Popular Articles

  1. How to Protect Yourself from a SIM Swap Attack

    To avoid a SIM Swap attack, avoid using SMS 2FA, especially on financial accounts, crypto exchange accounts and all email addresses. Opt for a more secure form of MFA instead
  2. Rescusing locked or staked crypto from a compromised wallet

    you should also keep in mind that hackers sometimes employ sweeping bots that operate 24/7 that are designed to sweep any funds that become available in a compromised wallet as soon as possible
  3. Can stolen cryptocurrency be recovered?

    Cryptocurrency transactions aren't reversible, and there is no magical way to 'hack' your money back, even if it's current location on the blockchain can be identified. There are ways that stolen cryptocurrency can be recovered in some cases thro...
  4. Multi-factor Authentication (MFA) Recommendations and Advice

    Utilizing adequate Multi-factor Authentication (MFA), particularly for any accounts with any links to cryptocurrency accounts or financial accounts is critically important for users to implement in order to ensure accounts are relatively secure and much less prone to being hacked or compromised.
  5. How to obtain a partial crypto recovery by convincing scammers to process withdrawal requests

    Cryptocurrency fraud victims that have sent money to fraudulent investment platforms are sometimes able to recover a small portion of their losses own their own -- without our help, without the help of any other professional firm,  without the h...
  6. Are Crypto recovery firms legit or just fraudsters too?

    There is no such thing as a legitimate cryptocurrency recovery firm. This is because no private firm has the ability to recover stolen cryptocurrency, at least not by themselves but there are legitimate private crypto investigators and investigative agencies, and sometimes their work can lead to improved recovery prospects
  7. What are the steps and stages of an investigation?

    The stages an investigation might take varies considerably from one case to another, but below is an overview of the stages of a semi-typical investigation. 1. User submits incident report to Cryptoforensic Investigators. This includes background...
  8. Types of Cryptocurrency Frauds and Scams and How They Work

    A pig butchering scam or Sha Zhu Pan involves a scammer reaching out to a victim (using a fake name/profile), and working to slowly build up rapport with the victim over weeks or even months
  9. How to get your money out of a crypto platform or exchange that isn't processing withdrawal requests

    Cryptocurrency withdrawal requests performed from legitimate cryptocurrency exchanges are typically processed in less then 15 minutes. If it's been over an hour, it's highly unusual and users may understandably want to know the reason for the dela...
  10. How to Identify worthless or fake cryptocurrency tokens

    It is common for fraudsters to send their victims counterfeit or fake cryptocurrency tokens that have no real value as part of their fraud schemes. This is done to make the victim think that they have received or recovered their money, whether it be from a fraudulent investment platform, or from a trader or even from a recovery scammer.