The Fake Recovery Agent and Legal Firm Database
Click to Zoom
Fake recovery agents and fraudulent legal firms execute secondary scams targeting victims who have already lost money to cryptocurrency fraud, investment schemes, or technical support traps. These syndicates monitor public blockchains, buy stolen victim data on the dark web, and aggressively contact you posing as elite blockchain investigators, government agents, or international attorneys. They promise to retrieve your stolen funds for an upfront fee or a tax payment. They will never recover a single cent. They are the exact same criminals who stole your money the first time, or they are a secondary cartel that purchased your contact profile.
What Are Fake Recovery Agents and Fraudulent Legal Firms?
These entities operate what investigators call a recovery room scam. Fraudsters fabricate professional websites, clone the identities of real attorneys, and spoof caller IDs to match legitimate government agencies like the FBI Internet Crime Complaint Center. They use psychological manipulation to exploit your desperation. Once they convince you that your frozen assets have been located on a foreign exchange, they demand a retainer, a specialized software fee, or a network gas fee to release the funds.
Confirmed Fraudulent Entities
You must track specific data points to expose these syndicates. Keep a running ledger containing the fake entity name, their spoofed web domains, their primary manipulation tactic, and their demanded payment method.
Here is how you must document these threats. If any entity matches this profile, you are dealing with a cartel.
Trusty Ledger
TL-LTD.net, trustl-ltd.com, usclear@gov.financial
Impersonates the Canadian Investment Regulatory Organization (CIRO) and the UK's Financial Conduct Authority (FCA). They use spoofed governmental emails and a fabricated "Bank of Samoa" portal to simulate escrowed funds, requiring advance fees to release the phantom assets.
Upfront recovery service fees, liquidity taxes, and the unauthorized extraction of personal financial data through unhosted cryptocurrency wallets.
Fidelis Rig
fidelis-rig.co
Targets victims of high-yield investment frauds and DeFi rug pulls by falsely claiming regulatory oversight. They conduct aggressive cold-calling campaigns claiming to possess exclusive blockchain tracing algorithms and use high-pressure tactics relying on the sunk-cost fallacy to force contract execution.
Substantial upfront deposits, transaction fees, green channel fees, or anti-money laundering proofing deposits to unfreeze lost funds.
Payback LTD (Clone Network)
paybackltd.com, paybackltd.eu.com, paymentbackltd.com, ltdpayback.net, payback-ltd.uk.com
Executes corporate identity theft to impersonate the legitimate firm Money Back Ltd. They send mass spear-phishing emails to individuals on dark web victim lists, instructing them to open an account on an unlicensed banking interface (Bankkesh) to receive recovered funds, which is then used as a money-laundering pipeline.
Rapid fiat funding of fabricated offshore bank accounts and processing taxes to authorize the final release of capital.
Bankkesh / Keshcity Limited
bankkesh.com
Operates an unauthorized, unlicensed banking platform explicitly designed to facilitate advance-fee fraud as the financial infrastructure for the Payback LTD clone network. They socially engineer victims into depositing fresh fiat into this portal, which is immediately routed through decentralized mixing services.
Direct fiat deposits intended to activate accounts or serve as collateral for inbound recovery transfers.
Cyberlegal Limited Impersonators
cyber-law.uk, cybercrime.interpol@onmail.com, dex3-crypto.com
Impersonates authorized legal professionals and international policing authorities (like INTERPOL) using spoofed webmail addresses. They issue fabricated law enforcement directives and forged seizure warrants to create psychological duress, claiming funds are locked in jurisdictional disputes.
Jurisdictional clearance fees, administrative penalties, and legal representation retainers.
Funds Protect
funds-protect.org
Purchases high-value victim lists from primary criminal syndicates and contacts targets posing as a consumer protection agency. They claim a global restitution fund has been established and use an empathetic bureaucratic tone to lower defenses before demanding upfront costs.
Upfront administrative fees categorized as mandatory cross-border taxes or official solicitor processing levies.
Fundsreclaimasesst
fundsreclaimasesst@gmail.com, ftcrecoveryteam0@gmail.com
Operates a high-volume impersonation campaign targeting North American retail investors by mimicking the United States Federal Trade Commission (FTC) via free webmail providers. They send fabricated official notices threatening immediate federal seizure of assets unless a fee is remitted.
Immediate clearance fees and federal anti-money laundering penalties transferred directly to unhosted cryptocurrency addresses.
