此網頁僅供信息參考之用。部分服務和功能可能在您所在的司法轄區不可用。

What Is Social Engineering? A Guide to Today’s Most Common Scams

Social engineering scams are on the rise, fueled by widespread social media usage and advancements in tools including AI that allow deceptions to be more convincing. This type of scam relies on criminals exploiting human emotions, whether creating false trust or instilling fear, to encourage an action that allows a scam to happen.

Crypto users aren't immune to social engineering. Understanding and being alert to the threat is fundamental to protecting your assets. In this article, we'll explain what social engineering is, why social engineering works, and the signs of a threat you should be aware of.

What is social engineering?

No matter how strong a platform's security features and protocols are, human emotion will always be a vulnerability. Social engineering seeks to exploit this weakness by nudging users towards actions that create opportunities for exploitation. For example, getting them to click a link that installs malicious software, or handing over private keys and passwords for a wallet. The crux of social engineering scams lies in manipulative communication and interaction with the victim.

Why does social engineering work?

Social engineering is effective because it takes advantage of instinctive human nature and the emotional aspect of our decision making. That's why many scammers will pose as individuals in need of help — leveraging empathy and guilt, or fabricate a threatening scenario such as a false hacked account to create fear. Effective social engineering scams evoke an emotion that leads the victim to let their guard down and act without suspicion or critical thought.

Common types of social engineering crypto scams

Various types of social engineering scams exist today, in crypto circles and beyond. Criminals will use virtually any platform they can to reach potential victims, from email, phone calls, and text messages to social media. Advanced methods also now include 'deepfakes', which involve videos, audio, or images being generated or edited using AI to deceive an individual.

Vigilance is therefore key across all forms of communication to help you spot and avoid today's many social engineering scams. Below are four of the most common.

  • Romance scams: This common confidence trick involves the scammer building trust among the victim by feigning romantic interest. Once trust is built through false emotional connection, the scammer will typically claim they're facing financial hardship. The scammer then attempts to coerce the victim into handing over funds or granting access to their crypto wallet. Learn more about romance scams here.

  • Pig butchering scams: Similar to romance scams, pig butchering involves the scammer first building an emotional connection with the victim. Rather than requesting funds directly, the criminal convinces the victim to invest in or trade with a fraudulent platform. Once significant funds have been handed over, the scammer flees with the money. Learn more about pig butchering scams here.

  • Impersonation scams: Here, the criminal would pose as a celebrity, customer support agent, or person of authority and create a fictitious scenario that needs the user's attention. That could be an investment opportunity requiring an initial deposit with a promise of major returns, or a technical issue that needs the victim to hand over account access. Learn more about impersonation scams here.

  • Phishing scams: This scam sees a criminal deceive their victim into handing over sensitive information, such as log-in credentials or financial data. The scam often involves sending a malicious message from a seemingly trustworthy source, such as email or text message. Learn more about phishing scams here.

Red flags to look out for

Although social engineering relies on human deception to work, there are various red flags you can look out for to avoid falling victim.

  • Unsolicited contact: Crypto social engineering scams usually begin with some form of unsolicited contact. That could be a request for connection on a social platform, a message on a dating app, or an email supposedly from a platform you use. Be cautious of unexpected contact, especially if the sender is persistent in their communication with you.

  • Urgency to act quickly: Social engineering scams often aim to create urgency for you to take a specific action. When you're urgent, you might not analyze the situation carefully, missing the signs that something's wrong. If you're being pressured to act quickly, consider it a red flag and a situation that needs scrutiny.

  • Requests for sensitive information: Even a legitimate crypto exchange or bank generally won't ask you for sensitive information, aside from details to verify your identity, such as your name and age. Be highly skeptical if an individual or supposed representative from a company requests a private key, password, user ID, or other details that can be used to gain access to your account.

The final word

Social engineering scams are a threat to your crypto funds that's growing in sophistication. Although today's tactics are advanced and sometimes difficult to spot, being aware of the red flags and cautious in your communication with others gives you the best chance of protecting yourself. With new methods frequently being devised, it's wise to regularly educate yourself about the changing threat landscape.

Learn more about protecting your crypto funds and the first-class security measures OKX has in place over on our OKX Protect hub.

