By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
BrinkeraBrinkeraBrinkera
  • HOME
  • NEWS
    • SECURITY
    • SOFTWARE
    • PRIVACY
    • TECH
    • GADGET
  • EMAIL
    • BEST SECURE EMAIL SERVICES
    • PROTON MAIL REVIEW
    • STARTMAIL REVIEW
    • TUTA MAIL REVIEW
  • PASSWORD
    • NORDPASS REVIEW
    • PROTON PASS REVIEW
  • VPN
    • BEST VPN SERVICES
    • VPN REVIEWS
      • NORDVPN REVIEW
      • SURFSHARK VPN REVIEW
      • PROTON VPN REVIEW
  • MESSAGING
Search
© 2026 Brinkera – Latest Cybersecurity and Tech News, Research & Analysis. | About Us | Privacy Policy | Terms of Use
Reading: $282M Hardware Wallet Scam: How to Protect Your Crypto
Share
Notification Show More
Font ResizerAa
BrinkeraBrinkera
Font ResizerAa
Search
  • NEWS
  • SECURITY
  • SOFTWARE
  • PRIVACY
  • Tech
  • Gadget
  • Crypto
  • Editorial
  • Entertainment
  • VPN
    • BEST VPN SERVICES
    • NORD VPN REVIEW
    • SURFSHARK VPN REVIEW
    • PROTON VPN REVIEW
  • EMAIL
    • PROTON MAIL REVIEW
    • TUTA MAIL REVIEW
Follow US
© 2026 Brinkera – Latest Cybersecurity and Tech News, Research & Analysis. | About Us | Privacy Policy | Terms of Use
Brinkera > Crypto > $282M Hardware Wallet Scam: How to Protect Your Crypto
CryptoNews

$282M Hardware Wallet Scam: How to Protect Your Crypto

Last updated: March 3, 2026 12:52 am
Rashid AlNahlawi
Share
SHARE

Blockchain security experts are tracking the aftermath of a massive theft totaling at least $282 million in digital assets that took place on January 10th, stemming from a sophisticated social engineering operation.

For instance, cryptocurrency protection specialist CertiK’s team said today that they identified deposits into the cryptocurrency mixing service Tornado Cash connected to the earlier theft this month. Based on their findings, $63 million in compromised assets were transferred to ThorSwap, a decentralized trading platform, where the stolen bitcoin (BTC) and litecoin (LTC) were exchanged for ethereum (ETH) before proceeding through the laundering operation and eventually being deposited to the mixer.

At the same time, crypto security firm zeroShadow claims that, following an alert from BTC exchange BitcoinVN regarding abnormally high transaction activity with assets tracing back to THORChain, on which ThorSwap runs, they managed to freeze $700,000 before the funds were exchanged for the privacy-oriented monero (XMR) cryptocurrency.

The heist was initially discovered by blockchain protection expert ZachXBT on January 16th. According to him, on January 10th at approximately 11 p.m. UTC, an unidentified victim lost the aforementioned millions through a hardware wallet social engineering operation.

- Advertisement -

“The attacker began converting the stolen LTC and BTC to Monero via multiple instant exchanges, causing the XMR price to sharply increase. BTC was also bridged to Ethereum, Ripple, and Litecoin via THORChain,” the security researcher stated at that time.

Following the attack, XMR surged approximately 70% over the subsequent days, although it has since retraced some of those increases.

While the identity of the victim remains unknown—whether an individual or an institution—ZachXBT asserts that the notorious North Korean threat actors are not responsible for this crime.

As previously documented, criminals are increasingly leveraging social engineering tactics to deceive users into surrendering their crypto holdings. This pattern is frequently amplified by compromised or stolen user information.

For instance, the recent incident once more implicated leading hardware wallet manufacturer Ledger, whose customer information, including names and contact details, was compromised through its third-party retail and e-commerce platform, Global-e, earlier this January.

- Advertisement -

Meanwhile, as also documented, social engineering has resulted in hundreds of millions of dollars in damages for customers of the leading crypto exchange Coinbase.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
ByRashid AlNahlawi
Follow:
Cybersecurity researcher and digital privacy advocate with a background in IT and software testing. After experiencing identity theft in 2019, he shifted focus to testing and reviewing VPN services, encrypted email providers, and security tools. At Brinkera, Rashid leads hands-on product testing and fact-checking to help readers make informed privacy decisions.
Previous Article Ethereum Address Poisoning Scams Rise After Fusaka Update Ethereum Address Poisoning Scams Rise After Fusaka Update
Next Article Cryptocurrency Crime Infrastructure Smart Contract Abuse Cryptocurrency Crime Infrastructure Smart Contract Abuse
- Advertisement -

You Might also Like

CryptoNews

Bitcoin advances two critical steps toward quantum and AI-powered future

Rashid AlNahlawi
9 Min Read
Feeling lonely this Valentine's
CryptoNews

Feeling lonely this Valentine’s? Federal prosecutors issue crypto romance scam alert

Rashid AlNahlawi
4 Min Read
NewsSoftware

Discord Mass Exodus 2026: Why Users Switch to Matrix

Rashid AlNahlawi
3 Min Read

About Us

  • About Us
  • Contact Us
  • Advertise with us

Categories

  • Security
  • Software
  • Privacy
  • Editorial
  • Crypto
  • Tech

Reviews

  • VPN Reviews 2026: Honest Testing and Analysis
  • Best Secure Email Services 2026
Subscribe to Our Newsletter
Subscribe to our newsletter to get our newest articles instantly!

BrinkeraBrinkera
Follow US
© 2026 Brinkera – Latest Cybersecurity and Tech News, Research & Analysis. | About Us | Privacy Policy | Terms of Use
Join Us!
Subscribe to our newsletter and never miss our latest news, podcasts etc..

Zero spam, Unsubscribe at any time.