Social Engineering Scam Drains $330M in Bitcoin from U.S. Senior—Because Apparently, Crypto Security Is Still Optional
Another day, another crypto heist—this time, hackers played the long game with a social engineering attack targeting a wealthy retiree. The $330M haul proves even Bitcoin’s ’unhackable’ reputation crumbles when human error enters the chat.
How it happened: The attackers bypassed 2FA, cloned voices, and exploited trust—old-school cons meet new-school digital gold. Meanwhile, Wall Street still thinks a 0.5% FDIC-insured savings account is ’risk management.’
Bottom line: Crypto’s future is bright, but until users treat private keys like nuclear codes, these headlines won’t stop. The irony? The victim probably still believes in ’self-custody.’

Further leads have now surfaced. ZachXBT pointed to individuals allegedly connected to a fraudulent call center operation, including a suspect using the alias “X,” reportedly operating from the United Kingdom and believed to be of Somali origin. Another accomplice, known as “W0rk,” is thought to have assisted in the scheme. Both suspects have reportedly erased their online presence in the days following the theft.
While some of the stolen Bitcoin remains unaccounted for, the investigation is ongoing, and digital sleuths continue to track wallet movements and connections in hopes of identifying additional actors involved in the heist.