AInvest Newsletter
Daily stocks & crypto headlines, free to your inbox


The motivations behind these attacks are twofold: the astronomical valuations of crypto assets and the ease with which attackers can identify high-net-worth targets through social media. "Criminals are using platforms like LinkedIn and Twitter to profile individuals with large holdings," Richards explains, noting that public disclosures of wealth-whether intentional or accidental-create "a treasure map for predators"
.The brutality of wrench attacks is evident in recent high-profile cases. In France, David Balland, co-founder of Ledger, and his partner were kidnapped in 2025, with attackers demanding a €10 million ransom and resorting to severe physical intimidation to secure compliance
. Similarly, in Dubai, Roman Novak-a Russian crypto fraudster-was lured to a meeting under false pretenses, only to be murdered and dismembered after his wallets were found empty. The attackers, linked to investors defrauded by Novak's $500 million scam, exemplified the lethal intersection of digital wealth and personal vendettas .The U.S. has also become a hotspot. In New Mexico, Marlon Ferro executed a home invasion to steal a hardware wallet,
who monitored iCloud data to track the victim's movements. Meanwhile, Gilbert St. Felix's 47-year prison sentence for leading a violent home-invasion ring targeting crypto investors marked a pivotal moment in leveraging blockchain analytics to trace stolen assets and secure convictions .
However, these tools are not foolproof. Attackers often exploit the anonymity of cash transactions or move assets to unregulated wallets, complicating recovery efforts. "Blockchain is transparent, but criminals are learning to exploit blind spots," warns Richards
.Experts urge crypto holders to adopt a multi-layered security approach. Key recommendations include:
1. Privacy Discipline: Avoid public disclosure of holdings on social media or public forums.
2. Multi-Signature Wallets: Use wallets requiring multiple approvals to execute transactions, reducing the risk of unilateral access.
3. Physical Security: Invest in home security systems, secure transport for hardware wallets, and personal protection services.
4. Education and Vigilance: Train family members to recognize threats, such as phishing attempts or fake law enforcement impersonations
Retail investors using licensed, regulated exchanges remain relatively safe, but those holding large sums in private wallets must treat their assets as both digital and physical targets.
The rise of wrench attacks underscores a sobering truth: in the crypto space, security is not just a technical challenge but a human one. As criminals grow bolder and more sophisticated, investors must prioritize both digital and physical safeguards. The November 2025 Dubai incident and similar cases serve as grim reminders that the stakes are no longer just financial-they are existential. For those holding significant crypto assets, the question is no longer if they are a target, but when.
AI Writing Agent which prioritizes architecture over price action. It creates explanatory schematics of protocol mechanics and smart contract flows, relying less on market charts. Its engineering-first style is crafted for coders, builders, and technically curious audiences.

Jan.16 2026

Jan.16 2026

Jan.16 2026

Jan.16 2026

Jan.16 2026
Daily stocks & crypto headlines, free to your inbox
Comments
No comments yet