The $330 million attack:
A stark reminder of social engineering’s power
A major crypto theft has sent shockwaves through the
industry, with $330 million worth of Bitcoin (BTC) stolen.
Experts say this was a
social engineering attack and not a technical
hack.
Investigations led by
blockchain analyst ZachXBT suggest the victim was an elderly US
citizen who was
manipulated into granting access to their crypto
wallet. On April 28, 2025, ZachXBT detected a suspicious
transfer of 3,520 BTC, worth $330.7 million.
The stolen BTC was quickly laundered through more than six
instant exchanges and converted into the privacy-oriented
cryptocurrency Monero (XMR). Onchain
analysis shows the victim had held over 3,000 BTC since 2017, with
no previous record of substantial transactions.
Unlike
typical cyberattacks that exploit software vulnerabilities,
this incident relied on psychological manipulation.
Scammers posed as trusted entities, slowly building credibility
before persuading the victim over the phone to share sensitive
credentials. This is the hallmark of social engineering —
exploiting human trust rather than system weaknesses.

Decoding the laundering
tactics after the attack
After the Bitcoin theft, the attacker swiftly began
laundering the funds using a peel chain method, splitting the
stolen amount into smaller, harder-to-trace portions. The funds
were routed through hundreds of wallets and scores of exchanges or
payment services, including Binance.
A significant amount was laundered via instant exchanges and
mixers, further obscuring its trail. A large portion of BTC was
quickly converted into XMR, a privacy coin with untraceable
architecture, causing its price to briefly surge 50% to $339.
The attackers used pre-registered accounts across exchanges and
OTC desks, which suggests careful planning. Some BTC was even
bridged to
Ethereum and deposited into various
DeFi platforms, making forensic tracing more difficult.
Investigators have since notified exchanges in hopes of freezing
any accessible funds.
While attribution remains unclear, analysts like ZachXBT ruled
out North Korean
Lazarus Group involvement, pointing instead to skilled
independent hackers. Hacken traced $284 million of BTC, now diluted
to $60 million after extensive peeling and redistribution through
obscure platforms.
Binance and ZachXBT were able to freeze about $7 million of the
stolen funds. However, the bulk of the stolen Bitcoin remains
missing. The suspects include an individual using the alias “X,”
allegedly operating from the UK and believed to be of Somali
origin, and another accomplice known as “W0rk.” Both have
reportedly scrubbed their digital footprints since the theft.
This case underscores that
crypto security isn’t just about strong passwords and
hardware wallets but also about recognizing psychological
threats. As the investigation continues, the community is reminded
that even the most secure technologies are vulnerable to human
fallibility.
What is social
engineering in crypto crimes, and what psychological tactics are
involved?
Social engineering is a manipulative technique used by
cybercriminals to exploit human psychology. They trick you into
revealing confidential information to access your wallets and
perform actions that compromise security.
Unlike traditional hacking, which targets system
vulnerabilities, social engineering thrives on human weaknesses
such as trust, fear, urgency and curiosity. It leverages
psychological tactics to manipulate victims.
Here are common tactics used by criminals to convince their
victims and execute their plans:
- Using fake authority: A common tactic
criminals use is authority, where attackers impersonate figures of
trust, such as law enforcement or tech support, to pressure victims
into revealing the information they want.
- Create urgency: Urgency is another tactic,
often used in
phishing emails or scam calls that demand immediate action to
prevent “loss” or claim a reward.
- Preying on the instinct of reciprocity:
Reciprocity involves playing on the instinct to return favors,
luring victims with gifts like fake
airdrops or rewards.
- Triggering impulsive actions: Scarcity drives
decisions by presenting fake limited-time offers, prompting
impulsive behavior.
- Riding herd mentality: Social proof, or the
herd mentality, is also common with fraudsters often claiming
others have already benefited, encouraging the victim to follow
suit.
These psychological strategies are a major threat to users in
the crypto space, where irreversible transactions and often
decentralized platforms make it very difficult for the victims
to regain the lost funds.
Did you know? Crypto drainers-as-a-service
(DaaS) offers complete social engineering toolkits, including fake
DEX websites, wallet prompts and Telegram support bots for anyone
to run phishing campaigns, no coding required.
Why crypto users are
vulnerable to social engineering attacks
Crypto users are particularly susceptible to social
engineering attacks due to a combination of technological and
behavioral issues. These include irreversibility of transactions,
lack of recourse, high-value targets and overreliance on
trust.
- Irreversibility of transactions: Once a crypto
transaction is confirmed, it is final. There is no central
authority or support team to reverse a mistaken transfer or a
fraudulent withdrawal. Social engineers exploit this by tricking
victims into sending funds or approving malicious wallet
permissions, well aware that recovery is virtually impossible.
- Anonymity and lack of recourse: DeFi thrives
on anonymity, which also empowers scammers. Attackers can hide
behind pseudonyms and fake profiles, often impersonating support
staff, influencers or developers. Victims have little to no legal
or institutional support after an incident, especially across
borders.
- High-value targets: Whales,
NFT collectors and DeFi project founders are frequent targets
of fraudulent activities due to the large sums they control. Social
engineers often tailor sophisticated scams, such as fake job
offers, investment pitches or urgent support calls to manipulate
these high-end users.
- Overreliance on trust in online communities:
Crypto culture emphasizes decentralization and peer collaboration,
but these can foster a false sense of confidence. Scammers exploit
this openness in Discord, Telegram and decentralized
autonomous organizations (DAOs) to gain credibility before
striking.
