CISO™ shows who has the funds, and how they are moving them

“ can actually

 trace the funds” 


 - CBS news, in reference to the Twitter Hack



Twitter Hack AML Investigation

What can be done when cryptocurrency is stolen? What actions can individuals take in these tough, but not at all uncommon situations?

The world was watching when Twitter was hacked on July 15th, 2020. Luckily, so were we.

Hackers took control of 130 high-profile accounts in order to facilitate a classic Bitcoin scam where individuals are asked to send money to a specific wallet, with the promise that the money will be returned later in double, as a charitable gesture. Elon Musk, Barack Obama, and Bill Gates’ accounts were compromised. If it can happen to them, it can happen to anyone.

In situations like this, it is essential that law enforcement and other stakeholders have tools at the ready to follow the money and monitor the situation. Thankfully, using CISO™’s auto-trace, we were able to quickly track down implicated wallets in order to trace these stolen funds, and quickly submit a report. It only took a few hours for over $100,000 to enter into the scammers’ wallets, but it only took CISO™ a few seconds to graph the transactions as the scammers began employing money laundering techniques. Tracing transactions to points of potential liquidation is essential for anti-money laundering (AML) in real-time. It did not matter what was done to hide the movement of these funds. was one step ahead, thanks to CISO.

CISO™’s ability to quickly trace, and then provide detailed investigative reporting on the matter provides the extra detail that law enforcement and relevant stakeholders need during complex situations such as this. You’re never alone in this situation. Try out CISO™ for yourself today here ...we are democratizing blockchain investigation. 

Similar use cases

Enabling OFAC Compliance via Ransomware Expertise

We combine our deep expertise in ransomware with Machine-Learning enabled tools to help protect institutions from regulatory liability.

[ BEI™ API + Investigation services ]

$1.2 million DeFi Hack Recovery

Incident response in the DeFi space is uncharted territory, so we’re making the map. See how our team leverages our cutting-edge solutions to protect client funds.

[ CISO™ ]

Easy Compliance for VASPs

Virtual Asset Service Providers’ require a serious focus on compliance. Take a look at how we enable VASPs to focus on running and growing their business, instead of compliance.

[ BEI™ API ]