Denne siden er kun til informasjonsformål. Enkelte tjenester og funksjoner er kanskje ikke tilgjengelige i din jurisdiksjon.

What Is Social Engineering? A Guide to Today’s Most Common Scams

Social engineering scams are on the rise, fueled by widespread social media usage and advancements in tools including AI that allow deceptions to be more convincing. This type of scam relies on criminals exploiting human emotions, whether creating false trust or instilling fear, to encourage an action that allows a scam to happen.

Crypto users aren't immune to social engineering. Understanding and being alert to the threat is fundamental to protecting your assets. In this article, we'll explain what social engineering is, why social engineering works, and the signs of a threat you should be aware of.

What is social engineering?

No matter how strong a platform's security features and protocols are, human emotion will always be a vulnerability. Social engineering seeks to exploit this weakness by nudging users towards actions that create opportunities for exploitation. For example, getting them to click a link that installs malicious software, or handing over private keys and passwords for a wallet. The crux of social engineering scams lies in manipulative communication and interaction with the victim.

Why does social engineering work?

Social engineering is effective because it takes advantage of instinctive human nature and the emotional aspect of our decision making. That's why many scammers will pose as individuals in need of help — leveraging empathy and guilt, or fabricate a threatening scenario such as a false hacked account to create fear. Effective social engineering scams evoke an emotion that leads the victim to let their guard down and act without suspicion or critical thought.

Common types of social engineering crypto scams

Various types of social engineering scams exist today, in crypto circles and beyond. Criminals will use virtually any platform they can to reach potential victims, from email, phone calls, and text messages to social media. Advanced methods also now include 'deepfakes', which involve videos, audio, or images being generated or edited using AI to deceive an individual.

Vigilance is therefore key across all forms of communication to help you spot and avoid today's many social engineering scams. Below are four of the most common.

  • Romance scams: This common confidence trick involves the scammer building trust among the victim by feigning romantic interest. Once trust is built through false emotional connection, the scammer will typically claim they're facing financial hardship. The scammer then attempts to coerce the victim into handing over funds or granting access to their crypto wallet. Learn more about romance scams here.

  • Pig butchering scams: Similar to romance scams, pig butchering involves the scammer first building an emotional connection with the victim. Rather than requesting funds directly, the criminal convinces the victim to invest in or trade with a fraudulent platform. Once significant funds have been handed over, the scammer flees with the money. Learn more about pig butchering scams here.

  • Impersonation scams: Here, the criminal would pose as a celebrity, customer support agent, or person of authority and create a fictitious scenario that needs the user's attention. That could be an investment opportunity requiring an initial deposit with a promise of major returns, or a technical issue that needs the victim to hand over account access. Learn more about impersonation scams here.

  • Phishing scams: This scam sees a criminal deceive their victim into handing over sensitive information, such as log-in credentials or financial data. The scam often involves sending a malicious message from a seemingly trustworthy source, such as email or text message. Learn more about phishing scams here.

Red flags to look out for

Although social engineering relies on human deception to work, there are various red flags you can look out for to avoid falling victim.

  • Unsolicited contact: Crypto social engineering scams usually begin with some form of unsolicited contact. That could be a request for connection on a social platform, a message on a dating app, or an email supposedly from a platform you use. Be cautious of unexpected contact, especially if the sender is persistent in their communication with you.

  • Urgency to act quickly: Social engineering scams often aim to create urgency for you to take a specific action. When you're urgent, you might not analyze the situation carefully, missing the signs that something's wrong. If you're being pressured to act quickly, consider it a red flag and a situation that needs scrutiny.

  • Requests for sensitive information: Even a legitimate crypto exchange or bank generally won't ask you for sensitive information, aside from details to verify your identity, such as your name and age. Be highly skeptical if an individual or supposed representative from a company requests a private key, password, user ID, or other details that can be used to gain access to your account.

The final word

Social engineering scams are a threat to your crypto funds that's growing in sophistication. Although today's tactics are advanced and sometimes difficult to spot, being aware of the red flags and cautious in your communication with others gives you the best chance of protecting yourself. With new methods frequently being devised, it's wise to regularly educate yourself about the changing threat landscape.

Learn more about protecting your crypto funds and the first-class security measures OKX has in place over on our OKX Protect hub.

