Over $282M Stolen in Bitcoin and Litecoin via Social Engineering Attack

iconTheCryptoBasic
Share
Share IconShare IconShare IconShare IconShare IconShare IconCopy
AI summary iconSummary

expand icon
A Bitcoin news alert: On January 10, 2026, a crypto investor lost over $282 million in Bitcoin and Litecoin after a social engineering scam. The attacker bypassed hardware wallet security and converted the funds via THORChain into ETH, XRP, and LTC. A portion was swapped into Monero, pushing its price up 70% in four days. Investigators linked 1,459 BTC and 2.05 million LTC to three wallets, with much still under attacker control. The incident may impact the fear and greed index as traders reassess risk.

A cryptocurrency investor has lost more than $282 million in Bitcoin and Litecoin after attackers manipulated the victim into approving fraudulent transactions.

Notably, the incident, which occurred on January 10, 2026, at approximately 11:00 PM UTC, ranks among the largest personal crypto thefts ever documented. It underscores how social engineering continues to bypass even sophisticated self-custody protections, including hardware wallets.

Key Points

  • Over $282 million stolen in Bitcoin and Litecoin from one investor.
  • Attack method: Social engineering with user-approved transactions
  • 928.7 BTC swapped via THORChain into ETH, XRP, and LTC
  • Monero price rose approximately 70% within four days after conversions
  • Three wallets identified receiving 1,459 BTC and 2.05 million LTC

How the Scam Unfolded

Blockchain investigator ZackXBT reported that the victim held funds in a hardware wallet at the time of the attack. However, the wallet’s security features did not prevent the loss. The attackers relied on psychological manipulation rather than technical exploits.

- Advertisement -

Through deception, the victim was persuaded to approve transactions that appeared legitimate. Once confirmed, the transfers allowed the attackers to drain the wallet directly. Importantly, no software vulnerability or hardware flaw was identified during the investigation.

Movement and Conversion of Stolen Funds

Immediately after gaining control of the assets, the attackers moved quickly to obscure their trail. Specifically, significant amounts of Bitcoin and Litecoin were exchanged for Monero through instant swap services, a common tactic because of Monero’s strong privacy features.

This activity had immediate market effects. Since Monero has lower liquidity than Bitcoin, the sudden inflow drove its price up by roughly 70% over the following four days, according to ZackXBT.

Use of THORChain for Cross-Chain Transfers

In parallel, the attackers leveraged THORChain, a decentralized cross-chain protocol, to move Bitcoin across multiple networks. ZackXBT traced transactions that bridged Bitcoin into the Ethereum, Ripple, and Litecoin ecosystems.

Because THORChain operates without identity verification, investigators say it is increasingly attractive for laundering illicit funds. Consequently, this cross-chain activity significantly complicated efforts to trace the stolen assets.

ZackXBT identified several major swaps, including the conversion of 928.7 BTC, worth about $78 million, into 19,631 ETH, 3.15 million XRP, and 77,285 LTC.

Wallets Connected to the Theft

ZackXBT linked the stolen assets to three main wallet addresses: two Bitcoin wallets and one Litecoin wallet. Collectively, these addresses received 1,459 BTC and 2.05 million LTC.

As of this writing, a substantial portion of the Bitcoin remains in a wallet believed to be under the attackers’ control. The lack of recent movement suggests a calculated pause, leading investigators to speculate that the perpetrators may be waiting for public scrutiny to diminish before resuming activity.

Comparison With Earlier Crypto Thefts

The incident surpasses a high-profile social engineering theft from August 2024 involving a Genesis creditor, in which $243 million was stolen.

In that case, attackers impersonated support personnel, gained remote access, and ultimately extracted private keys. ZackXBT’s investigation contributed to arrests, asset freezes, and multiple criminal charges.

While both cases relied on manipulation rather than exploits, the latest theft reflects a more sophisticated laundering strategy. Specifically, the extensive use of cross-chain swaps and privacy-focused assets marks a notable escalation in these practices.

Broader Implications

The case highlights a persistent vulnerability in cryptocurrency security: human trust. Indeed, even the strongest self-custody tools can be undermined when users are deceived into approving malicious transactions.

As ZackXBT’s findings demonstrate, once stolen assets are routed through Monero and cross-chain protocols, recovery becomes exceedingly difficult. Overall, the incident illustrates how crypto crime continues to evolve, adapting to increased user awareness and stronger technical defenses.

DisClamier: This content is informational and should not be considered financial advice. The views expressed in this article may include the author's personal opinions and do not reflect The Crypto Basic opinion. Readers are encouraged to do thorough research before making any investment decisions. The Crypto Basic is not responsible for any financial losses.

Disclaimer: The information on this page may have been obtained from third parties and does not necessarily reflect the views or opinions of KuCoin. This content is provided for general informational purposes only, without any representation or warranty of any kind, nor shall it be construed as financial or investment advice. KuCoin shall not be liable for any errors or omissions, or for any outcomes resulting from the use of this information. Investments in digital assets can be risky. Please carefully evaluate the risks of a product and your risk tolerance based on your own financial circumstances. For more information, please refer to our Terms of Use and Risk Disclosure.