MyChargeBack
mychargeback.com
Fabricates institutional legitimacy through manipulated reviews and social media ads, promising guaranteed recovery. They conduct superficial blockchain analysis to present incomplete or artificially generated tracing reports as psychological anchors, extracting fees before ceasing all communication.
Exorbitant upfront investigative fees, secondary clearance commissions, and direct cryptocurrency transfers to unhosted wallets.
Claim Justice
claimjustice.com
Uses aggressive online marketing and advertises guaranteed success rates to lower risk perception. They fabricate affiliations with global legal services and financial regulators, promising rapid resolution upon executing a contract, then stringing victims along with escalating demands.
Initial legal retainers, upfront block-tracing fees, and subsequent percentage-based commissions demanded prior to the actual recovery of funds.
Data Forensics
data-forensics.de
Masquerades as a German cybersecurity firm and manipulates third-party review platforms to build a false consensus of success. They deliberately delay investigative findings, claiming funds are encrypted in complex offshore structures, to generate fabricated roadblocks and extort continuous payments.
Successive, high-value invoices for investigative labor, data decryption, and international liaison operations.
Cyberguard
cyberguard.cfd
Offers highly automated cyber intelligence and blockchain tracing services. After securing an initial deposit, they either terminate communication or use automated scripts to deliver dense, meaningless printouts of public block explorer data disguised as highly classified tracing reports.
Non-refundable advance fees for blockchain forensics and the generation of proprietary intelligence dossiers.
Crypto Recovery Expert
cryptorecoveryexpert.us
Targets North American victims by claiming robust affiliations with major US financial institutions. They demand total transparency regarding the victim's remaining assets to calculate the maximum extractable upfront payment for their recovery services without triggering immediate financial collapse.
Unilateral upfront payments for professional recovery services and the exposure of comprehensive personal financial portfolios.
FBI Recovery Team
@FBI_recoveryteam
Operates on encrypted messaging channels like Telegram, directly impersonating federal agents of the FBI. They solicit individuals expressing financial distress online and claim to possess legal authority to forcefully seize assets from offshore exchanges, demanding compensation prior to execution.
Untraceable cryptocurrency transfers to unhosted wallets to fund illegal hacking operations or purchase proprietary exploitation tools.
Traceback Solution 1
@TRACEBACK_SOLUTION1
Positions itself as a boutique blockchain tracing specialist on social media. They offer a free consultation using basic blockchain explorers to build trust, then claim proprietary software is needed to unmask a centralized mixing service, coercing the victim into paying for the software.
Software licensing fees and proprietary tool access charges transferred via cryptocurrency.
Crypto Legal Impersonator Syndicate
legal.jgruber@protonmail.com, info@adviceoffice.net, hm-rc-services.com, restoretokens.com
Executes corporate identity cloning to impersonate the UK-based firm "Crypto Legal" using fabricated personas and spoofed international phone numbers. They present forged legal documentation bearing stolen government letterheads and demand immediate settlement of administrative taxes.
Upfront transaction charges, fabricated solicitor retainers, and simulated capital gains taxes.
Dawn Law
dawnlaw.net, dawnlaw.online
Establishes a professional-grade web presence to simulate an international law firm. They contact victims of collapsed exchanges offering to integrate them into massive, fabricated class-action lawsuits against the original scammers, requiring advance fees to secure a position on the disbursement ledger.
Advance fee payments for fabricated class-action legal representation and court registration.
Dayma Advocatenkantoor
daymaadvocatenkantoor.com, dayma.tech, dayma.advocat@infcentre.co
Executes a jurisdictional spoof by establishing a Dutch legal firm structure to intimidate victims. They distribute forged legal correspondence offering to launch European class-action lawsuits, exploiting complex legal jargon to convince victims that cross-border intervention requires heavy capitalization.
Extensive legal retainers, cross-border processing fees, and documentation translation levies.
Judemilhoon Law Firm Impersonators
@judemilhoonlawfirm
Impersonates boutique law firms on social media platforms like LinkedIn and Telegram. They monitor public complaints, offer pro-bono consultations, and claim to have secured default judgments against scammers, requiring the victim to pay a bond to enforce the asset seizure.
Fabricated court enforcement bonds and digital legal retainers processed exclusively via cryptocurrency.
