Critical Action · Incident Response · You are not alone

Wallet drained, seed stolen, account taken over?
SEAL 911 replies in ~8 minutes. Free. 24/7.

If your wallet was drained, your seed phrase stolen, or your account taken over — follow this field-tested sequence. Every second counts. Don't pay "recovery" services. Don't share your seed. The fastest path to help is the green button below.

SEAL · Security Alliance
Security Alliance
Recommended first action — SEAL 911

Real responders. Real chain analysts. ~8 min reply.

SEAL 911 is the war-room hotline of the Security Alliance — a coalition of top web3 security teams that triages live incidents, coordinates with exchanges, and helps trace funds. Free, volunteer-run, no recovery fees.

Open @seal_911_bot
~8 min
avg reply
24/7
on-call
$0
always free
Recovery scams target your second loss. Anyone who DMs you on Telegram, X or Discord offering "guaranteed crypto recovery" — flashbots reversal, hacker negotiation, blockchain rollback — is a scammer. Real responders (SEAL, PhishDestroy, ZachXBT) never DM first and never charge.
01 · DO THIS NOW

5-step emergency sequence

read top → bottom · don't skip · ~12 minutes total
100:00

Open SEAL 911 — get a human on the line

Before anything else, message the SEAL 911 bot. Give them the basics (chain, drained wallet, drainer wallet, tx hash if known). They reply in ~8 minutes and stay with you while you work the rest of this checklist.

tg → https://t.me/seal_911_bot · /start · paste your wallet + drainer + tx
  • If you suspect malware on your device → also open securityalliance.org/go/malware
  • SEAL coordinates with chain analysts, exchanges, registrars — they have channels you don't
202:00

Move what's left — burn the wallet

If any tokens or NFTs remain, transfer them to a fresh, never-connected wallet generated on a clean device. Treat the compromised seed as public knowledge from now on. Do not reuse it.

  • Generate new seed offline (Trezor, Ledger, or air-gapped MetaMask)
  • Send native gas first, then highest-value tokens, then dust last
  • If gas is sniped by sweep-bots → use Flashbots Protect RPC to bypass mempool
305:00

Revoke every approval — chain by chain

Approvals you signed weeks ago can drain you tomorrow. Use revoke.cash to revoke all token approvals on every chain you've used. setApprovalForAll, Permit2, and unlimited allowances are the dangerous ones.

https://revoke.cash · connect compromised wallet · revoke all unlimited approvals on every chain
410:00

Report to the community — make the attack public

Tag the drainer wallet on Chainabuse, MetaSleuth, Reddit r/CryptoScams, X (cc @zachxbt). Public attribution makes it harder for the attacker to cash out at exchanges and warns the next victim. This is your most important contribution to the ecosystem.

  • Submit drainer wallet to Chainabuse — feeds 30+ vendors
  • Post tx + drainer addr on Reddit r/CryptoScams and X with screenshots
  • Tag @zachxbt on X if loss is significant — he triages serious cases
  • Report the phishing URL to PhishDestroy so we kill the domain
520:00

File with law enforcement — preserve evidence

File a police report. The case number unlocks insurance claims, tax write-offs, and CEX compliance freezes. Capture evidence first: screenshots, browser extensions list, every tx hash with UTC timestamps. Never reformat the affected machine until evidence is offsite.

  • US: FBI IC3 at ic3.gov · UK: Action Fraud · EU: national CERT
  • Save evidence to clean USB or encrypted Proton Drive — not the affected machine
  • Forward case number back to SEAL — they use it to escalate exchange freezes
02 · DON'T LOSE TWICE

How recovery scammers find you

90% of "recovery" offers are second-stage scams

Anyone offering paid recovery is a scammer4 patterns to recognize · always block & report

"I can reverse the transaction"

Public chains are immutable. No "white-hat hacker", flashbots service, or insider can reverse a confirmed tx. Anyone claiming this is selling you fiction.

DMs from "recovery agents"

Scammers monitor X, Reddit, Telegram for victim posts. Within hours of you posting, you'll get DMs from "MetaMask support", "USDT recovery", "blockchain forensics". All scams, every time.

"Send 10% upfront / gas fee"

The classic. They take your fee, ghost you, or come back asking for more. Real responders (SEAL, PhishDestroy, ZachXBT) never ask for money.

