Popular Articles

  1. How to Protect Yourself from a SIM Swap Attack

    To avoid a SIM Swap attack, avoid using SMS 2FA, especially on financial accounts, crypto exchange accounts and all email addresses. Opt for a more secure form of MFA instead
  2. Rescusing locked or staked crypto from a compromised wallet

    you should also keep in mind that hackers sometimes employ sweeping bots that operate 24/7 that are designed to sweep any funds that become available in a compromised wallet as soon as possible
  3. Multi-factor Authentication (MFA) Recommendations and Advice

    Utilizing adequate Multi-factor Authentication (MFA), particularly for any accounts with any links to cryptocurrency accounts or financial accounts is critically important for users to implement in order to ensure accounts are relatively secure and much less prone to being hacked or compromised.
  4. How to obtain a partial crypto recovery by convincing scammers to process withdrawal requests

    Cryptocurrency fraud victims that have sent money to fraudulent investment platforms are sometimes able to recover a small portion of their losses own their own -- without our help, without the help of any other professional firm,  without the h...
  5. Can stolen cryptocurrency be recovered?

    Cryptocurrency transactions aren't reversible, and there is no magical way to 'hack' your money back, even if it's current location on the blockchain can be identified. There are ways that stolen cryptocurrency can be recovered in some cases thro...
  6. Types of Cryptocurrency Frauds and Scams and How They Work

    A pig butchering scam or Sha Zhu Pan involves a scammer reaching out to a victim (using a fake name/profile), and working to slowly build up rapport with the victim over weeks or even months
  7. Are Crypto recovery firms legit or just fraudsters too?

    There is no such thing as a legitimate cryptocurrency recovery firm. This is because no private firm has the ability to recover stolen cryptocurrency, at least not by themselves but there are legitimate private crypto investigators and investigative agencies, and sometimes their work can lead to improved recovery prospects
  8. What is Tainted cryptocurrency?

    Tainted cryptocurrency is a concept that suggest that cryptocurrency that is associated with illicit activity is "dirty" and that it remains that way indefinitely.
  9. Seeking assistance from cryptocurrency forensics expert investigation firms

    If you are seeking assistance from a private cryptocurrency forensics firm, there are certain pieces of information that will be essential to gather and provide, the most important which are: 1. The blockchain transaction data associated with the...
  10. What are the steps and stages of an investigation?

    The stages an investigation might take varies considerably from one case to another, but below is an overview of the stages of a semi-typical investigation. 1. User submits incident report to Cryptoforensic Investigators. This includes background...