Overview
After a scam, many victims are targeted again by follow-up scammers posing as investigators, lawyers, or ‘recovery teams.’ This guide helps you recognize patterns and avoid dangerous requests.
What to prepare
• Screenshots of anyone claiming they can recover funds • Payment requests / invoices / crypto addresses they provide • Any domains, profiles, or numbers used to contact you
Steps
• Verify identity: Use official websites/contacts never links from chats. • Refuse risky access: No remote access tools, no seed phrases, no OTP sharing. • Document the approach: Save messages and payment requests as evidence.
Red flags
• Guaranteed recovery promises • Urgent pressure (pay now or lose everything) • Upfront fees before any verifiable work • Requests for remote access or unknown apps • Requests for seed phrases, private keys, or OTP codes • Pushing you off official channels
