The scam does not need to look original.
It only needs to look familiar enough that you stop checking where the request came from.
If support appears before you found the official channel, slow down.
How it starts
It often starts in replies, direct messages, search results, or fake warning banners. The common feature is that the contact path is chosen by the scammer, not by you.
A common entry point is a post on X, a Telegram question, a Discord help request, or a paid Google result that sits above the real domain. The account name often borrows the exchange or wallet brand closely enough that the first glance feels familiar.
This works because the victim already has a problem to solve: a delayed withdrawal, a failed swap, a bridge screen that looks frozen, or a warning about account activity. The scammer is stepping into a conversation that stress already opened.
How it escalates
The ask usually gets more sensitive over time: move to another app, share a screenshot, connect a wallet, confirm a code, send a test transfer. Familiarity makes the next step feel smaller than it is.
Once the private chat starts, the attacker usually narrows your field of view. They ask you to leave the public thread, avoid opening a ticket, and follow one small instruction at a time: send a screenshot, confirm your balance, reconnect the wallet, or paste a code.
That sequencing matters. By the time a wallet popup or a transfer request appears, the dangerous step no longer feels like the beginning of a scam. It feels like the next checkbox in a support workflow you have already been trained to obey.
What they want
They want direct control, indirect access, or enough information to reach both later. Seed phrases, private keys, wallet approvals, device access, and verification transfers all serve that goal.
The end goal changes with the route. Sometimes they want a seed phrase for full takeover. Sometimes they want a private key, a wallet approval that can drain tokens later, a signature that unlocks permissions, or a small test transfer that proves the route works and that you will keep cooperating.
If any of those steps already happened, stop replying, close every link they sent, open the platform from a URL you typed or bookmarked yourself, and review email security, account sessions, wallet approvals, and recent device activity before you do anything else.
Common mistakes
-
Replying inside the route they chose
A private chat, a top search ad, or a fresh DM is not neutral just because the tone sounds helpful.
-
Treating a signature as harmless
The wallet popup may be the real action, even when the site copy above it sounds routine.
-
Waiting too long after sharing something
The first calm operational checks usually matter more than another round of conversation with the attacker.
What you should do
Use the newsroom explainer when you want the shorter scam sequence, and the after-loss checklist if anything was already shared.
- Stop replying inside the original chat or message thread.
- Open the platform only from a URL you typed or bookmarked yourself.
- Review wallet approvals, email security, and active account sessions immediately.