Get paid with crypto faster & cheaper. Click here to use Archway!

$243 Million Crypto Heist: How They Did It and Got Caught

$243M crypto theft unraveled: social engineering, blockchain forensics, and the role of privacy coins like Monero in tracing stolen funds.

$243M crypto theft unraveled: social engineering, blockchain forensics, and the role of privacy coins like Monero in tracing stolen funds.

There was this massive crypto heist recently, and when I say massive, I mean $243 million. Yeah, you read that right. Two guys got arrested in LA and Miami after weeks of being hunted down by some serious crypto forensics. The whole thing is a wild ride through social engineering and blockchain tech.

The Attack

The thieves, who went by some pretty interesting names (Greavys, Wiz, and Box), pulled off the attack on August 19, 2024. They first posed as Google Support to get into the victim's personal accounts. Then they switched gears and pretended to be support from Gemini exchange, claiming the victim's account was compromised. Using some slick moves like getting the victim to reset their two-factor authentication (2FA) and sharing private keys via AnyDesk (seriously, don’t use that), they transferred a whopping $243 million into their wallets.

ZachXBT is the guy you need to know here; he’s a crypto investigator who detailed the entire saga on Twitter. The funds were quickly shuffled through various cryptocurrencies like Bitcoin and Monero before heading into exchanges.

Mistakes Made

But here’s where it gets juicy: these criminals made some rookie mistakes. One of them accidentally showed his face during a screen-sharing session! And then there was this other dude who flaunted his stolen wealth on social media like it was no big deal.

With some good old-fashioned OSINT (Open Source Intelligence) mixed with crypto forensics, investigators tracked their every move—from luxury nightclubs to high-end Birkin bag purchases.

The Forensics Game

Now let’s talk about crypto forensics because it’s fascinating yet complex. Basically, it's all about tracing those digital coins back to their roots using tools like Chainalysis or Elliptic. These tools are great at uncovering illegal activities on public blockchains but require a bit of traditional detective work too.

And here's an interesting twist: while most of the stolen funds were converted into Monero—a coin known for its privacy features—the criminals made several errors that allowed investigators to connect the laundered funds back to them.

Privacy coins pose a unique challenge since they’re designed to obscure transaction details. But even then, advanced tracing methods can sometimes find ways around those privacy measures.

Final Thoughts

So yeah, this whole saga is a textbook case of how not to do crime in 2024. Social engineering is no joke; it exploits human vulnerabilities rather than technical flaws. And if you're gonna steal millions, maybe don't show your face or your luxury lifestyle online?

As for ZachXBT? He’s already onto the next case involving another $1 million theft from someone who didn’t learn from this incident.