Steps to Be Taken for Phishing Attack Victims

Steps to Be Taken for Phishing Attack Victims

If it is a phishing incident, please read carefully on this page to understand actions that need to be performed to prevent further loss.

Everyone Needs It! Next Step After Being Phished

What should I do if my assets are stolen?

First, try to identify the cause and take appropriate measures to prevent further losses.

Second, attempt to recover the losses through tracking and investigation. It is important to note that recovering losses often requires significant time and effort (and it's nearly impossible to recover funds in most cases), so it is advisable to prioritize minimizing further damage promptly.

How to avoid further losses?

Our response here is based on the assumption that you already know the reason for your assets being stolen, either due to private key compromise or phishing.

If it is a case of private key compromise, it is recommended to** immediately** transfer the remaining assets from that address to a secure wallet on all relevant blockchains.

If it is a phishing incident, use our address security scanner **to get a report of your address and actions that need to be performed to prevent further loss. **

Can I recover my losses?

Recovering stolen funds is generally difficult in most cases. Here are some suggestions:

  • If you have suffered significant losses, file a report with your local law enforcement agency. You can provide them with a phishing report or fund flow chart generated by MetaSleuth to help them understand the situation you have encountered.

  • If you have an urgent need to recover stolen funds, consider seeking assistance from professional investigation agencies or firms specializing in asset recovery.

DO NOT give sensitive information like your passphrase to anyone claiming they can recover your lost funds. DO NOT trust anyone who claims to represent BlockSec to recover your loss.

See our Twitter thread. https://twitter.com/MetaSleuth/status/1656144511934791680

What can I do with MetaSleuth?

MetaSleuth primarily assists you in two ways.

Firstly, you can use MetaSleuth to track stolen funds. If you discover that the stolen funds have entered centralized exchanges or flash exchanges, you can seek assistance from these platforms and gather evidence (usually with the help of law enforcement) to further the investigation.

Secondly, you can utilize MetaSleuth's monitor feature to continuously monitor the stolen funds, enabling you to stay informed about the movement of funds and follow up on any leads.

Here are some contact information for exchanges (updating):

About MetaSleuth

MetaSleuth is a comprehensive platform developed by BlockSec to assist users in effectively tracking and investigating all crypto activities. With MetaSleuth, users can easily track funds, visualize fund flows, monitor real-time fund movements, save important information, and collaborate by sharing their findings with others. Currently, we support 13 different blockchains, including Bitcoin (BTC), Ethereum (ETH), Tron (TRX), Polygon (MATIC), and more.

Website: https://metasleuth.io/

Twitter: @MetaSleuth

Telegram: https://t.me/MetaSleuthTeam

Sign up for the latest updates
Weekly Web3 Security Incident Roundup | Feb 9 – Feb 15, 2026

Weekly Web3 Security Incident Roundup | Feb 9 – Feb 15, 2026

During the week of February 9 to February 15, 2026, three blockchain security incidents were reported with total losses of ~$657K. All incidents occurred on the BNB Smart Chain and involved flawed business logic in DeFi token contracts. The primary causes included an unchecked balance withdrawal from an intermediary contract that allowed donation-based inflation of a liquidity addition targeted by a sandwich attack, a post-swap deflationary clawback that returned sold tokens to the caller while draining pool reserves to create a repeatable price-manipulation primitive, and a token transfer override that burned tokens directly from a Uniswap V2 pair's balance and force-synced reserves within the same transaction to artificially inflate the token price.

Top 10 "Awesome" Security Incidents in 2025

Top 10 "Awesome" Security Incidents in 2025

To help the community learn from what happened, BlockSec selected ten incidents that stood out most this year. These cases were chosen not only for the scale of loss, but also for the distinct techniques involved, the unexpected twists in execution, and the new or underexplored attack surfaces they revealed.

#10 Panoptic Incident: XOR Linearity Breaks the Position Fingerprint Scheme

#10 Panoptic Incident: XOR Linearity Breaks the Position Fingerprint Scheme

On August 29, 2025, Panoptic disclosed a Cantina bounty finding and confirmed that, with support from Cantina and Seal911, it executed a rescue operation on August 25 to secure roughly $400K in funds. The issue stemmed from a flaw in Panoptic’s position fingerprint calculation algorithm, which could have enabled incorrect position identification and downstream fund risk.