Stolen cryptoassets investigation

aml crypto Our team has extensive experience in investigation of cryptoassets thefts.
Our team has extensive experience in investigation of cryptoassets thefts.
We compile an individual and full detailed report for each case. It significantly increases your chances of recovering funds, as exchanges will be more willing to block funds of the intruder.

Law enforcement agencies will have a better understanding of the key circumstances of the case and what kind of inquiry needs to be made, making it more likely to find the intruder and recover your funds.
Each of our investigative reports have four parts:
  • DETAILED INTERVIEWING
    DETAILED
    INTERVIEWING

    Having investigated many crypto incidents, we have encountered both popular and unique cases of cryptoasset theft. That's why we know what to look out for.


    Detailed interviews help us gather the right data and leads for subsequent OSINT and blockchain analysis.

  • OSINT ANALYSIS OF DIGITAL FOOTPRINTS OF INTRUDERS
    OSINT ANALYSIS OF DIGITAL FOOTPRINTS OF INTRUDERS

    The information collected about the victim's interactions with the intruders is carefully parsed by the analysts. All valuable information (blockchain addresses, nicknames, websites, contacts, etc.) is extracted from the content of their correspondence and enriched with data from public sources.


    All of this can give analysts leads and connections, even if the communication channels found are no longer in use. Sometimes, just these actions are enough to identify the intruder.

  • ANALYSING THE MOVEMENT OF STOLEN FUNDS ON THE BLOCKCHAIN
    ANALYSING THE MOVEMENT OF STOLEN FUNDS ON THE BLOCKCHAIN

    No matter how many transit addresses and transactions the intruder uses, we can analyze them all. A prime example is our investigation where an attacker created over 113,000 crypto addresses to cover his traces. This factor made it impossible to conduct analytics using blockchain browsers.


    We use our own software “EYE”, which allows us to track the flow of funds between addresses, the transfer of assets through DEX to other blockchain networks, and automatically searches hundreds of different databases for new valuable information. The result is an answer to the question of where funds have settled, whether they went out through exchanges with KYC, and whether mixers were used to obfuscate the traces.

  • RECOMMENDATIONS FOR FURTHER ACTION
    RECOMMENDATIONS FOR
    FURTHER ACTION

    At the end of the work, you receive a detailed report with as much data on the incident as possible.


    For law enforcement agencies, this report will be the basis for initiating proceedings, as well as simplify and speed up the process.


    The security services do not have enough dedicated specialists for a proper response to all incidents, and our report will simplify their work. The only thing left is to send the appropriate requests to exchanges, domain name registrars, and sites advertising phishing sites, or to immediately conduct investigative actions against the identified intruder.

THE COST OF PREPARING A REPORT DEPENDS ON THE COMPLEXITY OF THE PARTICULAR CASE AND THE WORKLOAD OF OUR COMPLIANCE OFFICER.

Leave an application and we'll do a quick scoping of the situation and give you estimate cost.
Calculate the cost

Examples of Investigations

aml crypto Examples of Investigations #1
Positive
case #1
Phishing links. Fake Metamask.

A crypto-user found all his funds missing on a certain day. There was no clue how it could have happened: he kept the SEED phrase from the wallet on a piece of paper, as recommended; only the user himself had access to the device.
Negative
Hacking a personal social network account / device. Twitter hack.
Positive
The victim personally sends funds to the attacker. Deceit in P2P.
Negative
Fake mobile apps. Crypto exchange application.
Negative
Revealing your SEED phrase. The scammer introduced himself as a technical support employee.
Positive
The victim personally sends the funds to the fraudster. Fake trader.
Acceptable
Investment in SCAM project. Fake coins and liquidity pools.
Our specialist will contact you as soon as possible!
Our clients don't always have full-time specialists who are ready to conduct blockchain investigations on their own. We are always ready to provide them.
Our team has many years of expertise in conducting various investigations. We are ready to offer this experience for the investigation of even the most difficult cases.
Our company has recovered millions of stolen cryptocurrencies from different blockchains.
Individual cases require very deep competence, as well as the ability to find clues, taking into account all possible digital traces in forums, messenger chats, etc. The analysis of data on blockchain transactions, combined with other digital footprints, helps to look at the situation from new angles and see new relationships and patterns.