$282M Lost in Crypto Scam Using THORChain & XMR Swap
A victim lost $282M in BTC and LTC via a hardware wallet scam. Funds were moved through THORChain and swapped into ETH, XMR, XRP, and LTC.

- $282M in BTC and LTC stolen via hardware wallet phishing.
- Funds were swapped into XMR, ETH, XRP, and LTC.
- THORChain used to obfuscate and reroute assets.
Massive $282M Scam Exposes Crypto Security Risks
According to blockchain investigator @zachxbt, a devastating $282 million crypto theft has rocked the community. The victim reportedly lost a massive amount of Bitcoin (BTC) and Litecoin (LTC) through a sophisticated social engineering attack tied to a hardware wallet scam.
This incident is one of the largest personal crypto thefts to date, and it raises fresh concerns about wallet safety, phishing tactics, and asset laundering across decentralized networks.
The attacker cleverly avoided detection by moving the stolen funds through privacy-centric and cross-chain platforms — making recovery and traceability difficult.
How the Attacker Laundered the Crypto
After draining the funds, the attacker began converting the assets to avoid tracking. A significant portion of the stolen BTC and LTC was converted into Monero (XMR) — a privacy-focused cryptocurrency. This triggered a sharp spike in XMR’s price, likely due to the large volume of buys.
The laundering didn’t stop there. The attacker leveraged THORChain, a decentralized cross-chain liquidity protocol, to execute the following swaps:
- 818 BTC (~$78 million) converted into:
- 19,631 ETH (~$64.5 million)
- 3.15 million XRP (~$6.5 million)
- 77,285 LTC (~$5.8 million)
By using THORChain, which allows asset swaps without centralized exchanges, the attacker avoided traditional Know-Your-Customer (KYC) processes and increased the complexity of tracing the funds.
Security Takeaways for Crypto Holders
This incident highlights a chilling truth: even hardware wallets are not foolproof if users fall for phishing or social engineering attacks.
Key takeaways include:
- Never share seed phrases or recovery information, even with “support staff.”
- Double-check domain names and verify sources before interacting.
- Enable passphrases and secure backups for added protection.
- Be cautious of unsolicited wallet firmware updates or requests.
As attackers become more sophisticated, the community must stay vigilant. This case also demonstrates how privacy coins and decentralized swapping protocols can be double-edged swords — empowering users, but also shielding bad actors.
Read Also:
- $282M Lost in Crypto Scam Using THORChain & XMR Swap
- China Injects ¥1.85T Liquidity — Markets Turn Bullish
- Can Bitcoin Reclaim the $100K Milestone in 2026?
- Bitmine Buys $65M in ETH Amid Market Momentum
- One Year of $TRUMP: The Meme Coin That Shook Crypto



