How custody recovery actually works.
Six stages from intake to sealed dossier. Every artifact is logged, timestamped, and signed. No back-channel calls, no improvised promises, no payment in cryptocurrency from breach victims.
Open a case Read the FAQThe custody desk procedure.
Each stage produces an artifact that survives in your sealed file. Nothing is verbal; nothing is informal.
Encrypted intake
You submit through the intake form on this site. The custody desk opens a case file under your assigned Case ID and acknowledges receipt within 24 business hours. Encrypted in transit; stored under chain of custody.
Acknowledgment
An analyst confirms intake, requests any missing artifacts (transaction hashes, screenshots, KYC submissions to the counterparty), and schedules the triage call.
Triage call
30-minute scoping call with the assigned analyst. We discuss what is realistic, what is not, and what the engagement will cost. You leave the call with a written scope, fee structure, and timeline.
Investigation
On-chain tracing across involved chains, off-chain outreach to exchanges and counterparties, custody-breach pattern matching against our Sealed Records, and chain-of-custody documentation throughout.
Sealed dossier
Signed, time-stamped brief delivered with the chain-of-custody log. The dossier is suitable for filing with major exchanges, custodial banks, regulators, or your counsel.
Liaison support
Where requested, we support follow-on filings with exchanges (Coinbase, Kraken, Binance compliance desks), FinCEN SAR coordination, IC3 reports, and your retained counsel.
What you receive in writing.
Custody Audit Brief
Mapped surface of wallets, exchanges, and counterparties involved. Each entry timestamped with the source observation and analyst initials.
On-Chain Tracing Log
Block-by-block trace through bridges, mixers, and OTC desks. Hashes confirmed against multiple node providers; methodology notes attached.
Filing Packet
Pre-formatted statements ready to submit to FinCEN, IC3, your counsel, or exchange compliance desks. We prepare the paperwork; you submit through your channels.
Typical case rhythm.
Most engagements fit a 10–14 business-day cadence from intake to sealed dossier. Cross-chain matters, non-US counterparties, or coordinated exchange outreach push timelines toward the 3–6 week range. We tell you which bucket your case lives in during the triage call.
- Day 0: intake acknowledged
- Day 1–2: triage call held
- Day 3–8: investigation phase
- Day 9–12: dossier drafting + internal review
- Day 13–14: sealed delivery
- Day 15+: liaison support if applicable
Standards we work to.
Cryptoslock prepares deliverables in formats accepted by FinCEN, IC3, FBI Cyber, major US exchanges, and EU/UK financial regulators. We retain documentation for audit and litigation discovery where applicable.
SAR-ready filings
Cyber complaint packets
EU/UK reporting
What we will not do.
We will not promise recovery. We will not request cryptocurrency payment from breach victims. We will not cold-contact you on Telegram, Instagram, or WhatsApp. We will not subcontract your matter to unverified parties. If anyone claiming to be Cryptoslock approaches you through informal channels, it is not us.
Open a case