Market Cap: $3.1678T -3.780%
Volume(24h): $135.9315B 30.070%
  • Market Cap: $3.1678T -3.780%
  • Volume(24h): $135.9315B 30.070%
  • Fear & Greed Index:
  • Market Cap: $3.1678T -3.780%
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
Top News
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
bitcoin
bitcoin

$102145.347630 USD

-2.79%

ethereum
ethereum

$2433.100596 USD

-7.19%

tether
tether

$1.000331 USD

-0.01%

xrp
xrp

$2.108643 USD

-4.65%

bnb
bnb

$635.810177 USD

-4.54%

solana
solana

$146.177937 USD

-5.05%

usd-coin
usd-coin

$0.999828 USD

0.00%

tron
tron

$0.276248 USD

1.27%

dogecoin
dogecoin

$0.172078 USD

-9.59%

cardano
cardano

$0.629322 USD

-6.68%

hyperliquid
hyperliquid

$33.937667 USD

-4.46%

sui
sui

$2.969578 USD

-7.27%

chainlink
chainlink

$13.059499 USD

-6.18%

stellar
stellar

$0.259762 USD

-3.08%

unus-sed-leo
unus-sed-leo

$8.739283 USD

-2.20%

Cryptocurrency News Articles

The $330 million attack: A stark reminder of social engineering's power

May 20, 2025 at 04:05 pm

A major crypto theft has sent shockwaves through the industry, with $330 million worth of Bitcoin BTCUSD stolen. Experts say this was a social engineering attack and not a technical hack.

The $330 million attack: A stark reminder of social engineering's power

A massive crypto theft has seen $330 million stolen in Bitcoin, according to reports. Experts say this was a social engineering attack rather than a technical hack.

According to investigations led by blockchain analyst ZachXBT, the victim was an elderly US citizen who was manipulated into granting access to their crypto wallet. On April 28, ZachXBT detected a suspicious transfer of 3,520 BTC, valued at $330.7 million.

The stolen BTC was quickly laundered through more than six instant exchanges and converted into the privacy-oriented cryptocurrency Monero (XMR). Onchain analysis shows the victim had held over 3,000 BTC since 2017, with no previous record of substantial transactions.

Unlike typical cyberattacks that exploit software vulnerabilities, this incident relied on psychological manipulation. Scammers posed as trusted entities, slowly building credibility before persuading the victim over the phone to share sensitive credentials. This is the hallmark of social engineering — exploiting human trust rather than system weaknesses.

After the Bitcoin theft, the attacker swiftly began laundering the funds using a peel chain method, splitting the stolen amount into smaller, harder-to-trace portions. The funds were routed through hundreds of wallets and scores of exchanges or payment services, including Binance.

A significant amount was laundered via instant exchanges and mixers, further obscuring its trail. A large portion of BTC was quickly converted into XMR, a privacy coin with untraceable architecture, causing its price to briefly surge 50% to $339.

The attackers used pre-registered accounts across exchanges and OTC desks, which suggests careful planning. Some BTC was even bridged to Ethereum and deposited into various DeFi platforms, making forensic tracing more difficult. Investigators have since notified exchanges in hopes of freezing any accessible funds.

While attribution remains unclear, analysts like ZachXBT ruled out North Korean Lazarus Group involvement, pointing instead to skilled independent hackers. Hacken traced $284 million of BTC, now diluted to $60 million after extensive peeling and redistribution through obscure platforms.

Binance and ZachXBT were able to freeze about $7 million of the stolen funds. However, the bulk of the stolen Bitcoin remains missing. The suspects include an individual using the alias “X,” allegedly operating from the UK and believed to be of Somali origin, and another accomplice known as “W0rk.” Both have reportedly scrubbed their digital footprints since the theft.

This case underscores that crypto security isn’t just about strong passwords and hardware wallets but also recognizing psychological threats. As the investigation continues, the community is reminded that even the most secure technologies are vulnerable to human fallibility.

Social engineering is a manipulative technique used by cybercriminals to exploit human psychology. They trick you into revealing confidential information to access your wallets and perform actions that compromise security.

Unlike traditional hacking, which targets system vulnerabilities, social engineering thrives on human weaknesses such as trust, fear, urgency and curiosity. It leverages psychological tactics to manipulate victims.

Here are common tactics used by criminals to convince their victims and execute their plans:

These psychological strategies are a major threat to users in the crypto space, where irreversible transactions and often decentralized platforms make it very difficult for the victims to regain the lost funds.

Did you know? Crypto drainers-as-a-service (DaaS) offers complete social engineering toolkits, including fake DEX websites, wallet prompts and Telegram support bots for anyone to run phishing campaigns, no coding required.

Crypto users are particularly susceptible to social engineering attacks due to a combination of technological and behavioral issues. These include irreversibility of transactions, lack of recourse, high-value targets and overreliance on trust.

Together, these factors make crypto users highly susceptible to human-centric attacks, more than users of traditional finance.

Did you know? Unlike traditional hacks, social engineering doesn’t target code; it targets people. It is low-tech but high-reward, exploiting trust, emotion and routine to steal assets in seconds.

Fraudsters use customized social engineering strategies to trick and exploit unsuspecting crypto users. To protect yourself from these scamsters, you must be well aware of their various tactics.

You need to have a broad idea of how these methods work, including phishing scams, impersonation attacks and malicious downloads.

Here are some prevalent tactics that fraudsters use:

Understanding these tactics is crucial for crypto users to safeguard their assets. Vigilance, verification of sources and skepticism toward unsolicited offers can mitigate the risks posed by social engineering attacks.

There have been several scams in the crypto domain exploiting human weaknesses. Fraudsters used clever tactics like phishing and impersonation to steal digital assets.

These case studies provide key insights to boost awareness and prevent losses.

Ronin Network attack

In March

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on Jun 07, 2025