Fake testimonials & screenshots

Their site has glowing 5-star reviews and "trustpilot" badges. They paid for those. Cross-check any "recovery firm" name with public scam-reporting forums first.

04 · RULES OF ENGAGEMENT

Do this · Don't do this

Do — every time

  • Open SEAL 911 first — get a human responder before you do anything else.
  • Generate a fresh seed on a hardware wallet or fully clean device.
  • Revoke approvals on every chain you've ever bridged to — not just the active one.
  • Capture evidence first — screenshots, tx hashes, browser state, drainer URL.
  • Report drainer wallet publicly on Chainabuse + Reddit + X. Public attribution matters.
  • File IC3 / Action Fraud / national CERT if loss exceeds $10k. Adds legal leverage.

Don't — ever

  • Don't pay "recovery agents" who DM you offering to retrieve funds. 100% scam.
  • Don't import the compromised seed into anything new — even a hardware wallet.
  • Don't reset the affected machine until you've captured the extensions list and logs.
  • Don't trust "MetaMask support" / "Trezor support" DMs — official teams never DM first.
  • Don't reuse passwords tied to the wallet email — drainers harvest them in parallel.
  • Don't delete the phishing tab before screenshots — preserve the URL bar in evidence.
05 · WHO DOES WHAT

PhishDestroy and SEAL — different jobs, same fight

PhishDestroy

We kill phishing sites

Submit a URL — we get the domain suspended at the registrar, blocklisted across browsers and 30+ wallets. We don't do incident response.

+
SEAL 911

They respond to live incidents

Got drained? Need exchange freezes, fund tracing, malware triage? SEAL has chain analysts and security teams on call. ~8 min reply, free.

06 · FAQ

Common questions, answered fast

Will I get my funds back?

Honest answer: usually no. Recovery happens in less than 8% of cases — and only when funds hit a KYC'd exchange before laundering. Speed is your only leverage. Every minute lowers the odds.

Anyone who DMs you offering "guaranteed recovery" is a scammer targeting your second loss. SEAL, PhishDestroy, and ZachXBT are all volunteer-run and never charge.

What if I think there's malware on my device?

Open the SEAL malware playbook: securityalliance.org/go/malware. It walks you through isolating the device, capturing the infection, rotating credentials from a clean machine, and avoiding cross-contamination.

Common signs: clipboard-paste replaces your address with a different one; a wallet extension you don't remember installing; transactions you didn't initiate; "MFA" requests you didn't trigger.

Should I import my seed into a new wallet "just to check"?

No. Never. The seed is public to the attacker. Any wallet you import it into — including a hardware wallet — is already drained or scheduled to be. Sweep bots monitor known compromised seeds 24/7.

Why public reporting? Why not just file with police?

Police reports are slow. Public reporting on Chainabuse, MetaSleuth, X, and Reddit is fast — and it stays in Google. Three reasons it matters: (1) the attacker can't cash out at major exchanges if the wallet is publicly tagged, (2) the next victim Googles the address before signing and walks away, (3) chain analysts pick up the trail quicker. Always do both.

What's the difference between PhishDestroy and SEAL 911?

PhishDestroy takes phishing domains down — we work the registrar, hosting, browser, and wallet-blocklist side. We don't run incident response.

SEAL 911 is the war-room hotline of the Security Alliance — chain analysts, exchange contacts, malware experts, and protocol teams. If you're in an active incident, they're who you want on the phone. securityalliance.org

I see "pending" transactions. Can I cancel them?

If your tx is still pending and the attacker's hasn't confirmed yet, you can race them with a higher-gas replacement. Use cancel in MetaMask or speed-up via Flashbots Protect. If the attacker controls the wallet, you are racing their bot's gas — you usually lose. SEAL can sometimes coordinate Flashbots-protected sweep helps; ask in the bot.

How long should I keep evidence?

At least 5 years. Civil suits, tax write-offs, insurance claims, and law-enforcement chain-of-custody all need original screenshots, tx hashes, and timestamps. Store on encrypted offline media — never on the affected machine.

SEAL · Security Alliance
Open the bot now
You are not alone — every second counts

Stop reading. Open SEAL 911.

If you got this far and you haven't messaged the bot yet, do it now. They will guide you through everything above in real time. Free, 24/7, ~8 minute reply.

PhishDestroy · Critical Action playbook · in coordination with Security Alliance (SEAL)
phishdestroy.io · @seal_911_bot · malware playbook