What you should do if you think someone has stolen your crypto-assets?
For educational purposes only!
1. Follow rules in this thread:
2. How to investigate?
If the stolen sum is very big and you need a VERY professional help (white-hacking a hacker, tracking, legal help) head to my friends from Hexens.io and pls tell that you are from me!
That’s for pro users:
How can you become a one-man-army OSINT hero? A Pathway.
Today I would like to talk about how to become a good OSINT investigator, but to continue the conversation I would like…
Check out this awesome on-chain & OSINT forensics investigation example! Actually an amazing thread and report made with using breadcrumbs.app :
I suggest we go through the steps of the on-chain investigation together to understand how they are done.
Use the clickable scheme report below and re-read the thread one more time but with following its on-chain storyline!
Breadcrumbs - Blockchain Investigation Tool
Breadcrumbs is a blockchain analytics platform accessible to everyone. It offers a range of tools for investigating…
Useful for learning! See my own methodology as well!
For extra pro users go to arxiv/reserachgate and see what does “ distance” mean in the sense of Euristica, also what dusting attack is!
5. Compliance method
One also make a sort of banking compliance machine (if you find know each bank has a sort of a computer which always counts and checks that if money have gone — they should appear somewhere, in other words, it watches total monetary system balance and flows), and apply it to blockchain, thus notice anomalies.
And see who got money from whom and also which sum — this method is used to break mixers and performed usually via scanning and analyzing Big Data taken from blockchain and other sources. It was inspired by SWIFT/Alliance/BGP and all that creepy banking Haskel XML push stuff.
That’s a very rough TLDR — from easiest ways to Chainanalysis style, maybe I missed something but in general this is how things are going. They also use methods described in the section No 5 above — dusting attack, to measure “distance” between addresses, entities and other metrics in the sense of Euristica.
One can just send a hacker a malicious (Iframe/XSS) NFT or NFT with a doxxing pixel…
Critical privacy vulnerability — getting exposed by MetaMask
Lately, I’ve been spending time with my team, researching different NFT airdrop scenarios, and we’ve stumbled upon a…
… and negotiate on your own gently
But that’s not recommended!
If my tips will help you please donate, I share ultra rare stuff!
6. Security Once Again
If it comes to security when holding crypto, I’ve already got all possible OpSec questions answered in my articles and threads:
- officercia.mirror.xyz/0uiAGM50rkQSvHbptcrVkCkyxsnewpAFIdu3oyga42Y — An ultimate security guide for MacOS users!
- officercia.mirror.xyz/_nD1Rtxe1PplK-NQzIq9sl-KNtajQG0aKqYsV36RTjA — an ultimate list of rules any on-chain survivor should follow to stay safe!
- github.com/OffcierCia/Crypto-OpSec-SelfGuard-RoadMap — my own OpSec guide!
- Check out my blog: officercia.mirror.xyz
Kogaan! Zu’u wah dein hin faraan! 🐉
If you want to support my work, please consider donating me: