Officer's Blog

Posted on Sep 28, 2022Read on Mirror.xyz

What you should do if you think someone has stolen your crypto-assets: A Cheatsheet

For educational purposes only!

❗️ Please report scam here:

1. Follow rules in this thread:

https://threadreaderapp.com/thread/1560348596570144769.html


2. How to investigate?

https://officercia.mirror.xyz/BFzv17UwH6QG4q711NAljtSiP8eKR17daLjTdmAgbHw


3. But…how?

Well… use breadcrumbs.app + ethtective.com + a letter to RPC provider, + impersonator.xyz combined with tenderly.co fork!

And the most important part, to establish clusters use amlbot.com - @cryptoaml_bot investigation (more expensive) regime only!

If the stolen sum is very big and you need a VERY professional help (white-hacking a hacker, tracking, legal help) head to my friends from Hexens.io and pls tell that you are from me!

http://hexens.io/?utm_source=CIA_Officer&utm_medium=CIA_Officer&utm_campaign=CIA_Officer&utm_content=Blog

That’s for pro users:

https://officercia.mirror.xyz/5KSkJOTgMtvgC36v1GqZ987N-_Oj_zwvGatOk0A47Ws

Check out this awesome on-chain & OSINT forensics investigation example! Actually an amazing thread and report made with using breadcrumbs.app :

Thread start | Thread end 

I suggest we go through the steps of the on-chain investigation together to understand how they are done.

Use the clickable scheme report below and re-read the thread one more time but with following its on-chain storyline!

https://breadcrumbs.app/reports/2101

Useful for learning! See my own methodology as well!


4. Extra-pro

For extra pro users go to arxiv/reserachgate and see what does “distance” mean in the sense of Euristica, also what dusting attack is!

https://arxiv.org/pdf/2203.14684.pdf

https://arxiv.org/pdf/2005.14051.pdf


5. Compliance method

One also make a sort of banking compliance machine (if you find know each bank has a sort of a computer which always counts and checks that if money have gone - they should appear somewhere, in other words, it watches total monetary system balance and flows), and apply it to blockchain, thus notice anomalies.

And see who got money from whom and also which sum - this method is used to break mixers and performed usually via scanning and analyzing Big Data taken from blockchain and other sources. It was inspired by SWIFT/Alliance/BGP and all that creepy banking Haskel XML push stuff.

That’s a very rough TLDR - from easiest ways to Chainanalysis style, maybe I missed something but in general this is how things are going. They also use methods described in the section No 5 above - dusting attack, to measure “distance” between addresses, entities and other metrics in the sense of Euristica.

One can just send a hacker a malicious (Iframe/XSS) NFT or NFT with a doxxing pixel…

https://medium.com/@alxlpsc/critical-privacy-vulnerability-getting-exposed-by-metamask-693c63c2ce94

… and negotiate on your own gently

But that’s not recommended!

If my tips will help you please donate, I share ultra rare stuff!


6. Security Once Again

If it comes to security when holding crypto, I’ve already got all possible OpSec questions answered in my articles and threads:

Check out my blog: officercia.mirror.xyz


7. Anon, OpSec and Privacy guides. A very-special crypto-themed compilation for y’all:

I. Anon

https://hackmd.io/YKjhguQES_KeKYs-v1YC1w?both

https://anonymousplanet.org

https://officercia.mirror.xyz/WeAilwJ9V4GIVUkYa7WwBwV2II9dYwpdPTp3fNsPFjo

II. Privacy

https://yawnbox.com/blog/how-to-use-an-ipad-as-a-secure-calling-and-messaging-device

https://seirdy.one/posts/2022/07/09/stylometric-fingerprinting-redux

https://mirror.xyz/xanny.eth/SGxwfVQ75831z5vFaS1LrlatUJEhxBvZ2cyTvAdCD0k

https://privacyguides.org

III. OpSec

https://telegra.ph/CIA-Officer--Monero-05-08

https://github.com/OffcierCia/Crypto-OpSec-SelfGuard-RoadMap

https://usenix.org/system/files/1401_08-12_mickens.pdf

Read my thread about safety when holding crypto:


https://github.com/OffcierCia/support

Kogaan! Zu'u wah dein hin faraan! 🐉

If you want to support my work, please consider donating me: