How can you protect yourself against Trojan viruses?

Published on Jun 13, 2025Updated on Feb 4, 20264 min read3

Recently, we have found that some customers have had their platform accounts stolen due to their computers being infected with Trojan viruses. Trojan viruses can steal your account passwords, authentication information, and even remotely control your device, posing a serious threat to the security of your assets. Let's take a closer look at the sources of Trojan viruses, how they attack, and the measures you can take to protect yourself.

1. Common sources of Trojan viruses

  1. Cloned official websites (phishing sites): Hackers set up fake websites that closely resemble the legitimate official sites, luring customers to download malicious installation packages through search engine ads. For example, using similar domain names (such as changing “okx.com” to “0kx.com”) and mimicking the website layout, while secretly implanting trojan viruses during installation.

  2. Tampering with official installation packages: Cracked software and pirated resources (such as office tools or game cheats) may be embedded with remote control Trojans or keyloggers. The software may appear to function normally, but it can secretly steal data.

  3. Phishing emails/attachments: Emails disguised as company notifications or delivery information, with attachments that are malicious .exe files or .docm files containing macro viruses.

  4. Malicious ads or websites: When visiting hacked websites or clicking on pop-up ads, a trojan virus may be automatically downloaded.

  5. Social engineering traps: Impersonating official accounts on social media or forums to post 'urgent updates' or 'benefit links,' which are actually Trojan viruses.


2. Why does a Trojan virus on your computer lead to your platform account being stolen?

The Trojan virus has the following data-stealing capabilities, which can directly threaten the security of your account:

  • Stealing login credentials: recording keystrokes, stealing passwords saved in browsers, or wallet addresses from the clipboard.

  • Screenshot/Screen recording: Monitor your operation process to obtain a secondary verification code or seed phrase.

  • Remote control: Hackers directly operate your computer, bypassing security authentication.

  • Synchronized information theft: If your email, SMS, or Google Authenticator is synced to an infected device, hackers can obtain all authentication information.

Case: Customer A downloaded “genuine software” from a phishing website, and a Trojan stole the passwords and SMS verification codes saved in their browser, resulting in their account being compromised.

3. How to prevent

  1. Only download software from official channels: Download from the official website or app store, be cautious of “ad” links in search engines, and verify the domain name before installing.

  2. Be cautious of unknown links and attachments: Do not click on suspicious links in emails or social groups, especially those with enticing content like “urgent updates” or “prize notifications.”

  3. Install antivirus software and scan regularly: Regular virus scans, promptly block Trojan activities.

  4. Turn off cloud sync for sensitive information: Disable multi-device sync for SMS, email, and Google Authenticator to ensure verification codes are only received on secure devices.

  5. Use a hardware wallet or a dedicated device: For managing crypto assets, it is recommended to use a cold wallet or a phone/computer dedicated to trading, and avoid installing unrelated software.

  6. Immediately freeze your account if any anomalies are detected: If your device experiences lag, unfamiliar processes, or abnormal pop-ups, use the platform's "Quick Freeze" feature to lock your account immediately and contact customer service.

Important note

  1. If you suspect your account has been compromised, immediately freeze your account and change all associated passwords; check your devices, perform a full antivirus scan or reinstall the system to prevent any remaining trojans.

  2. The official team will never ask for your account password or verification code in any form. If you encounter any suspicious situation, please contact customer service immediately to verify.