Token Recovery
tokenrecovery.com, tokenrecovery.org
Targets victims of DeFi smart contract vulnerabilities and rug pulls by claiming to employ elite "white hat" hackers capable of executing reverse transactions on the blockchain. They exploit the technical complexity of DeFi to convince victims that immediate deployment of counter-measures is needed.
Cryptocurrency payments explicitly earmarked to deploy supposed "recovery smart contracts" and cover decentralized network gas fees.
Dex3 Crypto Recovery
dex3-crypto.com
Adopts hyper-technical Web3 terminology to build credibility with technically proficient victims. They claim to utilize proprietary analytics capable of unraveling cross-chain bridges and demand funding in stablecoins or Ethereum to lubricate the cross-chain retrieval mechanism.
Substantial upfront capital injections, exclusively demanded in Ethereum or heavily liquid stablecoins, to facilitate the fabricated cross-chain extraction.
Resto Ltd
restoltd.com
Acquires data sets of defrauded individuals and bypasses resistance by claiming the specific assets have already been located and secured on an immutable ledger. They subject the victim to a psychological pressure test, demanding a fee to verify the integrity of their receiving wallet.
Upfront liquidity provisioning, network testing fees, and wallet verification deposits.
United Crypto Recovery
unitedcryptorecovery.com
Manipulates SEO and deploys targeted ads to intercept victims researching post-hack mitigation. They promise rapid intervention to secure compromised accounts but only deliver standard public block explorer data disguised as proprietary intelligence after receiving payment.
Advance fees for recovery initiation and the execution of basic, publicly available blockchain analytics.
Liamm ETHH
@LIAMM_ETHH
Operates on social media targeting victims within the Ethereum network. The operator monitors discussions regarding gas optimization failures and claims lost funds are stuck in a pending mempool state, instructing the victim to provide private keys or transfer a rescue fee.
Direct transfers of Ethereum to cover fabricated rescue fees or the direct handover of private wallet keys.
Circuit Webs
@CIRCUITWEBS
Constructs a persona of rogue cybersecurity operatives with capabilities to infiltrate darknet marketplaces. They convince victims that traditional tracing is obsolete and demand payment to deploy offensive cyber capabilities against the original scammers.
Untraceable privacy coin transfers to fund fabricated offensive cyber operations on the darknet.
Fake Coinbase Technical Support Ring
+1 878-251-3151, +371 24 876 473, +44 7378 712618
Executes a technical support recovery scam using telecommunications spoofing and SMS phishing. They contact victims claiming their legitimate exchange accounts are compromised and instruct them to transfer assets to a secure offline vault or pay fees to expedite unfreezing.
The direct transfer of remaining wallet balances to syndicate-controlled addresses, or the payment of immediate unfreezing penalties.
Clackamas Tech
@CLACKAMASTECH
Targets victims experiencing hardware wallet issues. Under the guise of providing technical support, they request remote desktop access to diagnose connectivity issues, then systematically harvest private keys and residual balances while charging an hourly rate.
Hourly technical support fees and the surreptitious extraction of private keys and remaining wallet balances.
Cyber Tech 247
@cybertech247
Markets itself as a 24/7 rapid response team for hacked accounts, exploiting the critical time-sensitivity of a hack. They demand an emergency retainer, claiming specialized software must be instantly licensed to freeze the blockchain nodes processing the illicit transaction.
Emergency retainer fees and emergency software licensing costs transferred via cryptocurrency.
ASIC Hardware Recovery
@asichardware
Targets miners and users locked out of complex hardware wallets by claiming to possess proprietary brute-force decryption technologies. Victims are instructed to ship physical devices to a drop location or pay for remote software deployment.
Physical surrender of hardware wallets and upfront payments for fabricated cryptographic decryption services.
Funds Recovery / Funds-Recovery.co.uk
funds-recovery.co.uk, funds-recovery.org, fundsback-law.com, fundspayback.com, fundsreversal.com
Deploys optimized clone websites to dominate search engine results. They project a massive corporate presence and display fabricated case studies, insisting on being paid an administrative fee before any forensic services are rendered, then delivering zero functional output.
Upfront transaction charges, initial consultation fees, and administrative processing levies via bank transfer or cryptocurrency.
RetrievalXpert
retrievalxpert.com
Artificially inflates its reputation by purchasing fabricated Trustpilot reviews to create a false consensus of legitimacy. They use a phased extortion model, holding critical tracing reports hostage until the victim pays a series of increasingly expensive secondary invoices.
