📞
Intelligence On Chain - Victim Information
  • Introduction
  • Protect Yourself
  • Victim Guide - What to do next!
    • Guide - Seed Phrase Compromised
    • Guide - The Recovery Scam
    • Guide - Private Key Compromised
    • Guide - I Signed a Malicious Smart Contract
    • Guide - When a Project Rugpulls
    • Guide - Malicious Downloads
    • Guide - Fake Trading Platforms
    • Guide - Romance Scams
  • Reporting Crime to Authorities
    • Reporting to Interpol
    • Europe - Reporting Cyber Crime
    • Spain - Reporting Cyber Crime
    • US - Reporting Cyber Crime
    • UK - Reporting Cyber Crime
    • Canada - Reporting Cyber Crime
  • Contact Us
    • Open a Case
Powered by GitBook
On this page
  • What to look out for
  • Here is a list of things to look out for;
  1. Victim Guide - What to do next!

Guide - The Recovery Scam

During this section of the document, we describe the recovery scam.

What to look out for

Recovery scams are prevalent in web 3.0 especially! According to the NCA, these crimes are often committed by the same people who planned the initial crime, yet appear to be completely unrelated.

Recovery of assets is highly unlikely without lawyers or law enforcement being involved.

Here is a list of things to look out for;

  • Guaranteed success

  • Really high percentage success

  • Technical jargon

  • Large payment upfront

  • Not a registered business

  • Claims to be able to hack wallets

  • Urgency

The problem with these scams, are that the victim is already vulnerable at this stage after a rather large loss, mixed with an opportunity that sounds too good to be true, it’s actually really effective and people end up losing even more money.

If you’re unsure as to whether it is a scam, then ask for an explanation about how the process works, then send the response to admin@intelligenceonchain.com, and we’ll decipher it for you

PreviousGuide - Seed Phrase CompromisedNextGuide - Private Key Compromised

Last updated 11 months ago