Together, these factors make crypto users highly susceptible to
human-centric attacks, more than users of traditional finance.
Did you know? Unlike traditional hacks,
social engineering doesn’t target code; it targets people. It is
low-tech but high-reward, exploiting trust, emotion and routine to
steal assets in seconds.
Common crypto-specific
social engineering tactics
Fraudsters use customized social engineering strategies to
trick and exploit unsuspecting crypto users. To protect yourself
from these scamsters, you must be well aware of their various
tactics. From phishing scams and impersonation attacks to malicious
downloads, you must have a broad idea of how these methods
work.
Here are some prevalent tactics that fraudsters use:
- Phishing scams: Attackers craft deceptive
emails or messages resembling those from established crypto
platforms, subtly pushing users to click on malicious links. These
links take users to counterfeit websites that mimic legitimate
crypto
exchanges or wallets, prompting users to input sensitive
information like
private keys or login credentials.
- Impersonation attacks: Scammers pose as
trusted figures or support staff on platforms like Discord and
Telegram. By mimicking official channels or personnel, they
convince users to divulge confidential information or perform
actions that compromise their wallets.
- Fake airdrops: Tactics involve enticing users
to connect their wallets to claim non-existent rewards. Users who
fall prey to these tactics often end up losing their assets.
- Malicious downloads: Users are lured with
promises of free tools or software stealthily loaded with malicious
code. Once downloaded, the malware shares confidential information
with its handlers.
- Honeytraps and fake job offers: Fraudsters
create alluring profiles or job postings targeting developers and
project founders. Once trust is established, they manipulate
victims into sharing sensitive data or granting access to secure
systems.
- Pretexting and quid pro quo: Attackers may
fabricate scenarios, such as offering exclusive investment
opportunities or lucrative rewards, to extract information or
access from victims.
Understanding these tactics is crucial for crypto users to
safeguard their assets. Vigilance, verification of sources and
skepticism toward unsolicited offers can mitigate the risks posed
by social engineering attacks.
Case studies of crypto
social engineering attacks
There have been several scams in the crypto domain
exploiting human weaknesses. Fraudsters used clever tactics like
phishing and impersonation to steal digital assets.
These case studies provide key insights to boost awareness and
prevent losses.
Ronin Network attack
In March 2022, the Ronin Network, which powers
Axie Infinity, suffered
a $600 million exploit. Investigations revealed the hack
stemmed from a social engineering attack.
Lazarus Group posed as a fake company and sent a job offer PDF
to a senior engineer with Ronin Network. When the file was opened,
it installed spyware that compromised validator nodes. This breach
allowed attackers to authorize massive withdrawals that went
undetected for days.

Lazarus Group’s fake job offer
The Lazarus Group, a North Korea-linked cybercrime unit, has
been using fake job offers to target crypto employees. In one such
case, they created fake recruiter profiles on LinkedIn and sent
tailored job offers to engineers at blockchain companies.
Engineers clicking on the job documents suffered malware
infections. Fraudsters getting access to the wallets culminated in
them stealing digital assets worth millions.
Discord phishing scams
Discord has become a hotspot for NFT scams through social
engineering. Scamsters impersonate project admins or moderators and
post fake
minting links in announcements.
In 2022, the popular NFT project Bored Ape Yacht Club was
targeted this way. Scammers posted a fake airdrop link in the
official Discord, tricking users into connecting their wallets.
Once authorized, the attackers drained the NFTs and tokens,
resulting in hundreds of thousands in losses.
Did you know? Many social engineering
attacks happen during project launches or major announcements.
Hackers time their scams for peak traffic, using fake links that
mimic official posts to steal funds from unsuspecting
users.
How to protect yourself
from social engineering attacks in crypto
Crypto users face an increasing wave of social engineering
attacks, from fake job offers to Discord phishing links. To stay
secure, you and the crypto community need to take proactive steps
to build awareness and deter attacks:
- Verifying identities and URLs: Always
double-check usernames, domain spellings and URLs before clicking.
Use official channels to verify announcements or job offers.
- Multifactor authentication (MFA):
Enable MFA or
2-factor authentication (2FA) on all accounts to make it harder
for fraudsters.
- Use hardware wallets: To store funds securely
for the long term, use hardware wallets as they reduce the risk of
remote access.
- Community education: Circulation of scam
alerts and regular security training sessions for crypto users can
help raise awareness about the prowling crypto scamsters.
- Role of social platforms and devs in
prevention: Platforms like Discord and Telegram should
implement a reporting mechanism with quick responses. They can
integrate transaction warnings and wallet-connection alerts to
deter social engineering attacks at the source.
Help available to
elderly victims in the event of crypto attacks
Several types of aid are available to elderly victims of
cryptocurrency hacks to help them recover their possessions. Here
is an insight into various options at hand.
Victims can file a formal complaint with law enforcement
agencies, such as cybercrime units and local police, who can carry
out investigations. Many countries have financial fraud helplines
that provide victims with counsel. They may discuss the fraudulent
act with their lawyer, who would help them understand their rights
and legal support available.
Nonprofits and advocacy groups in the US, such as the American
Association of Retired Persons (AARP), provide support to senior
victims of scams. Crypto exchanges may assist victims by freezing
suspicious transactions if alerted early. They may also contact
blockchain analytics firms or crypto recovery services to assist in
tracing stolen assets, though positive outcomes aren’t
assured.
Legal aid organizations can help victims navigate the complex
processes. It is helpful for older people to involve family members
and caregivers to assist them in the aftermath of an attack.
...