The Bitcoin social engineering attack is a targeted fraud exploiting trust in wallet and exchange support; it resulted in a single 783 BTC transfer (~$91 million) to a privacy wallet. Users should treat unsolicited support contact as a scam by default and move funds only after independent verification.
-
Victim lost 783 BTC (~$91M) in one transaction
-
Attackers impersonated exchange and hardware wallet support, then routed funds through Wasabi Wallet privacy tools.
-
Blockchain investigator ZachXBT identified the incident and traced initial laundering; related industry data shows rising social engineering losses in 2025.
Bitcoin social engineering attack: 783 BTC ($91M) stolen — learn protective steps and report incidents. Read expert guidance now.
What happened in the Bitcoin social engineering attack?
Bitcoin social engineering attack describes a targeted scam where impostors posing as exchange and hardware wallet support tricked a user into surrendering access, resulting in the theft of 783 BTC (~$91 million). Blockchain tracing shows the funds moved to a clean address and then into Wasabi Wallet to obscure the trail.
How did attackers steal 783 BTC in a single transaction?
The attacker contacted the victim via impersonated support channels and obtained the necessary credentials or recovery data to execute one transfer of 783 BTC at 11:06 UTC on the recorded day. Blockchain investigator ZachXBT reported the wallet receiving the funds and noted laundering began a day later through Wasabi Wallet privacy features.

Why do social engineering attacks remain effective?
Social engineering leverages human trust and urgency. Attackers impersonate trusted brands like hardware wallet providers and exchanges to elicit sensitive data. High-value targets are often pressured into fast action, bypassing safety checks.
What patterns emerge from recent industry data?
Data from blockchain security monitoring shows more than $2.1 billion stolen across crypto incidents in the first five months of 2025. Wallet compromises and phishing dominate losses. The February Bybit exploit (~$1.4 billion) illustrates risk even for large, audited platforms. CertiK and other firms report continued phishing and social engineering as leading vectors.
Frequently Asked Questions
How can users verify legitimate hardware wallet support?
Verify support contacts only through the official device interface or the provider’s verified app. Never follow phone numbers, email addresses, or links received in unsolicited messages. Treat all unexpected communications as potential scams.
What signs indicate a social engineering attempt?
Pressure to act immediately, requests for recovery phrases or passwords, and communications that use urgent language or unofficial channels are common signs. Cross-check claims via official channels before taking action.
Key Takeaways
- Large-loss incident: A single social engineering attack resulted in the theft of 783 BTC (~$91M).
- Laundering pattern: Funds moved to a clean address and were processed through Wasabi Wallet privacy tools to obscure provenance.
- Prevention steps: Assume unsolicited support contact is a scam, verify via official channels, never share recovery phrases, and use multi-factor authentication.
Conclusion
This Bitcoin social engineering attack underscores persistent human-targeted risk across crypto. Industry data and blockchain tracing by investigators like ZachXBT show attackers pair impersonation with privacy tools to evade detection. Users should adopt strict verification habits and hardware wallet best practices to reduce exposure. Report incidents promptly and prioritize secure key management.