Three engagements from our recent caseload, one per service line. Each is anonymised — identifying details have been changed to protect client confidentiality. Methodology, timelines, and outcomes are authentic.

Pig-butchering · €340,000 stolen · €187,000 recovered · 14 months
An Italian retiree, 65 years old and resident in Piemonte, was introduced through a WhatsApp group to what was presented as a Hong Kong-based "crypto arbitrage" platform. Over six months he made fourteen deposits in USDT-TRC20 to a single on-chain address, for a total of €340,000. The interface showed growing profits, a named relationship manager, and even a small "test withdrawal" that was paid out to build trust. When larger withdrawals started being blocked behind escalating "tax" and "compliance" pre-payments, he understood he had been targeted by a pig-butchering operation.
We were contacted 52 days after the final deposit — later than ideal, but before the cashout chain had fully completed.
By the time we opened the file, the funds had already transited three wallet hops and reached a deposit cluster at a Tier-2 Asian exchange. The scam operator had begun the fiat off-ramp but had not finished it: a portion of the balance was still on-platform. With every additional week, more of the balance would move to bank cashouts we could not claw back.
€187,000 recovered — 55% of principal — fourteen months after engagement. The remainder had already been dispersed to fiat cashouts across multiple smaller banking relationships before the freeze and was formally documented as non-recoverable in our closing report.
What made this case: the client came to us fast enough that cluster analysis still had leverage. Had we been contacted six months later the cashout chain would have completed, and the same file would have produced a zero-recovery outcome. Time is the most expensive ingredient in recovery work.
Contested divorce · ~€520,000 hidden crypto identified · ~€260,000 assigned to marital estate
A contested divorce before the Tribunale Civile di Milano. The wife's attorneys suspected the husband had moved significant marital assets into cryptocurrency during the eighteen months leading up to the filing, but Italian bank records showed only ordinary household transfers. The husband, under oath, denied holding any crypto.
Italian divorce courts have limited native discovery mechanisms for off-shore or self-custodial holdings. Without a targeted forensic approach, the hidden portfolio would have remained invisible to the proceeding.
We had to build a persuasive case for a non-technical court using evidence that would survive cross-examination by an opposing expert. That meant: (1) obtaining admissible records from the right Italian exchanges, (2) establishing a defensible link between those records and an on-chain wallet, and (3) producing a report a civil judge could read, understand, and rely on.
The court accepted our analysis in full. The judgment ordered the husband to transfer 50% of the identified holdings — approximately €260,000 at the date of transfer — to the marital estate. His subsequent appeal was dismissed.
What made this case: the report was written for a non-technical judge. Glossary integrated, diagrams clean, conclusions properly caveated. Credibility under cross-examination mattered more than any single piece of on-chain detail. A correct answer that the court cannot understand is not evidence — it is noise.
LockBit ransomware · 1.8 BTC ransom (~€78K) · 0.84 BTC frozen at HTX
A mid-sized manufacturing SME in Emilia-Romagna was hit by a LockBit variant. After eleven days of failed recovery attempts and pressure from lost production, the CEO authorised a ransom payment of 1.8 BTC (approximately €78,000 at the time). Operations were restored. The local prosecutor subsequently opened an investigation into the payment chain, and we were engaged as technical consultants in support of the Guardia di Finanza's Nucleo Speciale Tutela Economia.
LockBit's Bitcoin infrastructure uses aggressive peeling-chain patterns and routinely mixes affiliate shares through CoinJoin. The ransom address was brand-new, with no OPSEC mistakes at the entry point. On its own, this file had no obvious handle.
0.84 BTC frozen at HTX (approximately €36,000 at the freeze date), currently pending judicial release to the SME victim. Beyond the individual case, the analysis contributed three new affiliate wallet clusters to joint EU ransomware intelligence.
What made this case: CoinJoin was supposed to be the end of the trail. It wasn't — because a separate case had already pinned down the affiliate's consolidation pattern. Investigation is cumulative. Every file feeds the next; the value of an internal dataset is measured in months, not transactions.
The sooner we are involved, the better the outcome. Free preliminary consultation — all information treated in strict confidence.
Contact an Expert →