Immediate Response

IF YOU’VE BEEN HACKED — OPEN THE CRITICAL ACTIONS POP-UP

Follow a clear, stress-proof sequence. Avoid “recovery” scams. Never share seed phrases or remote access. Prefer on-chain signature verification when identity is required.

Incident Response Cover
[WARNING] Do NOT share seed phrases, private keys, passwords, remote-desktop codes, or screenshots of wallets. Ignore DMs offering “recovery” or pretending to be support, police, or admins. Verify helpers via on-chain signature or official channels only.

1) First Moves from a Clean Device

  1. Disconnect compromised machine from the internet. Power it off (no sleep).
  2. Stay calm. Rushed transfers sign away approvals or feed sweeper bots.
  3. Warn colleagues/friends not to trust messages “from you”.

2) Secure Crypto

  • Assume seeds/keys/sessions from the old device are stolen.
  • Create a new wallet on a clean device. Write the seed on paper.
  • Move assets: tokens/NFTs/roles → then native coin (e.g., ETH).
[NOTE] Addresses may have sweeper bots. Ask SEAL 911 before executing additional withdrawals or complex flows.

3) Secure Accounts

  • From the clean device: log into Telegram, Twitter/X, Discord, Email, PM, Okta/Slack, Banking, Cloud.
  • Log out all other sessions → Change passwords → Enable/Reset 2FA (no cloud backup in the 2FA app).

4) Takedown a Phishing Resource

If you need a fast takedown, send the domain/URL to us — we’re professionals at rapid disruption and evidence preservation.

5) Report & Document

Keep a concise dossier with addresses/chains, tx hashes, attacker handles, URLs, and a simple timeline.

Subject: Cryptocurrency theft / account compromise — incident report

Victim Full Name:
Contact Email / Phone:
Jurisdiction / City:

Incident Summary (2—4 sentences):
- Date & time (local): 
- Vector (phishing link / malicious file / fake call fix site):
- Immediate impacts (assets stolen, accounts hijacked):

Crypto Details:
- Stolen from addresses (include chain): 
- Tx hashes of theft (with chain): 
- CEX accounts affected (if any): 

Account Takeovers:
- Services (Telegram/Twitter/Email/etc.):
- Approx time you were logged out / alerted:
- New login alerts (IPs/locations, if known):

Evidence / Links:
- URLs visited or files downloaded from:
- Attacker handles/IDs:
- Screenshots or logs (not included here; available upon request).

Timeline (short):
YYYY-MM-DD HH:MM — [Event 1]
YYYY-MM-DD HH:MM — [Event 2]
YYYY-MM-DD HH:MM — [Event 3]

I understand this report may be correlated with other victims.

6) New Computer or Full Wipe

  • Prefer a new device. If wiping, do a full factory reset.
  • Do not restore backups (Time Machine/Windows/3rd-party) — malware can return.
  • If copying files, keep the old device offline; do not copy the whole user folder.
[IMPORTANT] Need a sanity check before you move funds? Ask in SEAL 911 Bot. When identity confirmation is needed, prefer a simple Ethereum sign-message flow over screen-sharing.
#IncidentResponse #RecoveryScam #SEAL911 #Takedown #CryptoSecurity

Related Research

Crypto Security Essentials
Essential protection against drainers, fake support, and common wallet traps.
DeFi Hack Explorer
Track major DeFi hacks, exploits, and stolen funds across all chains.
Security Checklist for Users
A concise, actionable checklist to verify your personal security setup.