Lost or stolen crypto?
Contact our Investigations team

Crypto Security Blog

A well-known crypto recovery scam recently resurfaced in a slightly modified way. Like many other scams, this one also tries to exploit the credibility and reputation of legitimate companies, including Cryptosec and Crypto Investigators. This scheme came to our attention through two channels: first, from astute individuals who contacted Cryptosec to verify claims of association made by these scammers; and...
Read More
In the U.S. alone, SIM-swapping attacks resulted in $72 million worth of losses last year, four-million dollars more than 2021, according to the Federal Bureau of Investigation. In a 2022 public service announcement, the FBI defined SIM swapping as a “malicious technique where criminal actors target mobile carriers to gain access to victims’ bank accounts, virtual currency accounts, and other...
Read More
Verified crypto-exchange accounts have become a hot commodity on the dark web, with login credentials available for as little as $20, according to May data from threat intelligence firm Privacy Affairs. But the price for verified crypto accounts has been steadily rising, with some ‘logs,’ a darknet slang term for stolen or nominee credentials, fetching as much as $2,650 per...
Read More
Annualized data from blockchain forensics provider Chainalysis indicates that crypto-enabled crime has dropped precipitously through the first half of 2023, but cybercriminals are also continuously evolving new cash-out methods to cover their tracks. Chainalysis’s mid-year update found that crypto inflows to “known illicit entities” were down 65% compared to where they were last June. Meanwhile, crypto flows to high-risk entities,...
Read More
(Please also read our Avoid Crypto Recovery Scams – Step-by-Step Guide.) To safeguard yourself from falling victim to crypto recovery scams, it’s crucial to be aware of the crypto recovery lies and deceptive tactics employed by scammers. In this guide, we will dissect several actual statements made by these scammers, debunking their falsehoods and shedding light on their fraudulent practices....
Read More
As experts in the field of crypto recovery, Crypto Investigators offer a crypto recovery pricing structure that takes into account the multifaceted nature of crypto investigations and legal processes required for recovery. Our fees are determined by several factors, including the complexity of the case, the amount of cryptocurrency lost, and the jurisdictions involved. It’s important to understand that regardless...
Read More
(Please also read our Avoid Crypto Recovery Scams – Step-by-Step Guide.) While we offer crypto tracing and investigation services for various reasons, from corporate M&A due diligence, internal fraud investigations, to finding hidden assets in a divorce, we are most often contacted to help recover stolen digital assets. So how does a legitimate crypto recovery service operate? Please be aware...
Read More
As the digital assets landscape continues to evolve, so do the challenges and risks associated with it. Scams and fraud are an unfortunate part of this reality, and now, a new threat has emerged – fake crypto recovery scams. These scams often target victims who have already been harmed by a cryptocurrency fraud, seeking to take advantage of their desperation...
Read More
This article concludes our four-part series on the basic differences between traditional IT security and blockchain security. Previous articles discussed the security differences critical for node operators, smart contract developers, and end users. In many ways, Security Operations Center (SOC) analysts and node operators face similar blockchain-related security challenges. The scale of SOC operations brings with it unique security challenges....
Read More
This article is the third in a four-part series exploring the differences between traditional IT security and blockchain security.  Check out the first two articles in the series exploring the differences for node operators and application developers. This article explores how user security differs between traditional IT and blockchain environments.  While identical products and services may be hosted in traditional...
Read More
1 2 3 7

Let us help you realize and protect the benefits of the new economy