Initial investigative deposits followed by cascading, sequential invoices for critical reports and data extraction.
RetrieveIT / Retrieveassist Inc
retrieve-it.com
Proactively infiltrates comment sections of crypto news articles and forums using automated bots to message victims. They claim exclusive backdoor access to reverse blockchain transactions, demanding compensation to license the required software.
Cryptocurrency transfers explicitly designated for software licensing, server time, or proprietary tracing tools.
Paybackltd.live Impersonators
maria.acosta@paybackltd.live, kayla.romero@paybackltd.live
Utilizes sophisticated email spoofing to impersonate the personnel of a competing recovery room scam. They conduct spear-phishing campaigns claiming a previous recovery attempt failed due to a clerical error and that an expedited process can be initiated for a fee.
Expedited processing fees and clerical correction penalties transferred via cryptocurrency.
911 Cyber Toolz
@911_cybertoolz
Functions as a fabricated arms dealer within encrypted messaging ecosystems, offering to sell proprietary hacking tools for victims to execute recovery themselves. The provided software is either non-functional or malware designed to harvest remaining digital assets.
Cryptocurrency payments for the purchase of fabricated hacking software and malware-infected toolkits.
Anna Miller LLC
@annamiller_llc
Operates as the secondary phase of long-term pig butchering operations. Weeks after a loss, the same syndicate re-engages the victim under this persona, leveraging an empathetic communication style to extract final remaining capital by demanding legal retainers to initiate recovery.
Legal retainers and processing fees explicitly targeting victims of prior pig butchering and romance scams.
Dark Cybersecurity Expert
@darkcypersecurity_expert
Cultivates a mystique of illegality to target victims believing their funds were lost to sophisticated hackers. They offer to execute illegal cyber-attacks against the scammers, requiring payment via complex, multi-hop transfers to fund the fabricated operations.
Untraceable cryptocurrency transfers to fund illegal offensive cyber operations and retaliatory hacks.
Knight Hackzz
@KNIGTHACKZZ
Targets victims locked out of digital wallets due to forgotten passwords. They falsely claim to possess distributed supercomputing clusters capable of brute-forcing modern cryptographic standards, demanding upfront payment to rent server time and continually requesting additional funds.
Cryptocurrency payments designated for the renting of supercomputer server time and computational processing power.
Team Mike Cyberguard
@TeamMikecyberguard
Operates as a boutique cybersecurity consultancy targeting high-net-worth individuals. They utilize deepfake technology and extensive voice calls to project legitimacy, demanding exorbitant upfront retainers to initiate global blockchain investigations.
Exorbitant, five-figure upfront retainers and concierge-level consulting fees transferred via cryptocurrency or offshore wire.
World Global Tech
@worldglobaltech
Executes a corporate spoofing operation on social media, impersonating a multinational technology conglomerate. They offer to leverage fabricated corporate influence to force collapsed exchanges to release frozen funds, demanding a corporate onboarding fee and administrative charges.
Corporate onboarding fees, administrative integration charges, and priority processing levies.
Akin
akin.com.co
Operates a recovery room fraud by contacting prior investment fraud victims via phone or email, offering to secure compensation for lost assets by requesting administrative or legal fees in advance.
Upfront fees disguised as administrative costs, legal expenses, or taxes.
Bitcity
bitcity.cc, bitcity.ac
Reaches out to victims of prior scams and promises fund recovery. They exploit victims' vulnerabilities by demanding either upfront payments for fictitious legal costs or by offering free services that require victims to grant remote desktop access, allowing the installation of spyware.
Fictitious upfront fees or access to victims' computers via remote desktop applications.
Concord Services
concord-services.org
Contacts individuals previously targeted by cryptocurrency and investment frauds. The fraudsters falsely promise to recover lost assets to persuade victims to pay advance fees or download spyware on their devices under the guise of technical assistance.
Advance payments for fictitious taxes or the surrender of device control to spyware.
Fiscor
fiscor.org
Targets individuals featured on "suckers lists" who have already lost capital. The scammers present themselves as a legitimate recovery service and extract further capital by convincing the victim that mandatory administrative fees must be cleared before the repatriation of funds.
Fictitious administrative costs, legal fees, or taxes.
