The manual was simple enough to work once: dress like delivery drivers, knock on the door, force entry at gunpoint, and extract private keys under threat.
In June 2024, three men executed that script at a residential address in the United Kingdom and made off with more than $4.3 million in cryptocurrency.
Five months later, Sheffield Crown Court convicted Faris Ali and two accomplices after the Metropolitan Police recovered almost all of the loot.
The case, documented by blockchain researcher ZachXBT, now serves as a benchmark for a question the industry has avoided: What does operational security look like when your net worth resides in a browser extension and your home address is a public record?
The theft took place in the narrow margin between a data breach and the victim’s conscience.
Chat logs obtained by ZachXBT show the perpetrators discussing their approach hours before the attack, sharing photos of the victim’s building, confirming that they were located outside the door, and coordinating their cover story.
One image captured the three dressed in delivery uniforms. Minutes later there was a knock on the door. The victim, waiting for a package, opened the door.
What followed was a forced transfer to two Ethereum addresses, executed under duress and with a firearm present. Most of the stolen cryptocurrencies remained dormant in those wallets until authorities intervened.
ZachXBT put together the operation using on-chain forensics and leaked Telegram conversations.
Chat logs revealed operational planning and criminal history: Weeks before the robbery, Faris Ali had posted a photograph of his bail paperwork to friends on Telegram, revealing his full legal name.
After the theft, an unknown person registered the ENS domain farisali.eth and sent a chain message, a public accusation embedded in the Ethereum ledger.
ZachXBT shared its findings with the victim, who passed them on to authorities. On October 10, 2024, ZachXBT published the full investigation and on November 18, Sheffield Crown Court handed down the sentence.
The case fits a broader pattern noted by ZachXBT: a rise in home invasions targeting cryptocurrency holders in Western Europe in recent months, at higher rates than in other regions.
The vectors vary—SIM swaps that leak recovery phrases, phishing attacks that expose wallet balances, and social engineering that maps holdings to physical locations—but the bottom line is consistent.
Once an attacker confirms that a target has significant value and can locate his or her residence, the calculus tilts toward physical coercion.
What the “delivery driver” tactic exploits
The delivery driver disguise works because it exploits trust in the logistics infrastructure. Opening the door for a messenger is routine behavior, not a security breach.
The perpetrators understood that the most difficult part of a home invasion is gaining entry without setting off an alarm or fleeing.
A uniform and a package provide a plausible reason to approach and wait at the threshold. When the door opens, the element of surprise is already in play.
That tactic is unsuccessful because it requires physical presence, leaves forensic traces, and collapses if the victim refuses to open the door, but it bypasses all layers of digital security.
Multi-signature wallets, hardware devices, and cold storage mean nothing when an attacker can force you to sign transactions in real time.
The weak link is not the cryptography, but the human being who holds the keys and lives at a fixed address that can be discovered through a data breach or a search of public records.
ZachXBT’s investigation traced the attack to a “crypto data breach,” a leak that gave perpetrators access to information linking wallets to a physical location.
The exact source remains unspecified, but forensic chronology suggests that the attackers knew both the target’s address and its approximate properties before arriving.
The opsec tax and what changes
If this case becomes a model, high-net-worth cryptocurrency holders will have to rethink their custody and disclosure practices.
The immediate lesson is defensive: compartmentalize holdings, delete personal information from public databases, avoid discussing wallet balances on social media, and treat any unsolicited visits as a potential threat.
But those measures impose a tax on convenience, transparency, and the ability to participate in public crypto discourse without painting a target on your back.
The longer-term question is whether the insurance market will intervene. Traditional custody providers offer liability coverage and physical security guarantees, but self-custody does not, which is one of its few drawbacks.
If home invasions become a predictable attack vector, expect demand for products that outsource custody to insured third parties or provide private security services for individuals holding assets above a certain threshold.
Neither solution is cheap and both sacrifice the sovereignty that self-custody is supposed to guarantee.
Data breaches are the rising risk. Centralized exchanges, blockchain analytics companies, tax filing platforms, and Web3 services that require KYC store records linking identities to holdings.
When those databases are breached, and they are regularly, they create a shopping list for criminals who can compare wallet balances to public address records.
ZachXBT’s guidance to “monitor your personal information when it is exposed online” is good advice, but it assumes victims have the tools and vigilance to track breaches in real time. Most don’t.
The other limitation is the ability to enforce the law. ZachXBT’s investigation was instrumental in this case, but he is a private actor working pro bono.
Law enforcement agencies in most jurisdictions lack the on-chain forensics capability to track stolen cryptocurrencies without outside help. The Metropolitan Police succeeded in this partly because the investigative work was entrusted to it fully formed.
What is at stake?
The broader question this case raises is whether self-custody can remain the default recommendation for anyone of significant value.
The crypto industry has been arguing for a decade that individuals should control their own keys and that asset sovereignty justifies the operational burden.
That argument is valid when the threat model is currency insolvency or government seizure. It is weakened when the threat model is a man in a delivery uniform with a firearm and a list of addresses extracted from a leaked database.
If high net worth holders conclude that self-custody exposes them to unacceptable physical risks, they will move their assets to secured institutional platforms and the industry will have traded decentralization for security.
If they remain in their own custody but invest heavily in privacy and security infrastructure, cryptocurrencies become a subculture for the paranoid and well-resourced.
The rulings at Sheffield Crown Court close a chapter. The attackers are arrested, the victim has recovered his funds, and ZachXBT has another case study for its cryptocrime file.
But the systemic vulnerability remains: as long as large sums of money can be extracted at gunpoint in less than an hour, and as long as data breaches continue to map wallet balances to particular addresses, no amount of cryptographic hardening will protect the humans who hold the keys.


