Bitcoin Depot, a prominent operator of cryptocurrency ATMs across the United States, has reported a significant cyber theft. In a disclosure on April 13, 2026, the company revealed that attackers stole credentials for its digital asset settlement accounts. The threat actors then used this access to transfer over 50 BTC, worth more than $3.6 million at the time, out of the company's control. Bitcoin Depot was able to detect the activity and block the attackers' access, preventing additional theft. The incident underscores the high stakes of credential security in the cryptocurrency industry, where stolen funds are often untraceable and unrecoverable.
The attack appears to be a straightforward but effective credential theft operation. The target was not the ATM network itself, but the backend settlement accounts that hold the company's cryptocurrency assets. These are high-value targets for criminals. By obtaining the credentials—which could be a combination of API keys, passwords, and private key material—the attackers were able to perform legitimate-looking transactions. The speed and irreversibility of blockchain transactions make this type of attack particularly damaging; once the BTC is transferred, it is effectively gone forever unless the attacker makes a mistake in their operational security.
The exact method of credential theft was not disclosed, but common TTPs for such attacks include:
T1566.001 - Phishing: Spearphishing Attachment: A targeted phishing email sent to a Bitcoin Depot employee in the finance or operations department with access to the settlement accounts.T1552 - Unsecured Credentials: The credentials may have been stored in an insecure location, such as a script, configuration file, or a private code repository, which was then compromised. It's also possible attackers used info-stealer malware on an employee's workstation.T1078 - Valid Accounts: The attackers used the stolen credentials to log in and perform the transfers. The use of valid credentials makes the activity appear legitimate, delaying detection. The impact is direct financial theft.No specific Indicators of Compromise (IOCs), such as the malicious wallet addresses, were provided in the source articles.
Enforce mandatory MFA on all accounts with access to financial or cryptocurrency assets.
Mapped D3FEND Techniques:
Implement multi-signature (multi-party) authorization for all cryptocurrency transactions, requiring approval from multiple individuals.
Store private keys and sensitive credentials in Hardware Security Modules (HSMs) or secure vaults, not in scripts or configuration files.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats