For information on changes for our US clients, please visit our Support Center article.

Due to increased demand, account verification may be delayed. Please avoid submitting multiple requests, and for best results, review our document requirements beforehand.
Search
Beware of phone scams

Outbound phone support scam

This method is simple yet can be effective. An attacker obtains a Kraken client’s phone number, calls the client pretending to be from our support team and convinces them to provide sensitive information about their accounts in order to gain access and withdraw funds.
Additionally, you will receive an email from us confirming a specified time. If you receive a call from someone claiming to be from Kraken and you didn’t request this call, this is a phishing scam. Hangup immediately and send us a support ticket with information about the scam.

Inbound phone support scams

This method works similar to a phishing website but instead of a fraudulent website asking you for your sign-in credentials, it will be a fraudulent phone number with a scammer on the other end of the line. They will attempt to get sensitive information like sign-in credentials, 2FA codes and device approval codes so they can enter your account and withdraw funds.
Do not use search engines to locate our support phone number or the Kraken website.
We recommend you bookmark support.kraken.com and only use this link to navigate to our phone number, which will be found at the bottom of the page on our support center.
Kraken Support specialists will never ask for the following information:
  • Username
  • Password
  • Two Factor Authentication Code
  • Device Approval Code
  • Wallet Addresses or seed words
  • Master Key 
  • Remote access to your computer
  • ask you to remove or change your security settings
If you find a phone number claiming to be for Kraken support that is not listed on support.kraken.com, it's a phishing scam. Do not call it. Instead contact us:
Also, use all of the security features we offer to secure your account and maintain security best practices in your digital life.