UK Teens Jailed After $4.3M Wrench Attack Robbery Caught on Police Video

In brief

  • Three UK teenagers have been jailed after carrying out a “wrench attack” robbery in which $4.3 million in crypto was stolen.
  • Metropolitan Police said the suspects forced a victim to hand over crypto and car keys in a Hoxton burglary.
  • The stolen cryptocurrency was recovered within 72 hours and returned two weeks later, police told Decrypt.

Three teenagers have been jailed following a “wrench attack” in which $4.3 million worth of cryptocurrency was stolen at knife point. In a video released by the Metropolitan Police on Thursday, the trio were shown posing as delivery drivers to gain entry to a flat, where they threatened the occupant with knives and demanded his cryptocurrency holdings.

Police said the suspects travelled from Sheffield to London on June 17, 2024, before carrying out the burglary, which was later linked to them through social media footage and vehicle tracking following the theft of the victim’s car.

The suspects, who were aged 16 and 17 at the time, recorded themselves on Snapchat leaving the scene in the victim’s BMW, footage police later used to help identify and link them to the burglary. Officers were alerted when the stolen vehicle triggered an automatic number plate recognition camera on the M1 in Northamptonshire less than three hours later, before the car was eventually stopped on the M6 in Warwickshire following a brief pursuit. The victim’s crypto was “recovered within 72 hours and returned two weeks later,” a representative from the Metropolitan Police told Decrypt. 

The three defendants were sentenced to a total of 16 years in youth detention after pleading guilty to charges linked to the burglary and car theft. Individual sentences ranged from 46 to 80 months, authorities confirmed with Decrypt. A minor who police said cannot be named for legal reasons “pleaded guilty to aggravated burglary, possession of criminal property and theft of a motor vehicle.” The minor received 80 months in custody. The case was "a clear example of how the suspects thought posting their criminal exploits on social media would build them a following, however all it built was the case against them,” Detective Constable Jonathan Leung said in a statement. Crypto “wrench attacks” Security researchers in the crypto industry say the case reflects a well-established pattern in which attackers bypass technical safeguards by targeting individuals directly, often after identifying victims through leaked or publicly exposed personal information. These so-called “wrench attacks” have resulted in more than $41 million in losses in 2025, marking a 75% year-on-year incidence growth rate, with France being at the center of the crime wave. “This isn’t a new tactic. Law enforcement, including the FBI, has documented “wrench attacks” for years, where cases where criminals physically target crypto holders instead of hacking wallets,” Andy Zhou, co-founder of blockchain security firm BlockSec, told Decrypt. The core idea, Zhou explained, is that “it’s often easier to coerce a person than to break cryptography.” Most cases begin with information exposure instead of outright violence, he said.

“Data leaks, breached customer records, or publicly available online information can be combined to identify who likely holds crypto and where they live,” he noted. The most common mistake is overexposure, Zhou said, noting that, “People unintentionally link their real identity, location, and crypto holdings through data breaches, social media, reused phone numbers, or public wallet activity.” Common risks include single-point custody, where one device or person can move funds immediately, increasing exposure to coercion, Zhou said. He added that warning signs include targeted phishing, unexpected account recovery attempts, SIM-swap symptoms, and unusual contact with individuals or internal systems. “The practical takeaway is simple,” Zhou said, explaining that, “we need to assume attackers may target humans. Reducing personal exposure and adding friction to fund movements often matters more than adding another layer of cryptography.”

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Articoli correlati

Scallop Protocol on Sui Hit by Flash Loan Attack, $142K Drained via Oracle Manipulation

Gate News message, April 26 — Scallop Protocol, a lending platform on the Sui blockchain, suffered a flash loan exploit targeting a deprecated side contract linked to its sSUI rewards pool, resulting in a loss of approximately $142,000 (150,000 SUI). The attack exploited oracle price feed

GateNews3h fa

22-Year-Old Sentenced to 70 Months for $263 Million Crypto Theft Money Laundering

California resident Evan Tangeman, 22, was sentenced on Friday to 70 months in federal prison for his role laundering proceeds from a multi-state cryptocurrency theft ring that stole approximately $263 million in digital assets from victims, according to the U.S. Department of Justice. U.S.

CryptoFrontier4h fa

Litecoin Suffers Deep Chain Reorganization After MWEB Privacy Layer Zero-Day Exploit

Gate News message, April 26 — Litecoin underwent a deep chain reorganization on Saturday afternoon after attackers exploited a zero-day vulnerability in its MimbleWimble Extension Block (MWEB) privacy layer, according

GateNews4h fa

Address Linked to Avi Eisenberg Shows New On-Chain Activity, Raising Security Concerns

Gate News message, April 26 — Blockchain analytics platform Arkham has identified renewed on-chain activity from an address believed to be connected to Avi Eisenberg, the attacker who profited approximately $110 million from the 2022 Mango Markets exploit. Eisenberg was previously sentenced to

GateNews6h fa

Sui 鏈 DeFi 借貸協議 Scallop 遭駭,舊版合約漏洞致 15 萬 SUI 被盜

Scallop 在 Sui 鏈遭攻擊,側合約牽連 sSUI 獎勵池被利用,約 15 萬枚 SUI 被盜,核心合約安全,存款與提領已恢復。官方聲明僅限於已棄用的獎勵合約,使用者資金未受影響。前 NEAR 開發者 Vadim 指漏洞源自 17 個月前的舊版 V2 套件,未初始化 last_index 導致自 2023 年起累積獎勵;修復需在共用物件加入版本欄位並強化版本檢查,避免過時套件造成風險。

ChainNewsAbmedia7h fa

Scallop Discovers sSUI Reward Pool Vulnerability, Suffers 150K SUI Loss but Pledges Full Reimbursement

Gate News message, April 26 — Scallop, a lending protocol in the Sui ecosystem, announced the discovery of a vulnerability in an auxiliary contract associated with its sSUI reward pool, resulting in a loss of approximately 150,000 SUI. The affected contract has been frozen, and Scallop confirmed

GateNews11h fa
Commento
0/400
Nessun commento