Instructions for Recovering Stolen Cryptocurrency
Step 1: Establish the Circumstances of the Theft
Step 2: Analysis Using Available Tools
Step 3: Actions Upon Identifying a Custodial Wallet
If your investigation reveals that the perpetrator’s wallet is custodial (e.g., associated with a centralized exchange or custodial wallet), forward the collected data to the platform promptly to initiate preventive freezing and investigation.
To identify whether an address is custodial:
Act swiftly, as these measures are most effective when taken quickly.
Step 3.5: Share Information with AML Companies