What you should do if you think someone has stolen your crypto-assets?

For educational purposes only!

1. Follow rules in this thread:

3. But…how?

Well… use breadcrumbs.app + ethtective.com + a letter to RPC provider, + impersonator.xyz combined with tenderly.co fork!

And the most important part, to establish clusters use amlbot.com — @ cryptoaml_bot investigation (more expensive) regime only!

If the stolen sum is very big and you need a VERY professional help (white-hacking a hacker, tracking, legal help) head to my friends from Hexens.io and pls tell that you are from me!

That’s for pro users:

Check out this awesome on-chain & OSINT forensics investigation example! Actually an amazing thread and report made with using breadcrumbs.app :

Thread start | Thread end

I suggest we go through the steps of the on-chain investigation together to understand how they are done.

Use the clickable scheme report below and re-read the thread one more time but with following its on-chain storyline!

Useful for learning! See my own methodology as well!

4. Extra-pro

For extra pro users go to arxiv/reserachgate and see what does “ distance” mean in the sense of Euristica, also what dusting attack is!

5. Compliance method

One also make a sort of banking compliance machine (if you find know each bank has a sort of a computer which always counts and checks that if money have gone — they should appear somewhere, in other words, it watches total monetary system balance and flows), and apply it to blockchain, thus notice anomalies.

And see who got money from whom and also which sum — this method is used to break mixers and performed usually via scanning and analyzing Big Data taken from blockchain and other sources. It was inspired by SWIFT/Alliance/BGP and all that creepy banking Haskel XML push stuff.

That’s a very rough TLDR — from easiest ways to Chainanalysis style, maybe I missed something but in general this is how things are going. They also use methods described in the section No 5 above — dusting attack, to measure “distance” between addresses, entities and other metrics in the sense of Euristica.

One can just send a hacker a malicious (Iframe/XSS) NFT or NFT with a doxxing pixel…

… and negotiate on your own gently

But that’s not recommended!

If my tips will help you please donate, I share ultra rare stuff!

6. Security Once Again

If it comes to security when holding crypto, I’ve already got all possible OpSec questions answered in my articles and threads:

Kogaan! Zu’u wah dein hin faraan! 🐉

If you want to support my work, please consider donating me:

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store