This page is for information purposes only. Certain services and features may not be available in your jurisdiction.

Don’t Panic: What To Do in a Crypto Social Engineering Attack

In a separate article, we explore what social engineering is and some common crypto scams that use it to manipulate and defraud crypto users. Understanding what social engineering is raises another important consideration: what to do if you find yourself caught up in such a scam?

In this article, we'll explore the best action to take for each type of social engineering scam you may encounter. Before we get started, remember: prevention is better than cure. OKX Protect, our security hub, is full of actionable guidance and resources to help protect you and your crypto from fraud.

So you think you're being scammed?

In our previous article, we highlighted some of the signs you might have been targeted by social engineering. If you believe you're a victim — even if no funds have been lost — what should your next move be? Read on to understand the immediate steps to take, alongside specific guidance depending on how you've been targeted.

Immediate action to take

  • Disconnect from the internet — this is especially important if you believe you've been targeted by malware and your device has been compromised.

  • Stop all communication with the suspected scammer to avoid any further sensitive information from being shared.

  • Document everything to gather a record of all communications sent and actions taken.

  • Report the attack to the relevant platform and the local authorities. This is a key step towards potentially recovering funds, while helping prevent others from being targeted.

1. If you've shared credentials or seed phrases: access exploits

You'll need to act fast if you've unknowingly provided access to your wallet or a platform, because the scammer now has access to your assets. Here's what you may want to do:

  • Create a new wallet with a trusted provider and transfer all your funds to it

  • Reset passwords to any connected accounts

  • Revoke smart contract approvals for decentralized applications (dApps). This reduces the opportunities hackers and scammers have to target you.

  • Scan your network for malware. Alongside the auto-scan conducted by your chosen software, it's also wise to frequently complete a manual scan for added protection.

2. If you were manipulated by someone you trusted: trust exploits

You've been in regular contact with someone and grown to trust them, but now you're suspicious. Thankfully, you've not handed over any funds or credentials, but you have discussed finances.

  • Stop all communication immediately. Block the suspected scammer if needed.

  • Audit recent transactions. Even if you're confident you've not handed over sensitive information, it's wise to check all transactions during the period you were in touch with the suspected scammer. That allows you to spot any unauthorized activity.

  • Report the scam to any platforms you believe were affected. That could be a messaging platform, or an exchange the suspected scammer was pushing you to trade with it.

  • Warn others. Spread the word of what's happened in any relevant groups on Telegram and X, which is where some scammers choose to target crypto users.

  • Reflect on what happened. Think about the social engineering tactics used against you and what made you susceptible to them. That'll help protect you from any future exploitation.

3. If you send crypto to a suspicious platform or individual: transaction exploits

You've not shared any sensitive details such as seed phrases or private keys, but you have been persuaded to send funds. That could be to invest in a seemingly unmissable opportunity, or to use a particular platform they've suggested. Now you have regrets and suspicions.

  • Use a block explorer like OKX Explorer to track where your crypto went. This helps support efforts to recover your funds.

  • Revoke access to smart contracts to prevent further transactions you didn't authorize.

  • Contact your exchange if onramps or offramps were used. This can also support the recovery process, while limiting the scammer's ability to cash out the stolen funds.

  • Employ a crypto forensics company: Specialist crypto tracing firms can help to identify perpetrators and recover lost assets on your behalf.

  • Warn your community: Help others to avoid falling victim by explaining the scam and how it unfolded.

Safeguard your funds: OKX Protect

Because social engineering scams use psychological tricks to deceive victims, your best defense against them is education and vigilance online. Meanwhile, wider threats exist that you can take action to protect against. OKX is there to help.

Over on our security hub, OKX Protect, you'll find insight to the various features on our platform that are designed to safeguard you and your digital assets. That includes the self-custodial OKX Wallet, 24/7 proactive threat detection, and our dedicated cyber defense unit.

Disclaimer
This content is provided for informational purposes only and may cover products that are not available in your region. It is not intended to provide (i) investment advice or an investment recommendation; (ii) an offer or solicitation to buy, sell, or hold crypto/digital assets, or (iii) financial, accounting, legal, or tax advice. Crypto/digital asset holdings, including stablecoins, involve a high degree of risk and can fluctuate greatly. You should carefully consider whether trading or holding crypto/digital assets is suitable for you in light of your financial condition. Please consult your legal/tax/investment professional for questions about your specific circumstances. Information (including market data and statistical information, if any) appearing in this post is for general information purposes only. While all reasonable care has been taken in preparing this data and graphs, no responsibility or liability is accepted for any errors of fact or omission expressed herein.

© 2025 OKX. This article may be reproduced or distributed in its entirety, or excerpts of 100 words or less of this article may be used, provided such use is non-commercial. Any reproduction or distribution of the entire article must also prominently state: “This article is © 2025 OKX and is used with permission.” Permitted excerpts must cite to the name of the article and include attribution, for example “Article Name, [author name if applicable], © 2025 OKX.” Some content may be generated or assisted by artificial intelligence (AI) tools. No derivative works or other uses of this article are permitted.

Related articles

View more
Yield farming and staking
Strategies

What is a crypto whale and how do they affect the markets?

The crypto market is one of the most volatile markets in the world, and is one of the reasons why the crypto sector has become so popular in recent years. Usually, the prices change due to positive or negative news, major developments, and controversies. There are also cases when crypto prices change due to price manipulation. In order to manipulate the price of global assets such as cryptos, you need a significant amount of capital. However, there are some people who have this kind of capital and can impact the market quite severely.
Oct 21, 2025
344
OKX Wallet
Bitcoin
Options

Delta neutral options strategies: how to hedge a crypto portfolio

If you're familiar with long-term crypto trading, chances are you'll likely encounter instances when an ongoing catalyst causes huge portfolio volatility for your crypto holdings. While this might be acceptable for crypto traders who are more risk-tolerant, it can sometimes lead to dire situations like margin calls because of how volatility can propel a portfolio into liquidation.
Oct 21, 2025
1
Futures generic thumb
Futures

Top platforms for trading crypto futures in 2024

As the popularity of cryptocurrencies grew, traders inevitably wanted more ways to trade cryptocurrencies and grow their portfolios. Futures contracts emerged from these wants, and were later modernized and adapted to the crypto markets through perpetual futures, without an expiry.
Oct 20, 2025
Advanced
1
Generic tokens thumbnail
Futures

Crypto futures fees compared: a guide to cost-effective trading

Futures emerged as a new opportunity for traders to gain exposure to crypto and grow their portfolios. For daily volume, some exchanges now attract higher volume on futures trading than on spot or other markets.
Oct 20, 2025
Advanced
15
Futures generic thumb
Bitcoin
Trading tools
Derivatives

Bitcoin derivatives, explained: expiry futures, perpetual futures and options

Derivatives are tradable contracts that derive their value from an underlying asset. In the case of cryptocurrency derivatives, the underlying asset is, in most cases, Bitcoin (BTC), or other top cryptocurrencies.
Oct 20, 2025
36
endereço de carteira blockhain
Security
Self-custody

Self-custody made simple: how to store your crypto yourself

Cryptocurrencies empower us to take charge of our assets, yet this power requires responsible choices. You have many options for managing your digital assets: trusting an exchange, opting for custodial services, or embracing self-custody. In this article, we navigate the landscape of self-custody, providing insights into practical methods for securing and managing your crypto assets independently.
Oct 20, 2025
Beginners
51
View more