Jan 2, 2024 | Cryptocurrency Theft, Fraud, Hacking, Security
The methods by which cryptocurrency is stolen by hackers and fraudsters change as cryptocurrency users become more aware of how cryptocurrency thefts happen. We thus thought it would be helpful to outline the most common ways that cryptocurrency is being stolen in...
Jan 19, 2023 | Compliance, Cryptocurrency exchanges, Regulation, Security
In the wake of all the cryptocurrency exchanges that have imploded over the past year, including most notably FTX, it should be apparent that centralized cryptocurrency exchanges are centralized financial institutions that perform the same functions that banks provide...
Jun 12, 2020 | Cryptocurrency Theft, Hacking, Security
When a hacker is able to obtain access to a user’s cryptocurrency account, 99.9% of the time it’s due to a breach of user’s seed phrase. But the seed phrase can be breached in a variety of ways, allowing a hacker to steal cryptocurrency, and there are different attack...
Mar 5, 2020 | Cryptocurrency recovery, Cryptocurrency Theft, Hacking, Security
On a daily basis, Cryptoforensic Investigators gets inquiries from people who had their Bitcoin or cryptocurrency stolen from them in a hack and seeks our assistance tracking and recovering the cryptocurrency. A considerable amount of the time, these individuals think...
Feb 27, 2020 | Cryptocurrency exchanges, Cryptocurrency Theft, DeFi, Regulation, Security
Centralized crypto exchanges have increasingly been portrayed as insecure relative to decentralized exchanges over the past few years. This is due to an abundance of hacks that have occurred including on Upbit, DragonEx, Mt. Gox, Binance, Coinbene, Cryptopia, to Fcoin...
Jan 8, 2019 | Privacy, Security
Is cryptocurrency anonymous? Cryptocurrencies are wrongly thought of as being anonymous since they can be used by anyone and don’t directly identify a sender or recipient. However, this assumption is incorrect. Cryptocurrencies are generally not anonymous but...