A cryptocurrency investor, often referred to as a "crypto whale," has suffered a devastating loss of over $282 million in Bitcoin (BTC) and Litecoin (LTC). This significant sum was lost after the individual fell victim to a sophisticated social engineering scam involving a hardware wallet, marking one of the largest personal crypto thefts ever reported.
The incident, which occurred on January 10, 2026, around 11 PM UTC, saw scammers successfully trick the victim into approving fraudulent transactions. Despite the funds being secured in a hardware wallet, the attackers employed psychological manipulation tactics to gain the victim's trust and compliance.
Hackers Convert Stolen Bitcoin and Litecoin into Monero
Following the theft, the perpetrators promptly began converting substantial amounts of both Bitcoin and Litecoin into Monero (XMR) through the use of instant cryptocurrency exchange platforms. The sheer volume of these exchanges had a notable impact on Monero's market, causing its price to surge by over 60% in a brief period due to its comparatively lower trading volume than Bitcoin.
In addition to the conversion to Monero, the attackers also utilized THORChain, a decentralized cross-chain protocol, to move Bitcoin across different blockchain networks. The Bitcoin was bridged to the Ethereum, Ripple, and Litecoin networks. THORChain has gained traction as a tool for laundering stolen cryptocurrency because its permissionless nature and lack of Know Your Customer (KYC) requirements facilitate easier fund movement for illicit actors without identity verification.
According to reports, the attackers executed the following conversions:
- •818 BTC (approximately $78 million)
- •19,631 ETH (approximately $64.5 million)
- •3.15 million XRP (approximately $6.5 million)
- •77,285 LTC (approximately $5.8 million)
Once stolen assets are converted into Monero, tracing them becomes exceptionally difficult. Monero's inherent privacy features obscure transaction details, posing a significant challenge for investigators attempting to follow the financial trail. This case underscores the increasing sophistication of laundering methods employed after major crypto scams, thereby complicating the recovery of stolen funds.
Stolen Funds Linked to Specific Wallet Addresses
Investigators have identified three primary wallet addresses associated with this theft. These addresses collectively received 1,459 BTC and 2.05 million LTC, confirming the extensive scale of the scam.
The identified theft addresses are:
- •bc1qluxw46r55wf3dnk9c652vrt4duadm3hpuktf86 (Bitcoin)
- •bc1qpsmh26ja0fzzf286zulmt9eywujc2pggj40wzm (Bitcoin)
- •ltc1qly43c2prj4c2e85dcspzpjd36jnapnenldnr70 (Litecoin)
Investigators believe that the attackers have not yet completed the process of moving the stolen assets. A substantial portion of the Bitcoin remains in a wallet presumed to be controlled by the scammers, suggesting they may be waiting for the initial public attention to subside before attempting further transfers.
A Theft Exceeding Most Past Crypto Incidents
The scale of this particular case surpasses even the $243 million in crypto scams that were investigated in 2024, positioning it as one of the most significant personal wallet thefts in the history of cryptocurrency. This incident deviates from typical exchange hacks, highlighting a concerning trend where criminals are increasingly targeting individual investors directly rather than large platforms.
Notably, this scam did not involve the exploitation of software vulnerabilities or the breach of security systems. Instead, the criminals relied on social engineering techniques, successfully manipulating the victim into unknowingly approving the fraudulent transactions.
Frequently Asked Questions
Crypto users can prevent social engineering scams by never acting on urgency, verifying requests independently, ignoring unsolicited messages, and meticulously reviewing wallet transactions before signing them.
While 2FA enhances account security, it does not directly protect hardware wallets. Hardware wallets require explicit user approval for transactions, making user awareness and transaction verification more critical than additional login steps.
If you realize you've been scammed, you should immediately stop interacting with any potentially compromised accounts or platforms, move any remaining funds to a new, secure wallet, revoke any suspicious permissions granted, and meticulously document all transaction details.
Recovery of stolen cryptocurrency is rare, but prompt reporting can be beneficial. Quick action can help flag suspicious wallets, alert exchanges, and potentially hinder further laundering of the stolen assets.
To reduce future scam risks, users should utilize cold storage solutions for significant holdings, maintain separate wallets for testing new applications or interacting with unknown entities, avoid publicly exposing wallet addresses, and always ensure they fully understand any transaction before signing it.

