This page is for information purposes only. Certain services and features may not be available in your jurisdiction.

What Is Social Engineering? A Guide to Today’s Most Common Scams

Social engineering scams are on the rise, fueled by widespread social media usage and advancements in tools including AI that allow deceptions to be more convincing. This type of scam relies on criminals exploiting human emotions, whether creating false trust or instilling fear, to encourage an action that allows a scam to happen.

Crypto users aren't immune to social engineering. Understanding and being alert to the threat is fundamental to protecting your assets. In this article, we'll explain what social engineering is, why social engineering works, and the signs of a threat you should be aware of.

What is social engineering?

No matter how strong a platform's security features and protocols are, human emotion will always be a vulnerability. Social engineering seeks to exploit this weakness by nudging users towards actions that create opportunities for exploitation. For example, getting them to click a link that installs malicious software, or handing over private keys and passwords for a wallet. The crux of social engineering scams lies in manipulative communication and interaction with the victim.

Why does social engineering work?

Social engineering is effective because it takes advantage of instinctive human nature and the emotional aspect of our decision making. That's why many scammers will pose as individuals in need of help — leveraging empathy and guilt, or fabricate a threatening scenario such as a false hacked account to create fear. Effective social engineering scams evoke an emotion that leads the victim to let their guard down and act without suspicion or critical thought.

Common types of social engineering crypto scams

Various types of social engineering scams exist today, in crypto circles and beyond. Criminals will use virtually any platform they can to reach potential victims, from email, phone calls, and text messages to social media. Advanced methods also now include 'deepfakes', which involve videos, audio, or images being generated or edited using AI to deceive an individual.

Vigilance is therefore key across all forms of communication to help you spot and avoid today's many social engineering scams. Below are four of the most common.

  • Romance scams: This common confidence trick involves the scammer building trust among the victim by feigning romantic interest. Once trust is built through false emotional connection, the scammer will typically claim they're facing financial hardship. The scammer then attempts to coerce the victim into handing over funds or granting access to their crypto wallet. Learn more about romance scams here.

  • Pig butchering scams: Similar to romance scams, pig butchering involves the scammer first building an emotional connection with the victim. Rather than requesting funds directly, the criminal convinces the victim to invest in or trade with a fraudulent platform. Once significant funds have been handed over, the scammer flees with the money. Learn more about pig butchering scams here.

  • Impersonation scams: Here, the criminal would pose as a celebrity, customer support agent, or person of authority and create a fictitious scenario that needs the user's attention. That could be an investment opportunity requiring an initial deposit with a promise of major returns, or a technical issue that needs the victim to hand over account access. Learn more about impersonation scams here.

  • Phishing scams: This scam sees a criminal deceive their victim into handing over sensitive information, such as log-in credentials or financial data. The scam often involves sending a malicious message from a seemingly trustworthy source, such as email or text message. Learn more about phishing scams here.

Red flags to look out for

Although social engineering relies on human deception to work, there are various red flags you can look out for to avoid falling victim.

  • Unsolicited contact: Crypto social engineering scams usually begin with some form of unsolicited contact. That could be a request for connection on a social platform, a message on a dating app, or an email supposedly from a platform you use. Be cautious of unexpected contact, especially if the sender is persistent in their communication with you.

  • Urgency to act quickly: Social engineering scams often aim to create urgency for you to take a specific action. When you're urgent, you might not analyze the situation carefully, missing the signs that something's wrong. If you're being pressured to act quickly, consider it a red flag and a situation that needs scrutiny.

  • Requests for sensitive information: Even a legitimate crypto exchange or bank generally won't ask you for sensitive information, aside from details to verify your identity, such as your name and age. Be highly skeptical if an individual or supposed representative from a company requests a private key, password, user ID, or other details that can be used to gain access to your account.

The final word

Social engineering scams are a threat to your crypto funds that's growing in sophistication. Although today's tactics are advanced and sometimes difficult to spot, being aware of the red flags and cautious in your communication with others gives you the best chance of protecting yourself. With new methods frequently being devised, it's wise to regularly educate yourself about the changing threat landscape.

Learn more about protecting your crypto funds and the first-class security measures OKX has in place over on our OKX Protect hub.

Disclaimer
This content is provided for informational purposes only and may cover products that are not available in your region. It is not intended to provide (i) investment advice or an investment recommendation; (ii) an offer or solicitation to buy, sell, or hold crypto/digital assets, or (iii) financial, accounting, legal, or tax advice. Crypto/digital asset holdings, including stablecoins, involve a high degree of risk and can fluctuate greatly. You should carefully consider whether trading or holding crypto/digital assets is suitable for you in light of your financial condition. Please consult your legal/tax/investment professional for questions about your specific circumstances. Information (including market data and statistical information, if any) appearing in this post is for general information purposes only. While all reasonable care has been taken in preparing this data and graphs, no responsibility or liability is accepted for any errors of fact or omission expressed herein.

© 2025 OKX. This article may be reproduced or distributed in its entirety, or excerpts of 100 words or less of this article may be used, provided such use is non-commercial. Any reproduction or distribution of the entire article must also prominently state: “This article is © 2025 OKX and is used with permission.” Permitted excerpts must cite to the name of the article and include attribution, for example “Article Name, [author name if applicable], © 2025 OKX.” Some content may be generated or assisted by artificial intelligence (AI) tools. No derivative works or other uses of this article are permitted.

Related articles

View more
trade-academy-beginner-4
Order Types

What are iceberg orders?

An iceberg order is an algorithmic order allowing users to slice large orders into multiple small orders. These orders will be placed on the market according to their preferred mode (quick execution/price-speed balance/passive queuing). When one of the smaller orders has been completely filled, or the level has been changed from the initial orders, the system will check the depth and place the order accordingly.
Jul 18, 2025
2
Forward Contracts vs. Futures Contracts What Are the Differences
Trading tools
Trading guide
Trading basics

How to use the iceberg trading bot

What are iceberg orders? Iceberg orders are large buys or sells broken down into many smaller orders. They may be useful when making a significant trade relative to the size of a given market. Even small orders can risk moving the asset price in an illiquid market, resulting in less favorable entry or exit prices for traders. Iceberg orders are designed to mask large orders and limit the impact of price slippage.
Jul 18, 2025
7
The Four Pillars of Engineering Management
Order Types

Time-Weighted Average Price (TWAP) Strategy: A Comprehensive Guide

TWAP, or Time-Weighted Average Price, is a popular trading strategy that is used by traders and investors aiming to minimize market impact and achieve a more accurate average price for an instrument o
Jul 18, 2025
Generic tokens thumbnail
DeFi
Staking

Top 13 ways to earn passive income from crypto in 2025

Cryptocurrencies have become increasingly popular over the past decade. Crypto assets such as Bitcoin, Ethereum, and other altcoins, have gained widespread adoption and recognition. However, the crypto market is known for being highly volatile. With that being said, trading isn't the only ways you can earn income in the world of crypto. Now, market participants are able to earn passive income with relatively little effort.
Jul 17, 2025
Intermediate
76
Generic charts thumbnail
Technical analysis

Divergence Pattern explained: Understanding the basics

Cryptocurrencies have grown to become one of the most popular assets to trade in recent years, due the opportunities they present. However, these opportunities are only rewarding because they come wit
Jul 15, 2025
2
P2P vs. DEX blog
Web3
P2P

P2P vs. DEX: How should you swap your crypto?

The OKX Wallet offers two powerful ways to swap assets: DEX and P2P. While both are easy and secure, they each come with different benefits. Let's dive into which one might be best for you. What's a Decentralized Exchange (DEX) swap?
Jul 15, 2025
3
View more