免責聲明
本文章可能包含不適用於您所在地區的產品相關內容。本文僅致力於提供一般性信息,不對其中的任何事實錯誤或遺漏負責任。本文僅代表作者個人觀點,不代表 OKX 的觀點。 本文無意提供以下任何建議,包括但不限於:(i) 投資建議或投資推薦;(ii) 購買、出售或持有數字資產的要約或招攬;或 (iii) 財務、會計、法律或稅務建議。 持有的數字資產 (包括穩定幣) 涉及高風險,可能會大幅波動,甚至變得毫無價值。您應根據自己的財務狀況仔細考慮交易或持有數字資產是否適合您。有關您具體情況的問題,請諮詢您的法律/稅務/投資專業人士。本文中出現的信息 (包括市場數據和統計信息,如果有) 僅供一般參考之用。儘管我們在準備這些數據和圖表時已採取了所有合理的謹慎措施,但對於此處表達的任何事實錯誤或遺漏,我們不承擔任何責任。 © 2025 OKX。本文可以全文複製或分發,也可以使用本文 100 字或更少的摘錄,前提是此類使用是非商業性的。整篇文章的任何複製或分發亦必須突出說明:“本文版權所有 © 2025 OKX,經許可使用。”允許的摘錄必須引用文章名稱並包含出處,例如“文章名稱,[作者姓名 (如適用)],© 2025 OKX”。部分內容可能由人工智能(AI)工具生成或輔助生成。不允許對本文進行衍生作品或其他用途。

相關推薦

查看更多
What to do in social engineering scam thumb
Security

Don’t Panic: What To Do in a Crypto Social Engineering Attack

In a separate article, we explore what social engineering is and some common crypto scams that use it to manipulate and defraud crypto users. Understanding what social engineering is raises another important consideration: what to do if you find yourself caught up in such a scam?
2025年6月16日
新手
Open Interest article Learn thumb
Strategies

What is open interest in crypto?

*This article discusses products that are not available in all regions. Open interest (OI) is a metric that shows the total number of outstanding derivatives contracts, such as futures or options, that remain unsettled. OI is used by traders to measure market activity and sentiment towards a specific asset. The metric achieves this by showing the total number of active contracts at a certain moment in time.
2025年6月9日
中級
1
golpe de investimento
Security

What crypto romance scams are and how to avoid them

Romance scams have been around for some time, and now often use crypto as their means of defrauding victims. This is a form of confidence trick that involves a scammer faking romantic intentions with the victim. The aim is to create an emotionally intimate relationship to persuade the victim to hand over their money, digital assets, or personal information.
2025年6月4日
新手
62
OKX Bot Trading
Strategies

What is crypto bot trading: automating your trades with our bots

Does the idea of manual trading feel daunting? Thanks to the availability of crypto trading bots under our Smart Trading product suite, you too can effortlessly automate your trades and enter the world of trading algorithms and bot trading in one click. With the help of bot trading, you'll no longer have to keep your eyes glued to the charts to execute trades as your pre-programmed bots will simply make the trades for you.
2025年5月31日
新手
37
Generic charts thumbnail
Strategies

What is spot trading?

If you're a beginner in the world of cryptocurrency, the term 'spot trading' might be unfamiliar to you. However, it's a common form of trading in the crypto market that you should know about. For many, spot trading is the ideal entry point for getting started with crypto trading, being a relatively straightforward method.
2025年5月30日
新手
220
golpe de investimento
Security

What rug pull scams are and how to avoid them

In November 2024, a 12-year old trader made headlines after attempting a crypto rug pull on a memecoin he created, called Gen Z Quant (QUANT), during a live stream. The trader launched QUANT on the popular Solana-based platform . The token quickly gained traction as its price surged. During a live stream, the trader expressed surprise at the growth before dumping his holdings — 51 million QUANT tokens — for 128 Solana (SOL), equivalent to $30,000.Despite his attempts to exit the market, the crypto community rallied behind the token, pushing its price up by an astonishing 77,000%. QUANT briefly reached a market cap of $82.3 million, peaking at $0.08 before retracing to $50 million. Ironically, the trader’s holdings would have been worth $4 million had he not sold them prematurely.
2025年5月27日
新手
18
查看更多