Futures
Hundreds of contracts settled in USDT or BTC
TradFi
Gold
Trade global traditional assets with USDT in one place
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Futures Kickoff
Get prepared for your futures trading
Futures Events
Participate in events to win generous rewards
Demo Trading
Use virtual funds to experience risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and enjoy airdrop rewards!
Futures Points
Earn futures points and claim airdrop rewards
Investment
Simple Earn
Earn interests with idle tokens
Auto-Invest
Auto-invest on a regular basis
Dual Investment
Buy low and sell high to take profits from price fluctuations
Soft Staking
Earn rewards with flexible staking
Crypto Loan
0 Fees
Pledge one crypto to borrow another
Lending Center
One-stop lending hub
VIP Wealth Hub
Customized wealth management empowers your assets growth
Private Wealth Management
Customized asset management to grow your digital assets
Quant Fund
Top asset management team helps you profit without hassle
Staking
Stake cryptos to earn in PoS products
Smart Leverage
New
No forced liquidation before maturity, worry-free leveraged gains
GUSD Minting
Use USDT/USDC to mint GUSD for treasury-level yields
Robo cryptocurrencies worth 282 million dollars through social engineering: An unprecedented hack in January 2026
A major social engineering attack targeting a hardware wallet resulted in the theft of cryptocurrencies valued at $282 million, making it one of the largest crypto thefts on record. The incident, which took place on January 10 at 23:00 UTC, exposes the vulnerability of even the most cautious users to sophisticated social manipulation techniques.
The Attack: Critical Asset Disappearance in Record Time
The victim lost 1,459 bitcoins and 2.05 million litecoins in the crypto theft, reflecting the monumental scale of the incident. According to analysis by ZachXBT, a renowned blockchain researcher, the funds were stolen through a social engineering scheme that compromised the security of the hardware wallet.
At the time of the crypto theft, bitcoin was trading at $77.56K and litecoin at $57.83, although these prices reflect values after the event. The speed with which the attack was executed suggests meticulous planning by the perpetrators.
Money Laundering: Accelerated Conversion to Monero
The most notable aspect of the crypto theft was the speed at which the funds were processed. Most of the bitcoins and litecoins were quickly converted to monero, a privacy-focused cryptocurrency, through multiple instant exchanges. This rapid conversion caused a spectacular 70% increase in the price of XMR during the four days following the incident.
Some of the bitcoins were also transferred to Ethereum, Ripple, and Litecoin using Thorchain, a cross-chain exchange protocol. ZachXBT dismissed any connection between the crypto theft and North Korean actors, suggesting it was an independent operation.
Market Impact: Traces of the Attack in Prices
The crypto theft sent shockwaves through the cryptocurrency markets. The massive conversion to monero, a currency with enhanced privacy features, not only dramatically increased its price but also raised suspicions about the intent to hide the origin of the funds. This pattern of capital flow into privacy assets is characteristic of money laundering operations following a crypto theft.
A Concerning Context: Social Engineering as the Main Threat in 2026
The January 10 crypto theft confirms alarming security trends expected for 2026. Social engineering has become the dominant attack vector for hackers, replacing more conventional techniques. This method involves attackers impersonating trusted employees, establishing trust with victims, and persuading them to reveal sensitive information such as private keys or access details.
The crypto theft occurred just five days after Ledger, the leading hardware wallet provider, confirmed a compromising data breach. Through unauthorized access, attackers obtained personal information of Ledger users, including names and contact details, creating a fertile environment for future targeted attacks.
The Role of Social Engineering in the Ledger Data Breach
The combination of Ledger’s data breach and subsequent crypto theft suggests a coordinated pattern. Attackers potentially used the exposed information to identify and target specific victims holding large amounts of cryptocurrencies. This cycle of initial compromise followed by sophisticated attacks poses an increasing threat to the security of the crypto ecosystem.
Lessons and Future Perspectives
The $282 million crypto theft underscores the critical need to adopt multiple layers of security beyond simply owning hardware wallets. Education on social engineering techniques, identity verification, and implementing additional confirmation protocols for large transfers are essential measures every user should consider to protect against future crypto thefts.