Topics Covered:
How to create a new wallet and transfer your funds
How to secure your devices and online accounts
How to report a compromised wallet and prevent future incidents
Introduction
If you believe your wallet has been compromised—whether your funds were stolen or transactions were made without your consent—it's critical to act immediately. While Web3 empowers users with full control over their assets, it also means you alone are responsible for your wallet’s security.
This guide walks you through the essential steps to help protect your funds, secure your devices, and reduce future risk.
Understanding the Risks of a Compromised Wallet
Because blockchain technology is decentralized, transactions are irreversible. There is no central authority—including Trust Wallet—that can reverse transactions or recover stolen assets.
If your wallet is compromised, time is of the essence. Here’s what to do next:
1. Create a New Wallet and Move Remaining Funds
The first step is to create a new, secure wallet and transfer any remaining assets to it.
Steps to Follow:
Download the Trust Wallet app only from official sources.
Create a new multi-coin wallet.
Securely back up the new 12-word secret phrase. Never store it online or share it with anyone.
Transfer any remaining funds from the compromised wallet to your new one immediately.
Refer to this step-by-step guide:
How to Create a Multi-Coin Wallet
Important: Do not reuse your old secret phrase, PIN, or passwords. Consider that wallet fully compromised.
2. Scan Your Devices for Security Threats
Use reputable antivirus or anti-malware software to run a full system scan on any device you used to access your wallet.
Look for malware, keyloggers, or suspicious apps/extensions.
Remove any threats found before accessing your new wallet.
Keep your device's OS and apps up to date.
3. Secure Your Online Accounts
A wallet breach may be tied to compromised online accounts or reused passwords.
For example, storing your secret phrase on Google Drive or email can lead to exposure if your Google account is hacked.
Do the following:
Check your email, social media, and cloud storage for unauthorized activity.
Visit Have I Been Pwned to see if your accounts have been exposed in a data breach.
Update passwords, and avoid reusing the same ones.
Use two-factor authentication (2FA) wherever possible.
Consider using a password manager for safe and unique password storage.
4. Report the Incident
While lost crypto funds are generally unrecoverable, reporting the event is still important.
Submit a support ticket at: support.trustwallet.com
Include:
Your wallet’s public address (QR code)
Transaction details (hashes, addresses involved)
Any links you interacted with
Screenshots or transcripts of conversations with scammers (if applicable)
Estimated value lost
We also recommend reporting the incident to local authorities or your national cybercrime unit.
5. Learn and Practice Strong Security Habits
Prevention is your best defense. Strengthen your crypto security by:
Using a hardware wallet for large amounts of crypto.
Storing your secret phrase offline—never in emails, screenshots, or cloud drives.
Avoiding suspicious links and dApps, especially those asking for wallet access.
Keeping your software and apps updated with the latest security patches.
Educating yourself on phishing, social engineering, and fake support scams.
For more, visit our Trust Wallet Security Guide.
Conclusion
Dealing with a compromised wallet can be stressful, but swift action can minimize the damage and help prevent future incidents. By creating a new wallet, securing your devices, and implementing stronger safety habits, you’ll be back in control of your digital assets—more protected and informed than before.
Stay vigilant. Stay safe. You’re your wallet’s first and best line of defense.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article