icono_instalar_ios_web icono_instalar_ios_web icono_instalar_android_web

A large amount of USDT was stolen. How can ordinary people recover it?

AnálisisHace 4 minutosUpdate Wyatt
105 0

Fuente original: Xiao Sa lawyer

Recently, USDT thefts have occurred frequently, and people have used a variety of methods to lose their coins. One person even lost millions of assets in an instant simply by sending the login information of the tron wallet via private chat on an instant messaging app. This is bizarre and terrifying.

In order to prevent a large number of partners from panicking and seeking desperate help after the incident, today, Sister Sa鈥檚 team will combine practical experience to teach everyone step by step how to correctly recover the stolen funds through judicial procedures and minimize losses.

Trace the flow of stolen funds and lock down risky addresses

Those whose coins have been stolen must have a basic grasp of their cases. Even if they do not know how their coins were stolen, they must roughly grasp the flow of funds through the public data on the blockchain. In many cases, a lot of key information can be obtained through the flow of funds and the operations of the suspects account.

According to the experience of the Sajie team in handling related cases, taking TRC 20-USDT issued on TRON as an example, most of the U theft cases can be divided into two types: non-professional/semi-professional acquaintances and professional gangs.

1. Non-professional/semi-professional acquaintances

When non-professional/semi-professional acquaintances commit crimes, it is usually very easy to track the flow of funds. In the absence of a third-party professional team to provide assistance in concealing the proceeds of crime and laundering money, the funds will generally not be split and transferred to multiple wallets in a short period of time, nor will the funds be withdrawn in a short period of time. As long as the victim himself or the lawyer carefully sorts out the information, most of the fund flows can be grasped.

Even more, Sister Sa鈥檚 team has encountered cases where after obtaining the victim鈥檚 funds, the suspects kept the stolen funds in their own addresses because they did not know a reliable withdrawal channel.

(II) Professional gangs committing crimes or professional money laundering teams involved

The situation where a professional gang commits a crime or a professional money laundering team is involved is more complicated. In most cases, the client and the lawyer can only see that the stolen funds are split in a short period of time and quickly flow to multiple addresses. The transaction chain is extremely complicated and difficult to track. In this case, if the stolen funds are large, the Sister Sa team recommends directly hiring a professional third-party blockchain team to investigate and collect evidence, and do not waste time

Friends, please note that this step is extremely critical. After the funds are stolen, we must immediately identify the flow of the stolen funds in order to lock down all risky accounts used by the suspects and lay the foundation for subsequent recovery of the stolen funds through judicial procedures.

Apply to the competent judicial authority for freezing and issue relevant legal documents to the public

Sajies team has rich experience in handling such cases. Generally, after investigation and evidence collection, we will organize all the evidence materials and write communication documents, and submit them to the special communication channels reserved for Tether, the U-coin issuer, and the public chain operator (for example, TRC 20-USDTs issuer, TRON). We will first inform Tether and the public chain operator of the relevant circumstances of the case, request them to pay attention, and conduct a preliminary investigation. Within the scope of our authority, we will mark the risk addresses that the suspects may use to launder money and conceal the proceeds of crime, and conduct special reviews on the next transfer behavior of users of risky addresses.

However, partners need to note that, in most cases, a lawyers letter does not have the effect of directly freezing the suspects risk account. If judicial freezing is required, it is necessary to apply to the competent judicial authority and obtain relevant judicial legal documents.

Take the TRC 20-USDT theft case that we handle most often as an example. Because the relevant transactions involve criptocurrencies, unless the evidence of the case is very solid, the public security organs (economic investigation) in mainland my country are generally unwilling to file a criminal case. In this case, the Sister Sa team generally chooses a roundabout way to save the country, and cooperates with colleagues in Hong Kong or other third-party countries to apply for a judicial freeze to the judicial authorities with jurisdiction.

If Hong Kong has jurisdiction over this case, the handling process is generally as follows:

1. Assist the victim to organize and collect evidence of stolen funds and write a written statement accordingly, and then assist the victim to report to the Hong Kong Police Station (generally under the jurisdiction of the Joint Financial Intelligence Group) as soon as possible and apply for the Hong Kong Police to issue a Letter of Non-Consent to Processing, and send the Letter of Non-Consent to Processing to the designated email address of Tether and the public chain operator, and temporarily freeze the account that has been confirmed to still contain the stolen funds (the freezing period is generally short);

2. After a short freeze, assist the victim to apply to the Hong Kong court with jurisdiction to issue a property preservation order with an attached disclosure order, and further obtain the KYC information retained by the user of the account where the stolen money was reported , so as to formally freeze the account where the stolen money was reported.

After the freezing is completed, most of the work of recovering the stolen money is done, and you can then start preparing to file a lawsuit to start the work of recovering the stolen money.

Recover stolen funds through civil litigation/criminal recovery

The actual process and specific operations for recovering stolen funds vary depending on the laws of the country where the judicial authority with jurisdiction over the case is located.

For example, if the mainland of my country files a criminal case and issues relevant legal documents to require Tether and the public chain operator to freeze the addresses involved, then the case will fall under the jurisdiction of my countrys judicial organs. According to the provisions of my countrys Criminal Law, Criminal Procedure Law and other laws and judicial interpretations, my countrys judicial organs should recover the stolen money and losses in accordance with their authority, without the need for the victims to handle it on their own. The victims can provide relevant evidence and clues to cooperate with the work of the public security organs. Of course, the victims also have the right to hire lawyers to protect their rights and, if necessary, file a criminal civil lawsuit.

If it is in Hong Kong, my country, the judicial authorities are only responsible for the criminal investigation and handling of the case. If the victim needs to retrieve the stolen funds, he needs to file a civil lawsuit separately. According to the experience of Sister Sa鈥檚 team, the case handling process under the jurisdiction of Hong Kong, my country is relatively simple, because in most cases, after the victim sues, the risk account holder who retains the stolen money generally will not file a defense as a defendant, nor will he choose to appear in court. Therefore, as long as the service is proper, he can often win the case through a default judgment or simplified procedure. With a winning judgment, you can ask Tether or the public chain operator to assist in retrieving the stolen funds.

Ultimas palabras

In short, there are more and more cases of large-scale U theft, and the methods of crime are also constantly changing. While partners should be vigilant, they should also keep a big heart. Dont panic when security incidents occur. Read the guidance article of Sister Sas team carefully and contact the professional team as soon as possible to handle it. Dont rush to seek medical treatment.

This article is sourced from the internet: A large amount of USDT was stolen. How can ordinary people recover it?

Related: Annualized 393%: In-depth analysis of the real rate of return and risk of Pendle YT leverage points strategy

Original author: @ Web3 Mario In the previous article, we explained the risk of the Pendle PT leveraged income strategy using AAVE. Friends gave a lot of positive feedback. Thank you for your support. Since I have been studying the market opportunities of the Pendle ecosystem for some time, I hope to continue to share an observation on the Pendle ecosystem this week, that is, the real rate of return and risk of the YT leveraged points strategy. In general, taking Ethena as an example, the current potential return rate of the Pendle YT leveraged points strategy can reach 393%, but you still need to pay attention to the investment risks. Utilize the leveraged properties of YT assets to gamble on the potential yield of Points First of all, we…

© Copyright Notice

Related articles