On January 10th, an event occurred on the blockchain that once again highlighted the vulnerability of even the most secure systems. A hacker orchestrated an elaborate large-scale theft, becoming one of the biggest incidents of 2026. According to researcher ZachXBT’s analysis, the criminal stole 2.05 million Litecoin and 1,459 Bitcoin worth $282 million, using social engineering as the attack vector against the hardware wallet owner.
Master of Manipulation: Social Engineering Technique
Social engineering is not a new weapon for hackers, but in 2025-2026, it has become the dominant attack tactic within the crypto community. First, let’s understand exactly how malicious actors operate.
A typical scheme involves several stages: the hacker impersonates an employee of a trusted company, gains the victim’s trust, and then persuades them to disclose confidential information — private keys, passwords, or two-factor authentication data. In this case, the attacker managed to access the hardware wallet of the owner, which opened the way to the crypto assets.
What is especially alarming: this tactic demonstrates a critical vulnerability in the security chain. No multi-layered security system can help if the user voluntarily provides access.
The Path of Stolen Funds: From Bitcoin to Anonymity
Within hours after the crime, the hacker began moving the funds. The majority of the 2.05 million LTC was exchanged for Monero (XMR) through several quick exchanges — a clearly deliberate choice. Monero is known for its privacy features and the inability to trace transactions, unlike fully transparent Bitcoin and Litecoin.
The exchange operation was so large that it caused a noticeable market spike: the price of XMR increased by 70 percent over the following four days. This indicates a huge volume of funds injected into liquidity at once.
Some of the Bitcoin (1,459 BTC) followed a different route: they were transferred via the Thorchain cross-chain bridge to other blockchains — Ethereum, Ripple, and back to Litecoin. Such a “jump” across multiple networks is a classic maneuver for obfuscating traces and complicating forensic analysis. However, ZachXBT convincingly refuted rumors of North Korean hacker involvement — there are no characteristic signs of their digital footprints.
Hacking as a Symptom: Growing Trend of Social Engineering Attacks
This incident is not a random lightning strike but rather a sign of a troubling pattern. Researchers note that 2025 was marked by hackers shifting focus from technical vulnerabilities to the human factor. Instead of exploiting bugs in code, criminals actively use manipulation and deception.
This shift occurred for a simple reason: technical defenses are becoming more sophisticated, while people remain human. A hacker armed with social engineering often achieves greater success than a virus writer trying to breach a firewall.
Ledger Echo: When Data Becomes a Weapon
Just five days before the crime, another significant event took place: Ledger, one of the largest hardware wallet manufacturers, experienced a data breach. Cybercriminals gained unauthorized access to users’ personal information — names, contacts, addresses.
These two events may not be directly connected, but they demonstrate a common trend: when confidential data enters the network, it becomes an excellent basis for targeted social engineering attacks. The combination of “I know where you live” + “I know you have crypto” creates the perfect environment for manipulation.
What’s Next: Challenges for Crypto Security
This case raises tough questions for the community. Hardware wallets are considered the gold standard for storing crypto assets, but even they do not protect against social engineering. This means that security depends not only on technology but also on user education, awareness of manipulation methods, and the willingness to be skeptical of unfamiliar requests.
For crypto investors, the lesson is simple: never disclose private keys or recovery codes, even if the caller claims to be a Ledger, Gate.io, or any other company employee. Hackers are becoming more inventive, and only personal vigilance can serve as the last line of defense.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Backdoor to a Billion: How a Hacker Stole $282 Million Through Social Engineering
On January 10th, an event occurred on the blockchain that once again highlighted the vulnerability of even the most secure systems. A hacker orchestrated an elaborate large-scale theft, becoming one of the biggest incidents of 2026. According to researcher ZachXBT’s analysis, the criminal stole 2.05 million Litecoin and 1,459 Bitcoin worth $282 million, using social engineering as the attack vector against the hardware wallet owner.
Master of Manipulation: Social Engineering Technique
Social engineering is not a new weapon for hackers, but in 2025-2026, it has become the dominant attack tactic within the crypto community. First, let’s understand exactly how malicious actors operate.
A typical scheme involves several stages: the hacker impersonates an employee of a trusted company, gains the victim’s trust, and then persuades them to disclose confidential information — private keys, passwords, or two-factor authentication data. In this case, the attacker managed to access the hardware wallet of the owner, which opened the way to the crypto assets.
What is especially alarming: this tactic demonstrates a critical vulnerability in the security chain. No multi-layered security system can help if the user voluntarily provides access.
The Path of Stolen Funds: From Bitcoin to Anonymity
Within hours after the crime, the hacker began moving the funds. The majority of the 2.05 million LTC was exchanged for Monero (XMR) through several quick exchanges — a clearly deliberate choice. Monero is known for its privacy features and the inability to trace transactions, unlike fully transparent Bitcoin and Litecoin.
The exchange operation was so large that it caused a noticeable market spike: the price of XMR increased by 70 percent over the following four days. This indicates a huge volume of funds injected into liquidity at once.
Some of the Bitcoin (1,459 BTC) followed a different route: they were transferred via the Thorchain cross-chain bridge to other blockchains — Ethereum, Ripple, and back to Litecoin. Such a “jump” across multiple networks is a classic maneuver for obfuscating traces and complicating forensic analysis. However, ZachXBT convincingly refuted rumors of North Korean hacker involvement — there are no characteristic signs of their digital footprints.
Hacking as a Symptom: Growing Trend of Social Engineering Attacks
This incident is not a random lightning strike but rather a sign of a troubling pattern. Researchers note that 2025 was marked by hackers shifting focus from technical vulnerabilities to the human factor. Instead of exploiting bugs in code, criminals actively use manipulation and deception.
This shift occurred for a simple reason: technical defenses are becoming more sophisticated, while people remain human. A hacker armed with social engineering often achieves greater success than a virus writer trying to breach a firewall.
Ledger Echo: When Data Becomes a Weapon
Just five days before the crime, another significant event took place: Ledger, one of the largest hardware wallet manufacturers, experienced a data breach. Cybercriminals gained unauthorized access to users’ personal information — names, contacts, addresses.
These two events may not be directly connected, but they demonstrate a common trend: when confidential data enters the network, it becomes an excellent basis for targeted social engineering attacks. The combination of “I know where you live” + “I know you have crypto” creates the perfect environment for manipulation.
What’s Next: Challenges for Crypto Security
This case raises tough questions for the community. Hardware wallets are considered the gold standard for storing crypto assets, but even they do not protect against social engineering. This means that security depends not only on technology but also on user education, awareness of manipulation methods, and the willingness to be skeptical of unfamiliar requests.
For crypto investors, the lesson is simple: never disclose private keys or recovery codes, even if the caller claims to be a Ledger, Gate.io, or any other company employee. Hackers are becoming more inventive, and only personal vigilance can serve as the last line of defense.