BTCC / BTCC Square / Cryptonews /
Crypto Nightmare: How a Hardware Wallet Scam Drained $282M in Bitcoin and Litecoin

Crypto Nightmare: How a Hardware Wallet Scam Drained $282M in Bitcoin and Litecoin

Author:
Cryptonews
Published:
2026-01-16 18:58:21
13
3

Another day, another nine-figure crypto heist—only this time, the vault wasn't a centralized exchange, but a supposedly 'unhackable' hardware wallet.

The Illusion of Security

Hardware wallets market themselves as Fort Knox for your digital gold. Plug it in, store your keys offline, sleep soundly. This narrative just took a $282 million hit. The scam didn't brute-force encryption; it bypassed human vigilance. A slick website, convincing packaging, maybe a fake firmware update—the oldest tricks in the book, repackaged for digital asset holders.

Follow the (Missing) Money

The mechanics are chillingly simple. Pre-seeded wallets, phishing kits disguised as legitimate software, or physical tampering intercept keys before they're ever generated. Once the private keys are compromised, the assets flow out to mixer services and offshore exchanges faster than you can say 'not your keys, not your coins.' The trail goes cold, leaving a victim holding a very expensive, very empty USB stick.

A Brutal Wake-Up Call

This isn't a flaw in blockchain technology; it's a failure in the last mile of security: the user. It highlights the uncomfortable truth that self-custody demands a level of operational security most people—even those with millions on the line—simply don't possess. The traditional finance crowd will, of course, use this as fodder to preach about the 'safety' of regulated custodians—conveniently ignoring their own long history of mismanagement and bailouts.

The $282 million lesson? Your hardware wallet is only as secure as your ability to spot a con. In the relentless arms race between crypto security and human greed, greed keeps finding a way.

Record-Breaking Theft Exceeds Previous Social Engineering Attack

The incident eclipses the August 2024 case involving Genesis creditor theft, where threat actors Greavys, Wiz, and Box stole $243 million through an elaborate social engineering operation.

That attack involved spoofed calls from Google and Gemini support representatives who convinced the victim to reset two-factor authentication and share screen access via AnyDesk, ultimately exposing private keys from bitcoin Core.

ZachXBT’s investigation into the August case led to multiple arrests and the freezing of millions in assets.

Box and Greavys were arrested in Miami and Los Angeles, while Wiz was later apprehended by US Marshals.

Twelve people were eventually charged in connection with the $243 million theft, with a superseding indictment confirming the arrest of Danny Zulfiqar Khan in Dubai.

The scale of the latest $282 million loss demonstrates how social engineering tactics continue to evolve and exploit victims despite increased awareness and security measures across the crypto industry.

1/ An investigation into how Greavys (Malone Iam), Wiz (Veer Chetal), and Box (Jeandiel Serrano) stole $243M from a single person last month in a highly sophisticated social engineering attack and my efforts which have helped lead to multiple arrests and millions frozen. pic.twitter.com/dcY1e9xsPd

— ZachXBT (@zachxbt) September 19, 2024

Persistent Threats Target Crypto Users Across Multiple Vectors

Social engineering attacks have become the dominant threat vector in crypto theft, with scammers increasingly impersonating customer support representatives from major platforms.

Brooklyn resident Ronald Spektor was also recently charged with allegedly stealing $16 million from roughly 100 Coinbase users by posing as company employees and using panic tactics to force quick decisions.

The infamous North Korean hacker has also resurfaced with new social engineering tactics.

“They message everyone with prior conversation history,” MetaMask security researcher Taylor Monahan explained, referring to North Korean hackers using fake Zoom tactics.

“DPRK threat actors are still rekting way too many of you via their fake Zoom / fake Teams meets.“

North Korean cybercriminals have stolen over $300 million using fake video conferencing tactics that install malware to exfiltrate passwords and private keys.

Attackers guide victims to Zoom links that point to recorded videos of known contacts, then send malicious “” files disguised as software updates that deploy Remote Access Trojans.

Despite an overall 60% decline in December exploit losses to $76 million, according to PeckShield, address poisoning scams and private key leaks remain significant threats.

One December victim lost $50 million after mistakenly copying a fraudulent address that visually mimicked their intended destination, while another breach involving a multi-signature wallet key leak resulted in $27.3 million in losses.

Industry data shows crypto theft reached $3.4 billion between January and early December 2025, with Americans losing a record $9.3 billion to crypto-related crimes in 2024.

Investment fraud accounted for $5.7 billion in losses, with victims over 60 reporting the highest individual losses at $2.8 billion.

Security experts keep emphasizing that technical solutions alone cannot prevent social engineering attacks.

🔒How are scammers stealing billions in crypto? We sat down with @CrystalPlatform CEO Navin Gupta as he breaks down the psychology, AI-powered tactics, and the #1 mindset shift that could prevent most fraud.#CryptoScam #Deepfakehttps://t.co/9WQQvGSuED

— Cryptonews.com (@cryptonews) June 24, 2025

“Assume every unsolicited message is a potential attack,” said Navin Gupta, CEO of blockchain analytics platform Crystal, in an interview with Cryptonews. “That mental shift alone filters out 80% of threat vectors.“

Experts recommend verifying every character of destination addresses before sending funds, avoiding SMS-based two-factor authentication in favor of hardware security keys, and never responding to unsolicited messages claiming account compromises.

The irreversibility of crypto transactions means victims typically cannot recover stolen funds once attackers gain access to private keys or trick users into authorizing transfers.

|Square

Get the BTCC app to start your crypto journey

Get started today Scan to join our 100M+ users

All articles reposted on this platform are sourced from public networks and are intended solely for the purpose of disseminating industry information. They do not represent any official stance of BTCC. All intellectual property rights belong to their original authors. If you believe any content infringes upon your rights or is suspected of copyright violation, please contact us at [email protected]. We will address the matter promptly and in accordance with applicable laws.BTCC makes no explicit or implied warranties regarding the accuracy, timeliness, or completeness of the republished information and assumes no direct or indirect liability for any consequences arising from reliance on such content. All materials are provided for industry research reference only and shall not be construed as investment, legal, or business advice. BTCC bears no legal responsibility for any actions taken based on the content provided herein.