Ansvarsfraskrivelse
Dette innholdet er kun gitt for informasjonsformål og kan dekke produkter som ikke er tilgjengelige i din region. Det er ikke ment å gi (i) investeringsråd eller en investeringsanbefaling, (ii) et tilbud eller oppfordring til å kjøpe, selge, eller holde krypto / digitale aktiva, eller (iii) finansiell, regnskapsmessig, juridisk, eller skattemessig rådgivning. Holding av krypto / digitale aktiva, inkludert stablecoins, innebærer høy grad av risiko og kan svinge mye. Du bør vurdere nøye om trading eller holding av krypto / digitale aktiva egner seg for deg i lys av den økonomiske situasjonen din. Rådfør deg med en profesjonell med kompetanse på juss/skatt/investering for spørsmål om dine spesifikke omstendigheter. Informasjon (inkludert markedsdata og statistisk informasjon, hvis noen) som vises i dette innlegget, er kun for generelle informasjonsformål. Selv om all rimelig forsiktighet er tatt i utarbeidelsen av disse dataene og grafene, aksepteres ingen ansvar eller forpliktelser for eventuelle faktafeil eller utelatelser uttrykt her.

© 2025 OKX. Denne artikkelen kan reproduseres eller distribueres i sin helhet, eller utdrag på 100 ord eller mindre av denne artikkelen kan brukes, forutsatt at slik bruk er ikke-kommersiell. Enhver reproduksjon eller distribusjon av hele artikkelen må også på en tydelig måte vise: «Denne artikkelen er © 2025 OKX og brukes med tillatelse.» Tillatte utdrag må henvise til navnet på artikkelen og inkludere tilskrivelse, for eksempel «Artikkelnavn, [forfatternavn hvis aktuelt], © 2025 OKX.» Noe innhold kan være generert eller støttet av verktøy for kunstig intelligens (AI/KI). Ingen derivatverk eller annen bruk av denne artikkelen er tillatt.

Relaterte artikler

Se mer
Generic charts thumbnail
Bitcoin
Options
Strategies

Bitcoin halving price predictions: options strategies for all outlooks

The Bitcoin blockchain underwent a major event in April 2024: the Bitcoin halving. Expected to take place roughly every four years, this mechanism was written into Bitcoin's code during its inception and aims to slow down the creation of new bitcoins and eventually reach a finite supply of 21 million BTC. Similar to huge network upgrades like the Ethereum Merge and , the halving is a highly anticipated event that can significantly impact Bitcoin miners and traders.
2. juli 2025
Middels
19
What to do in social engineering scam thumb
Security

Don’t Panic: What To Do in a Crypto Social Engineering Attack

In a separate article, we explore what social engineering is and some common crypto scams that use it to manipulate and defraud crypto users. Understanding what social engineering is raises another important consideration: what to do if you find yourself caught up in such a scam?
16. juni 2025
Nybegynnere
6
Video Thumbnail Demo Trading
Trading tools
OKX
Ethereum

4 tips to level up your USDT with Shark Fin

OKX Shark Fin offers a great opportunity to earn USDT without putting your principal at risk. If you are new to Shark Fin, be sure to check out our beginner's guide here . Here are four tips to help you level up your earnings using Shark Fin.
16. juni 2025
Nybegynnere
1 223
Copy trading thumbnail
OKX
Trading

Introducing OKX Copy Trading

OKX is excited to introduce Copy Trading, a new tool under OKX Social Trading that gives you a whole new trading experience. With OKX Copy Trading, you’ll be able to share your best trading strategies for a profit, or learn and copy trade with 600+ trading pairs from pro traders around the world.
13. juni 2025
16
Open Interest article Learn thumb
Strategies

What is open interest in crypto?

*This article discusses products that are not available in all regions. Open interest (OI) is a metric that shows the total number of outstanding derivatives contracts, such as futures or options, that remain unsettled. OI is used by traders to measure market activity and sentiment towards a specific asset. The metric achieves this by showing the total number of active contracts at a certain moment in time.
9. juni 2025
Middels
10
golpe de investimento
Security

Safer crypto trading: how to spot scams

Scams have unfortunately emerged as a prominent and persistent challenge in the crypto space as bad actors lurk in the shadows. Backed by advanced technology and tools, these scams have become increasingly sophisticated and harder to identify.
9. juni 2025
Nybegynnere
245
Se mer