Wallet Hacked — What To Do Next

If you suspect unauthorized wallet activity, act fast to protect what’s left and preserve evidence.

We never ask for seed phrases or private keys. Submitting a request does not guarantee recovery.

What we do

  • Move remaining funds to a new secure wallet (do not reuse compromised devices).
  • Revoke token approvals where applicable and document changes.
  • Preserve evidence: tx hashes, screenshots, emails, chat logs, and timestamps.
  • Request a forensic review to document on-chain activity and potential exposure points.

What we need from you

Share only public or non-sensitive details. Do not share passwords, seed phrases, or private keys.

  • Wallet address(es) involved
  • Transaction hash(es), if available
  • Exchange / platform name(s)
  • Timeline of events
  • Screenshots / emails / chat logs (optional)

FAQ

Should I share my seed phrase to get help?

No. Never share it. Anyone asking is not legitimate.

Should I keep using the same wallet?

No. Treat it as compromised and move remaining funds to a fresh wallet.

What if the funds are already gone?

Tracing and documentation can still help clarify routes and next steps.