Our Process

PROCESS

How custody recovery actually works.

Six stages from intake to sealed dossier. Every artifact is logged, timestamped, and signed. No back-channel calls, no improvised promises, no payment in cryptocurrency from breach victims.

Open a case Read the FAQ
SIX STAGES

The custody desk procedure.

Each stage produces an artifact that survives in your sealed file. Nothing is verbal; nothing is informal.

Encrypted intake

You submit through the intake form on this site. The custody desk opens a case file under your assigned Case ID and acknowledges receipt within 24 business hours. Encrypted in transit; stored under chain of custody.

Acknowledgment

An analyst confirms intake, requests any missing artifacts (transaction hashes, screenshots, KYC submissions to the counterparty), and schedules the triage call.

Triage call

30-minute scoping call with the assigned analyst. We discuss what is realistic, what is not, and what the engagement will cost. You leave the call with a written scope, fee structure, and timeline.

Investigation

On-chain tracing across involved chains, off-chain outreach to exchanges and counterparties, custody-breach pattern matching against our Sealed Records, and chain-of-custody documentation throughout.

Sealed dossier

Signed, time-stamped brief delivered with the chain-of-custody log. The dossier is suitable for filing with major exchanges, custodial banks, regulators, or your counsel.

Liaison support

Where requested, we support follow-on filings with exchanges (Coinbase, Kraken, Binance compliance desks), FinCEN SAR coordination, IC3 reports, and your retained counsel.

DELIVERABLES

What you receive in writing.

DOCUMENT 1

Custody Audit Brief

Mapped surface of wallets, exchanges, and counterparties involved. Each entry timestamped with the source observation and analyst initials.

DOCUMENT 2

On-Chain Tracing Log

Block-by-block trace through bridges, mixers, and OTC desks. Hashes confirmed against multiple node providers; methodology notes attached.

DOCUMENT 3

Filing Packet

Pre-formatted statements ready to submit to FinCEN, IC3, your counsel, or exchange compliance desks. We prepare the paperwork; you submit through your channels.

TIMELINE

Typical case rhythm.

Most engagements fit a 10–14 business-day cadence from intake to sealed dossier. Cross-chain matters, non-US counterparties, or coordinated exchange outreach push timelines toward the 3–6 week range. We tell you which bucket your case lives in during the triage call.

  • Day 0: intake acknowledged
  • Day 1–2: triage call held
  • Day 3–8: investigation phase
  • Day 9–12: dossier drafting + internal review
  • Day 13–14: sealed delivery
  • Day 15+: liaison support if applicable
COMPLIANCE

Standards we work to.

Cryptoslock prepares deliverables in formats accepted by FinCEN, IC3, FBI Cyber, major US exchanges, and EU/UK financial regulators. We retain documentation for audit and litigation discovery where applicable.

FinCEN

SAR-ready filings

IC3 / FBI

Cyber complaint packets

FCA / BaFin

EU/UK reporting

TRANSPARENCY

What we will not do.

We will not promise recovery. We will not request cryptocurrency payment from breach victims. We will not cold-contact you on Telegram, Instagram, or WhatsApp. We will not subcontract your matter to unverified parties. If anyone claiming to be Cryptoslock approaches you through informal channels, it is not us.

Open a case
[ ] Open a Case
FinCENSAR-ready filings
IC3 / FBICyber complaint packets
FCA / BaFinEU/UK reporting
CHAIN OF CUSTODYsigned & timestamped
EST · NEW YORK667 Madison Avenue