To steal money secured by the private keys stored by a wallet, a thief needs
- access to the wallet data files or a copy of them.
- knowledge of any passphrase (or PIN etc) used to encrypt the keys in those files.
However, if someone has been tricked by a scammer, it is certainly possible that the victim was also tricked into giving the scammer access to their computer, perhaps by installing software suggested by the scammer, perhaps by giving screen-sharing access to someone who they thought was a helper. Their computer might have had back-door access and/or keyloggers installed.
It would perhaps be prudent to assume the worst. I would make a new wallet, with new keys, on a new, clean computer using nothing from the existing computer. I would create an on-chain transaction to move money to that clean environment.









