Share only public or non-sensitive details. Do not share passwords, seed phrases, or private keys.
Wallet address and/or transaction hash is usually enough to begin.
Often yes, depending on the route. We document each step with on-chain evidence.
We can document exposure; direct exchange actions typically require the victim or legal process.