A major crypto theft has sent shockwaves through the industry, with $330 million worth of Bitcoin (BTC) stolen. Experts say this was a social engineering attack and not a technical hack.
Investigations led by blockchain analyst ZachXBT suggest the victim was an elderly US citizen who was manipulated into granting access to their crypto wallet. On April 28, 2025, ZachXBT detected a suspicious transfer of 3,520 BTC, worth $330.7 million.
The stolen BTC was quickly laundered through more than six instant exchanges and converted into the privacy-oriented cryptocurrency Monero (XMR). Onchain analysis shows the victim had held over 3,000 BTC since 2017, with no previous record of substantial transactions.
Unlike typical cyberattacks that exploit software vulnerabilities, this incident relied on psychological manipulation. Scammers posed as trusted entities, slowly building credibility before persuading the victim over the phone to share sensitive credentials. This is the hallmark of social engineering — exploiting human trust rather than system weaknesses.
After the Bitcoin theft, the attacker swiftly began laundering the funds using a peel chain method, splitting the stolen amount into smaller, harder-to-trace portions. The funds were routed through hundreds of wallets and scores of exchanges or payment services, including Binance.
A significant amount was laundered via instant exchanges and mixers, further obscuring its trail. A large portion of BTC was quickly converted into XMR, a privacy coin with untraceable architecture, causing its price to briefly surge 50% to $339.
The attackers used pre-registered accounts across exchanges and OTC desks, which suggests careful planning. Some BTC was even bridged to Ethereum and deposited into various DeFi platforms, making forensic tracing more difficult. Investigators have since notified exchanges in hopes of freezing any accessible funds.
While attribution remains unclear, analysts like ZachXBT ruled out North Korean Lazarus Group involvement, pointing instead to skilled independent hackers. Hacken traced $284 million of BTC, now diluted to $60 million after extensive peeling and redistribution through obscure platforms.
Binance and ZachXBT were able to freeze about $7 million of the stolen funds. However, the bulk of the stolen Bitcoin remains missing. The suspects include an individual using the alias “X,” allegedly operating from the UK and believed to be of Somali origin, and another accomplice known as “W0rk.” Both have reportedly scrubbed their digital footprints since the theft.
This case underscores that crypto security isn’t just about strong passwords and hardware wallets but also about recognizing psychological threats. As the investigation continues, the community is reminded that even the most secure technologies are vulnerable to human fallibility.
What is social engineering in crypto crimes, and what psychological tactics are involved?
Social engineering is a manipulative technique used by cybercriminals to exploit human psychology. They trick you into revealing confidential information to access your wallets and perform actions that compromise security.
Unlike traditional hacking, which targets system vulnerabilities, social engineering thrives on human weaknesses such as trust, fear, urgency and curiosity. It leverages psychological tactics to manipulate victims.
Here are common tactics used by criminals to convince their victims and execute their plans:
These psychological strategies are a major threat to users in the crypto space, where irreversible transactions and often decentralized platforms make it very difficult for the victims to regain the lost funds.
Did you know? Crypto drainers-as-a-service (DaaS) offers complete social engineering toolkits, including fake DEX websites, wallet prompts and Telegram support bots for anyone to run phishing campaigns, no coding required.
Why crypto users are vulnerable to social engineering attacks
Crypto users are particularly susceptible to social engineering attacks due to a combination of technological and behavioral issues. These include irreversibility of transactions, lack of recourse, high-value targets and overreliance on trust.
Together, these factors make crypto users highly susceptible to human-centric attacks, more than users of traditional finance.
Did you know? Unlike traditional hacks, social engineering doesn’t target code; it targets people. It is low-tech but high-reward, exploiting trust, emotion and routine to steal assets in seconds.
Common crypto-specific social engineering tactics
Fraudsters use customized social engineering strategies to trick and exploit unsuspecting crypto users. To protect yourself from these scamsters, you must be well aware of their various tactics. From phishing scams and impersonation attacks to malicious downloads, you must have a broad idea of how these methods work.
Here are some prevalent tactics that fraudsters use:
Understanding these tactics is crucial for crypto users to safeguard their assets. Vigilance, verification of sources and skepticism toward unsolicited offers can mitigate the risks posed by social engineering attacks.
Case studies of crypto social engineering attacks
There have been several scams in the crypto domain exploiting human weaknesses. Fraudsters used clever tactics like phishing and impersonation to steal digital assets.
These case studies provide key insights to boost awareness and prevent losses.
Ronin Network attackIn March 2022, the Ronin Network, which powers Axie Infinity, suffered a $600 million exploit. Investigations revealed the hack stemmed from a social engineering attack.
Lazarus Group posed as a fake company and sent a job offer PDF to a senior engineer with Ronin Network. When the file was opened, it installed spyware that compromised validator nodes. This breach allowed attackers to authorize massive withdrawals that went undetected for days.
The Lazarus Group, a North Korea-linked cybercrime unit, has been using fake job offers to target crypto employees. In one such case, they created fake recruiter profiles on LinkedIn and sent tailored job offers to engineers at blockchain companies.
Engineers clicking on the job documents suffered malware infections. Fraudsters getting access to the wallets culminated in them stealing digital assets worth millions.
Discord phishing scamsDiscord has become a hotspot for NFT scams through social engineering. Scamsters impersonate project admins or moderators and post fake minting links in announcements.
In 2022, the popular NFT project Bored Ape Yacht Club was targeted this way. Scammers posted a fake airdrop link in the official Discord, tricking users into connecting their wallets. Once authorized, the attackers drained the NFTs and tokens, resulting in hundreds of thousands in losses.
Did you know? Many social engineering attacks happen during project launches or major announcements. Hackers time their scams for peak traffic, using fake links that mimic official posts to steal funds from unsuspecting users.
How to protect yourself from social engineering attacks in crypto
Crypto users face an increasing wave of social engineering attacks, from fake job offers to Discord phishing links. To stay secure, you and the crypto community need to take proactive steps to build awareness and deter attacks:
Several types of aid are available to elderly victims of cryptocurrency hacks to help them recover their possessions. Here is an insight into various options at hand.
Victims can file a formal complaint with law enforcement agencies, such as cybercrime units and local police, who can carry out investigations. Many countries have financial fraud helplines that provide victims with counsel. They may discuss the fraudulent act with their lawyer, who would help them understand their rights and legal support available.
Nonprofits and advocacy groups in the US, such as the American Association of Retired Persons (AARP), provide support to senior victims of scams. Crypto exchanges may assist victims by freezing suspicious transactions if alerted early. They may also contact blockchain analytics firms or crypto recovery services to assist in tracing stolen assets, though positive outcomes aren’t assured.
Legal aid organizations can help victims navigate the complex processes. It is helpful for older people to involve family members and caregivers to assist them in the aftermath of an attack.
All Rights Reserved. Copyright , Central Coast Communications, Inc.