Wallet Compromised? Read This Now.

Do not panic. Do not shut down your computer. Follow these steps immediately.

STEP 1 First Aid: The Stop-Loss

1. Isolate Assets

If you still have access, transfer remaining funds to a BRAND NEW wallet on a different device (preferably mobile). Do not reuse your old address.

2. Revoke Permissions

If your wallet was drained via a malicious contract, you must "change the locks". Go to Etherscan Token Approval and revoke all allowances.

3. Stop DIY Fixes

Do NOT reformat your hard drive. This destroys the RAM and Cache data (Evidence) we need to recover your key. Leave the device ON but disconnected from Wifi.

STEP 2 Evidence Preservation

  • Take Screenshots: Capture full-screen images of the phishing site, chat logs with "Support", and your transaction history.
  • Record the TXID: Find the "Transaction Hash" (e.g., 0x3a...) of the theft. This is the fingerprint we trace.
  • Export Logs: Save your browser history and extension logs if possible.

WARNING What NOT To Do

⚠️ Never Share Your Seed Phrase

No legitimate recovery firm (including us) will EVER ask for your 12 or 24 words. If someone asks for this, they are a secondary scammer.

Need Forensic Intervention?

If the loss is >$50k, our team can perform deep-chain analysis and subpoena exchange records.

Open Priority Case File
Secure Forensics Gateway