What is the FBI IC3?
The Internet Crime Complaint Center (IC3) is a division of the FBI dedicated to investigating online crimes, including cryptocurrency fraud. IC3 collects structured reports from victims and shares information with law enforcement agencies for investigation and potential prosecution.
Learn more about IC3: https://www.ic3.gov
When to Report Cryptocurrency Fraud to IC3
You should report immediately if you experience:
• Crypto wallet hacks or theft
• Scams on exchanges, wallets, or DeFi platforms
• Fraudulent ICOs or token sales
• Phishing attacks targeting crypto credentials
• Social engineering or impersonation schemes affecting cryptocurrency
Early reporting increases the effectiveness of investigations and can support legal or forensic recovery.

Step 1: Gather All Relevant Information
Before submitting an IC3 report to report cryptocurrency fraud, collect all relevant documentation:
• Date, time, and platform of the incident
• Cryptocurrency type(s) and amount lost (USD equivalent)
• Wallet addresses, transaction hashes, smart contract links
• Exchange accounts involved
• Counterparty details (email, social media, platform account)
• Communication records (screenshots, emails, chat logs)
• Any prior reporting or recovery attempts
Step 2: Access the IC3 Portal
Go to https://www.ic3.gov and click “File a Complaint”. The portal is available 24/7 for individuals, businesses, and institutions.
Step 3: Complete the Complaint Form
The IC3 form requests:
• Personal Information: Name, contact details, and location
• Incident Details: Type of crime, date/time, and platform
• Financial Information: Cryptocurrency type, amount, wallet/exchange details
• Suspect Information: Names, accounts, or contact info if known
• Supporting Documentation: Transaction records, screenshots, communications
Ensure that you include blockchain transaction hashes and explorer links to enhance the strength of your report.
Step 4: Submit Your Report
Once you have completed your IC3 report, review it carefully, submit it and save it as a PDF to ensure you have a secure, shareable record. Here are instructions for each platform:
Mac
After submitting the IC3 report in your browser, go to File → Print (or press Command + P). In the print dialogue, click the PDF button at the bottom left and select Save as PDF. Choose the destination folder, name the file, and click Save.
Windows
After completing the report in your browser, press Ctrl + P to open the print dialogue. Under Printer, select Microsoft Print to PDF. Click Print, then choose the location, name the file, and click Save.
iOS (iPhone/iPad)
After submitting the report in Safari, tap the Share icon (square with an arrow pointing up). Select Print, then pinch outwards on the print preview to generate a PDF. Tap the Share icon again, select Save to Files, choose a folder, and tap Save.
Android
After submitting the report in your browser, tap the Menu (three dots) and select Print. Choose Save as PDF as the printer, then tap the PDF icon or Save. Select the folder where you want to save the file and tap Save.
This will create a PDF copy of your IC3 report that can be securely stored and shared with relevant parties if needed.
You will also receive a complaint ID via email. Keep this for follow-up.
Step 5: Follow Up with IC3
• Monitor email updates using your complaint ID
• Submit new evidence or developments promptly
• Maintain blockchain transaction and wallet activity logs
IC3 does not provide direct restitution; however, reporting supports investigations and facilitates legal recovery.
Step 6: Consider Professional Legal and Forensic Support
Crypto Legal offers specialised services for cryptocurrency fraud cases:
• Tracing stolen cryptocurrency across wallets and exchanges
• Coordinating with law enforcement and international agencies
• Preparing forensic reports suitable for IC3 and legal proceedings
Professional support increases the likelihood of recovery and ensures evidence is admissible.
Cryptocurrency-Focused Cybercrimes Handled by IC3
Phishing Scams Targeting Crypto Users: Impersonation of wallets, exchanges, or DeFi platforms to steal credentials or private keys.
Cryptocurrency Wallet and Exchange Account Takeovers: Unauthorised access via stolen credentials, malware, or social engineering.
Ransomware Attacks: Encryption of crypto-related devices or data with payment demands in digital assets.
Business Email Compromise (BEC) Involving Crypto: Executive impersonation to authorise crypto transfers or share private keys.
Cryptocurrency-Related Sextortion: Coercion requiring cryptocurrency payment, often enhanced by AI-generated threats.
Data Breach and Crypto Exchange Extortion: Unauthorised access to crypto exchange data, with ransom demands in cryptocurrency.
Social Engineering and Crypto Fraud: Manipulative tactics to trick victims into revealing private keys, sending crypto, or authorising transactions.
Crypto-Specific FAQ
Q: How do I report a crypto hack to the FBI?
A: Submit a report at https://www.ic3.gov including wallet addresses, transaction hashes, exchange accounts, and communications.
Q: Does IC3 recover stolen cryptocurrency?
A: IC3 does not recover funds. Reporting assists law enforcement and supports legal or forensic recovery.
Q: What crypto crimes can I report to IC3?
A: Wallet theft, exchange hacks, phishing scams, ransomware attacks, BEC fraud, crypto sextortion, and data breach extortion.
Q: What information is needed?
A: Transaction details, wallet/exchange accounts, cryptocurrency type and amount lost, communications, and any prior recovery attempts.
Q: How can I maximise recovery chances?
A: Report promptly, preserve blockchain transaction records, and engage professional legal and forensic support.
Conclusion
If you have been a victim of cryptocurrency fraud or theft, our team at Crypto Legal can provide specialised blockchain forensic services, asset tracing, and legal reporting to support IC3 investigations.
You can contact Crypto Legal at: info@cryptolegal.uk
