If digital assets were moved without authorisation, the first requirement is a traceable record of movement and a conservative decision on what can be verified.
One intake standard for victims, counsel, and compliance: traceable facts, documented movement, and explicit verification boundaries.
Three entry routes, one conservative forensic standard.
Preserve evidence, verify first-hop movement, and separate viable matters early.
For victims who need an immediate, conservative read on whether on-chain movement can still be documented and escalated.
Outputs distinguish observed movement from inference. Every claim is tagged with the verification standard that supports it. No guaranteed recovery, no speculative attribution, and no ambiguity about what still requires outside confirmation.
Tracing across EVM, Bitcoin and UTXO chains, Solana, Tron, and major L2 environments. Cross-stack reconciliation is used for bridge hops, mixer proximity, and exchange off-ramp review when the available facts support deeper tracing.
Lead Investigator: Antonio Martinez. Background: Criminology, Universidad de Valencia; MSc Cybersecurity, UCJC Madrid. Focus: multi-chain tracing, counsel coordination, and evidence documentation suitable for counterparties and legal review.
Public-facing credentials are kept narrow and verifiable. Sensitive operational background is not disclosed on the website.
Scoped to case facts, jurisdiction, and counterparty response speed. We do not promise recovery outcomes.
Deliverables are scoped to case facts, jurisdiction, and counterparty response speed.
Public-safe summary. Full methodology and sensitive workflow details are disclosed only under engagement.
Real matters, described conservatively. Client identities remain redacted and public claims stay within what can be stated safely.
Use the route that matches your role. Initial review is handled by email and starts from the minimum traceable facts.
Initial review is handled by email. No call is required to open a matter. CyberLeakWatch does not request private keys, seed phrases, wallet approvals, or remote device access.