cRYPTOFORENSIC iNVESTIGATORS
Blog
List of Vectors Hackers Exploit to Steal Cryptocurrency
When a hacker is able to obtain access to a user’s cryptocurrency account, 99.9% of the time it’s due to a breach of user’s seed phrase. But the seed phrase can be breached in a variety of ways, allowing a hacker to steal cryptocurrency, and there are different attack...
Why Cryptocurrency Adoption is Still Hindered by Criminal Activity
Nowadays, the percentage of Bitcoin transactions that involve criminal activity has declined considerably compared to what it once was. Today, a relatively small number of Bitcoin transactions are related to crime, even though many (uneducated) pundits and politicians...
Comprehensive Guide to Cryptocurrency Scams and Frauds
Ask anyone who has followed the cryptocurrency space for more than a few weeks and they’ll tell you that the industry is rife with scams and frauds everywhere you look. From fake phishing websites, to Ponzi Schemes, to fraudulent ICO’s to exchanges disappearing with...
Got Hacked & Had Your Cryptocurrency Stolen? Why It’s Your Own Fault
On a daily basis, Cryptoforensic Investigators gets inquiries from people who had their Bitcoin or cryptocurrency stolen from them in a hack and seeks our assistance tracking and recovering the cryptocurrency. A considerable amount of the time, these individuals think...
Centralized vs Decentralized Exchanges, DeFi & Security
Centralized crypto exchanges have increasingly been portrayed as insecure relative to decentralized exchanges over the past few years. This is due to an abundance of hacks that have occurred including on Upbit, DragonEx, Mt. Gox, Binance, Coinbene, Cryptopia, to Fcoin...
Problems Identifying Hidden Cryptocurrency in Divorce
Cases of spouses choosing to hide assets during a divorce are not a new development but utilizing cryptocurrency such as Bitcoin as a means hiding wealth is. Determining ownership of those cryptocurrency in divorce accurately without missing a large chunk of the...