How I investigate crypto hacks and security incidents: A-Z

| Much thanks vice.com for a mention!

| Here I will tell you exactly how I investigate crypto hacks and security incidents, and describe methodology!


I - Investigation Flow


II - On-Chain Investigations Tools List

VR on-chain investigations:

ETH-USDT flow:

Explorers list:


III - How To Investigate Hacks On-Chain

Follow:


IV - Practice:

Check out this awesome on-chain & OSINT forensics investigation example! Actually an amazing thread and report made with using breadcrumbs.app :

Thread start | Thread end 

I suggest we go through the steps of the on-chain investigation together to understand how they are done.

Use the clickable scheme report below and re-read the thread one more time but with following its on-chain storyline!

Useful for learning! See my own methodology! Check out this awesome on-chain investigation as well:


V - Additional tips

Google Dorks:


VI - Knowledge Hub


Support is very important to me, with it I can spend less time at work and do what I love - educating DeFi & Crypto users!

If you want to support my work, you can send me a donation to the address:

Thank you! ❤️

Subscribe to Officer's Blog
Receive the latest updates directly to your inbox.
Verification
This entry has been permanently stored onchain and signed by its creator.