Krypton
krpton.bz, krypton.so, krypton.sx, krypton.ec
Functions as a recovery room scam manipulating victims with the promise of returning lost digital assets. They insist that victims must pay an upfront fee to cover fabricated legal or tax expenses prior to any asset recovery taking place.
Fictitious upfront payments for administrative or legal costs.
Anatomy of a Recovery Room Scam
My investigations consistently reveal a rigid, predictable script used by these syndicates. You must recognize these phases immediately.
- The Initial Breach: You receive an unsolicited WhatsApp message, email, or phone call. The sender claims to represent a blockchain forensics agency or a specialized legal group.
- The Fabricated Proof: They present you with forged blockchain analytics reports or fake court documents. These documents often feature stolen government logos and fake regulatory stamps.
- The Trapdoor: They state your funds are sitting in a secured wallet or a foreign banking portal. They will require you to create an account on a specific platform to receive the money. This platform is a phishing site designed to steal your remaining assets and your identity.
- The Advance Fee: They demand an upfront payment. They will call it a legal retainer, a smart contract deployment fee, or a localized tax. They will demand this payment in cryptocurrency or prepaid gift cards.
Technical Indicators of a Fake Legal Firm
Real attorneys do not operate like shadow brokers. If you are communicating with someone claiming to be a lawyer, put them through this stress test.
- Communication Channels: Legitimate law firms do not initiate cold contact regarding your stolen crypto via WhatsApp or Telegram. If your lawyer refuses to conduct a live video verification call from their registered corporate office, you are speaking to a phantom.
- Payment Methods: No valid legal practice accepts retainers in the form of Bitcoin, Tether, or retail gift cards. If they ask for untraceable assets, they are criminals.
- Domain Age and Registration: Fake law firm websites are usually less than six months old. They use privacy guards to hide the domain registrant and host their servers in offshore jurisdictions.
- Phantom Partnerships: They falsely claim to be official partners with agencies like the Consumer Financial Protection Bureau or the FBI. Government agencies do not partner with private recovery firms.
Legitimate Legal Counsel vs. Fraudulent Recovery Syndicate
| Indicator | Legitimate Law Firm | Fake Recovery Agent |
| Contact Method | You initiate contact through official channels. | Unsolicited outreach via social media or encrypted messaging apps. |
| Payment Structure | Traditional bank wires to registered trust accounts. | Cryptocurrency transfers to unverified wallets. |
| Guarantees | No ethical lawyer guarantees a specific financial outcome. | Promises a 100 percent guaranteed return of funds. |
| Licensing | Verifiable through the state or national bar association directory. | Provides fake digital certificates or clones a real attorney profile. |
The Global Database of Known Recovery Scam Tactics
Fraud networks constantly evolve. Below is the active threat matrix my team tracks globally.
- The Government Impersonator: Scammers spoof the official FBI IC3 website or use email addresses ending in generic domains to impersonate federal agents. They claim your funds were seized in an international raid and you must pay a processing fee to claim your share.
- The Fake Hacker for Hire: You will find these operatives in the comment sections of articles about scams or on public forums. They boast about a specific hacker who magically recovered their money. These are fake accounts controlled by the scammers themselves.
- The Liquidity Pool Trap: They instruct you to connect your digital wallet to a decentralized finance platform to receive your refunded tokens. Approving the smart contract gives them total authorization to drain every asset remaining in your wallet.
Immediate Action Protocol for Targeted Victims
If you are currently communicating with a recovery agent, stop immediately. Cut all contact. Do not send another transaction.
Follow this exact protocol to secure your remaining assets.
- Lock Down Your Infrastructure: Disconnect your compromised devices from the internet. Move any remaining digital assets to a brand new cold storage hardware wallet.
- Preserve the Evidence: Take high-resolution screenshots of every message, transaction hash, and fake legal document. Do not delete the chat history. Investigators need the metadata to map their network.
- Report to Official Authorities: File a report directly with the FBI Internet Crime Complaint Center by manually typing the official web address into your browser. Do not use search engines to find the agency. Scammers purchase sponsored ads to redirect you to cloned reporting portals.
- Ignore the Threats: When you stop paying, the fake lawyers will pivot to intimidation. They will threaten you with arrest, tax evasion charges, or civil lawsuits. These are empty threats from cowards hiding behind encrypted connections.
Have you been scammed?
If you have lost money or suspect a website is fake, report it to us immediately to warn others.
REPORT A SCAM NOW