is where some scammers choose to target crypto users.

  • Reflect on what happened. Think about the social engineering tactics used against you and what made you susceptible to them. That'll help protect you from any future exploitation.

3. If you send crypto to a suspicious platform or individual: transaction exploits

You've not shared any sensitive details such as seed phrases or private keys, but you have been persuaded to send funds. That could be to invest in a seemingly unmissable opportunity, or to use a particular platform they've suggested. Now you have regrets and suspicions.

  • Use a block explorer like OKX Explorer to track where your crypto went. This helps support efforts to recover your funds.

  • Revoke access to smart contracts to prevent further transactions you didn't authorize.

  • Contact your exchange if onramps or offramps were used. This can also support the recovery process, while limiting the scammer's ability to cash out the stolen funds.

  • Employ a crypto forensics company: Specialist crypto tracing firms can help to identify perpetrators and recover lost assets on your behalf.

  • Warn your community: Help others to avoid falling victim by explaining the scam and how it unfolded.

Safeguard your funds: OKX Protect

Because social engineering scams use psychological tricks to deceive victims, your best defense against them is education and vigilance online. Meanwhile, wider threats exist that you can take action to protect against. OKX is there to help.

Over on our security hub, OKX Protect, you'll find insight to the various features on our platform that are designed to safeguard you and your digital assets. That includes the self-custodial OKX Wallet, 24/7 proactive threat detection, and our dedicated cyber defense unit.

إخلاء المسؤولية
يتم توفير هذا المحتوى لأغراض إعلامية فقط وقد يغطي منتجات غير متوفرة في منطقتك. وليس المقصود منه تقدِّيم (1) نصيحة أو توصية استثمارية، (2) أو عرض أو التماس لشراء العملات الرقمية أو الأصول الرقمية أو بيعها أو الاحتفاظ بها، أو (3) استشارة مالية أو محاسبية أو قانونية أو ضريبية. عمليات الاحتفاظ بالعملات الرقمية أو الأصول الرقمية، بما فيها العملات المستقرة وعملات NFT تنطوي على درجة عالية من المخاطرة، ويمكن أن تشهد تقلّبًا كبيرًا في قيمتها. لذا، ينبغي عليك التفكير جيدًا فيما إذا كان تداول العملات الرقمية أو الأصول الرقمية أو الاحتفاظ بها مناسبًا لك حسب وضعك المالي. يُرجى استشارة خبير الشؤون القانونية أو الضرائب أو الاستثمار لديك بخصوص أي أسئلة مُتعلِّقة بظروفك الخاصة. المعلومات (بما في ذلك بيانات السوق والمعلومات الإحصائية، إن وُجدت) الموجودة في هذا المنشور معروضة كمعلومات عامة فقط. وعلى الرغم من كل العناية المعقولة التي تم بذلها في إعداد هذه البيانات والرسوم البيانية، لا نتحمَّل أي مسؤولية أو التزام عن أي أخطاء في الحقائق أو سهو فيها.

‎© 2025 OKX. يجوز إعادة إنتاج هذه المقالة أو توزيعها كاملةً، أو استخدام مقتطفات منها بما لا يتجاوز 100 كلمة، شريطة ألا يكون هذا الاستخدام لغرض تجاري. ويتعين أيضًا في أي إعادة إنتاج أو توزيع للمقالة بأكملها أن يُذكر ما يلي بوضوح: "هذه المقالة تعود ملكيتها لصالح © 2025 OKX وتم الحصول على إذن لاستخدامها." ويجب أن تُشِير المقتطفات المسموح بها إلى اسم المقالة وتتضمَّن الإسناد المرجعي، على سبيل المثال: "اسم المقالة، [اسم المؤلف، إن وُجد]، ‎© 2025 OKX." قد يتم إنشاء بعض المحتوى أو مساعدته بواسطة أدوات الذكاء الاصطناعي (AI). لا يجوز إنتاج أي أعمال مشتقة من هذه المقالة أو استخدامها بطريقة أخرى.

المقالات ذات الصلة

عرض المزيد
Social engineering scams explained thumb
Security

What Is Social Engineering? A Guide to Today’s Most Common Scams

Social engineering scams are on the rise , fueled by widespread social media usage and advancements in tools including AI that allow deceptions to be more convincing. This type of scam relies on criminals exploiting human emotions, whether creating false trust or instilling fear, to encourage an action that allows a scam to happen.
‏16 يونيو 2025
المبتدئين
Open Interest article Learn thumb
Strategies

What is open interest in crypto?

*This article discusses products that are not available in all regions. Open interest (OI) is a metric that shows the total number of outstanding derivatives contracts, such as futures or options, that remain unsettled. OI is used by traders to measure market activity and sentiment towards a specific asset. The metric achieves this by showing the total number of active contracts at a certain moment in time.
‏9 يونيو 2025
متوسط
‏‎1‏
golpe de investimento
Security

What crypto romance scams are and how to avoid them

Romance scams have been around for some time, and now often use crypto as their means of defrauding victims. This is a form of confidence trick that involves a scammer faking romantic intentions with the victim. The aim is to create an emotionally intimate relationship to persuade the victim to hand over their money, digital assets, or personal information.
‏4 يونيو 2025
المبتدئين
‏‎62‏
OKX Bot Trading
Strategies

What is crypto bot trading: automating your trades with our bots

Does the idea of manual trading feel daunting? Thanks to the availability of crypto trading bots under our Smart Trading product suite, you too can effortlessly automate your trades and enter the world of trading algorithms and bot trading in one click. With the help of bot trading, you'll no longer have to keep your eyes glued to the charts to execute trades as your pre-programmed bots will simply make the trades for you.
‏31 مايو 2025
المبتدئين
‏‎37‏
Generic charts thumbnail
Strategies

What is spot trading?

If you're a beginner in the world of cryptocurrency, the term 'spot trading' might be unfamiliar to you. However, it's a common form of trading in the crypto market that you should know about. For many, spot trading is the ideal entry point for getting started with crypto trading, being a relatively straightforward method.
‏30 مايو 2025
المبتدئين
‏‎220‏
golpe de investimento
Security

What rug pull scams are and how to avoid them

In November 2024, a 12-year old trader made headlines after attempting a crypto rug pull on a memecoin he created, called Gen Z Quant (QUANT), during a live stream. The trader launched QUANT on the popular Solana-based platform . The token quickly gained traction as its price surged. During a live stream, the trader expressed surprise at the growth before dumping his holdings — 51 million QUANT tokens — for 128 Solana (SOL), equivalent to $30,000.Despite his attempts to exit the market, the crypto community rallied behind the token, pushing its price up by an astonishing 77,000%. QUANT briefly reached a market cap of $82.3 million, peaking at $0.08 before retracing to $50 million. Ironically, the trader’s holdings would have been worth $4 million had he not sold them prematurely.
‏27 مايو 2025
المبتدئين
‏‎18‏
عرض المزيد