$282M Lost in Crypto Scam Using THORChain & XMR Swap

image

Source: Coinomedia Original Title: $282M Lost in Crypto Scam Using THORChain & XMR Swap Original Link: https://coinomedia.com/282m-lost-in-crypto-scam-using-thorchain-xmr-swap/

  • $282M in BTC and LTC stolen via hardware wallet phishing.
  • Funds were swapped into XMR, ETH, XRP, and LTC.
  • THORChain used to obfuscate and reroute assets.

Massive $282M Scam Exposes Crypto Security Risks

According to blockchain investigator zachxbt, a devastating $282 million crypto theft has rocked the community. The victim reportedly lost a massive amount of Bitcoin (BTC) and Litecoin (LTC) through a sophisticated social engineering attack tied to a hardware wallet scam.

This incident is one of the largest personal crypto thefts to date, and it raises fresh concerns about wallet safety, phishing tactics, and asset laundering across decentralized networks.

The attacker cleverly avoided detection by moving the stolen funds through privacy-centric and cross-chain platforms — making recovery and traceability difficult.

How the Attacker Laundered the Crypto

After draining the funds, the attacker began converting the assets to avoid tracking. A significant portion of the stolen BTC and LTC was converted into Monero (XMR) — a privacy-focused cryptocurrency. This triggered a sharp spike in XMR’s price, likely due to the large volume of buys.

The laundering didn’t stop there. The attacker leveraged THORChain, a decentralized cross-chain liquidity protocol, to execute the following swaps:

  • 818 BTC (~$78 million) converted into:
    • 19,631 ETH (~$64.5 million)
    • 3.15 million XRP (~$6.5 million)
    • 77,285 LTC (~$5.8 million)

By using THORChain, which allows asset swaps without centralized exchanges, the attacker avoided traditional Know-Your-Customer (KYC) processes and increased the complexity of tracing the funds.

Security Takeaways for Crypto Holders

This incident highlights a chilling truth: even hardware wallets are not foolproof if users fall for phishing or social engineering attacks.

Key takeaways include:

  • Never share seed phrases or recovery information, even with “support staff.”
  • Double-check domain names and verify sources before interacting.
  • Enable passphrases and secure backups for added protection.
  • Be cautious of unsolicited wallet firmware updates or requests.

As attackers become more sophisticated, the community must stay vigilant. This case also demonstrates how privacy coins and decentralized swapping protocols can be double-edged swords — empowering users, but also shielding bad actors.

BTC-0.12%
LTC-0.09%
ETH0.36%
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
0/400
No comments
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)