Types of cryptocurrency loss we analyze

Correct classification improves recovery strategy. Use this hub to jump into the guide that matches your situation, then consider a case review.

Unauthorized wallet transfers

Malware, seed leak, or compromised browser extension. Priority: containment and tracing.

Phishing guide

Exchange & platform issues

Frozen accounts, failed KYC, stuck withdrawals, suspected unauthorized access.

Exchange issues

Investment & romance scams

Fake platforms, pig-butchering, impersonation of brands or relatives.

Romance scams

Token & liquidity rug pulls

Honeypots, malicious mints, dev wallet dumps, fake audits.

Rug pulls

DeFi & smart contract loss

Unlimited approvals, malicious contracts, bridge exploits.

DeFi risks

NFT & marketplace fraud

Fake collections, lookalike sites, drainer listings.

NFT fraud

Wallet access & passphrase

Wrong word order, legacy derivation paths, partial backups.

Wallet access

Prevention (before the next incident)

Hardening checklist for individuals and small funds.

Checklist

Why taxonomy matters for SEO and for your case

Google rewards pages that satisfy search intent with specificity. Victims rarely type “crypto recovery” alone—they type long queries like “ethereum sent to scam wallet can I get back” or “exchange frozen withdrawal compliance.” By mapping each loss type to a dedicated resource, we mirror how people search and how investigators triage cases. Internally, that same mapping ensures we assign the right tooling: graph analytics for multi-hop theft, policy expertise for custodial freezes, and narrative plus chain alignment for fraud referrals.