New Articles

  1. How to Protect Yourself from a SIM Swap Attack

    To avoid a SIM Swap attack, avoid using SMS 2FA, especially on financial accounts, crypto exchange accounts and all email addresses. Opt for a more secure form of MFA instead
  2. Can a pending cryptocurrency transaction be cancelled?

    A cryptocurrency transaction that has been confirmed and posted to the blockchain cannot be cancelled or reversed. A cryptocurrency transaction that has not yet been confirmed but has been submitted and is currently 'pending' can usually be cance...
  3. Crypto wallet is frozen and can't initiate transfers

    Crypto wallet is frozen
  4. What are the most prevalent crypto scams to be aware of?

    The most common crypto scams we encounter on a day-to-day basis include: 1. Pig Butchering Scams -- Pig butchering scams specifically target users that have little to no knowledge of cryptocurrency. The scammer takes a while to build up rapport a...
  5. Distinguishing phishing messages warning of technical problems from legitimate technical issues

    A common tactic used by phishing attackers is warn users of an urgent technical issue with their wallet or exchange account that purportedly requires the users' quick action to avoid a loss of funds. In almost all cases, this warning is bogus and...
  6. How to obtain a partial crypto recovery by convincing scammers to process withdrawal requests

    Cryptocurrency fraud victims that have sent money to fraudulent investment platforms are sometimes able to recover a small portion of their losses own their own -- without our help, without the help of any other professional firm,  without the h...
  7. Seeking assistance from cryptocurrency forensics expert investigation firms

    If you are seeking assistance from a private cryptocurrency forensics firm, there are certain pieces of information that will be essential to gather and provide, the most important which are: 1. The blockchain transaction data associated with the...
  8. Guide: how to communicate on-chain with an unknown hacker

    In order to communicate on-chain with an attacker, you will need a non-compromised cryptocurrency wallet and will need to use a wallet application that supports adding a data string to a transaction; not all wallet applications support this. Wall...
  9. Reversing bank and credit card transfers

    When users realize they've been a victim of a cryptocurrency scam, it is common for them to try and determine if any funds can be recovered. Cryptocurrency transactions can't be reversed once they have been sent and confirmed on the blockchain, ho...
  10. Reporting malicious wallet addresses

    Users that want to report cryptocurrency fraud or want to report stolen cryptocurrency  sometimes want to report the addresses associated with the fraud. Reporting the addresses can be helpful to notify exchanges about questionable or illicit sour...