
Two California teenagers aged 16 and 17 drove over 600 miles to Arizona, disguised as delivery personnel to carry out a violent home invasion robbery targeting $66 million worth of cryptocurrency. Authorities seized restraints and 3D-printed guns after their arrest. Investigations show that a mysterious individual orchestrated the crime via Signal and provided $1,000 in funding.
According to court records, the suspects, aged 16 and 17, drove more than 600 miles from San Luis Obispo County and arrived at a residence in the Swettwater Ranch community on the morning of January 31. They wore delivery uniforms similar to those of freight companies, attempting to approach the target home under the guise of normal deliveries. This disguise tactic is increasingly common in home invasion cases, as it can reduce victims’ defenses.
Investigators say that after forcing their way into the residence, they bound two adults with tape and demanded access to digital assets. One victim denied holding any cryptocurrency, and the situation escalated into a physical altercation. The violence escalation indicates the suspects lacked experience and were insufficiently prepared; professional criminal organizations typically conduct more thorough target verification and risk assessment.
Police responded quickly after receiving the call, finding one adult son calling emergency services elsewhere in the house. Officers arrived to find a struggle in progress, with a victim screaming. The suspects fled in a blue Subaru but were shortly stopped in a dead-end street. The swift police response prevented the robbery from escalating into more serious violence.
Authorities recovered restraints, tape, stolen license plates, and a 3D-printed gun without ammunition. It is unclear whether the gun is operational. The emergence of 3D-printed firearms reflects technological infiltration into criminal activities, as these weapons can bypass traditional background checks, posing new challenges for law enforcement.
Both teenagers were initially detained at juvenile detention, but prosecutors plan to try them as adults. Both face eight charges, including kidnapping, serious assault, and home invasion, with the older suspect also facing charges of unlawful escape. They were later released on $50,000 bail and are wearing electronic monitoring devices.
Investigators say the younger suspect told police that they recently met and were instructed by an unknown person communicating via encrypted platform Signal. The contact, referred to only as “Red” and “8,” allegedly provided an address and transferred $1,000 to purchase disguises and equipment at retail stores. This operational pattern demonstrates a trend of organized crime networks recruiting and directing young offenders using digital tools.
Signal is a messaging app known for end-to-end encryption, making it a preferred tool for criminals due to its high privacy protections. Law enforcement finds it difficult to trace communications on Signal, providing a secure layer for behind-the-scenes operators. The anonymity of aliases like “Red” and “8” further complicates investigations, indicating these operators have some anti-tracking awareness.
The suspects also claimed they were invited to participate after being asked to “kidnap” someone to obtain cryptocurrency, and were forced into the crime. Legally, this could constitute duress defense, but considering they drove over 600 miles voluntarily and prepared disguises, courts are unlikely to accept such a defense. More likely, they were lured with promises of quick large sums of money.
Disguise tools: Freight uniforms, stolen license plates
Restraint tools: Ties, tape
Weapons: 3D-printed gun (no ammunition)
Transport: Blue Subaru
Digital evidence: Signal communication records, $1,000 transfer
This case reflects the rising trend of so-called “Wrench Attacks,” where assailants threaten cryptocurrency holders with a wrench to force them to reveal private keys. Security researcher Jameson Lopp’s public database estimates about 70 such incidents in 2025, a significant increase from the previous year. The Scottsdale home invasion is the first recorded case in the U.S. in 2026, but many unreported incidents are believed to have occurred.
The term “Wrench Attack” originates from a classic internet comic scene illustrating that the simplest way to crack crypto is to threaten the holder with a wrench to force password disclosure. In the crypto space, such attacks are especially effective because once the attacker obtains the private key or seed phrase, assets can be transferred instantly and irreversibly, with little chance of traceability. Unlike traditional bank robberies, crypto thefts do not require complex money laundering; assets can be moved immediately to untraceable wallets.
Security analysts say criminals increasingly exploit leaked personal data to identify targets and recruit young offenders online to reduce detection difficulty. Investigators note that recent industry data breaches involving customer information—such as names, addresses, and transaction amounts—have increased risk exposure. Many crypto exchanges and wallet providers have experienced data leaks, providing detailed target lists for criminals.
This trend poses a serious threat to high-net-worth crypto holders. Unlike traditional assets, crypto holdings often lack physical security, and the holder’s identity and approximate asset size can be identified through on-chain analysis and leaked data. Organized crime groups use this information, combined with social media investigations, to precisely target and plan home invasions.
This case highlights an unsettling trend: behind-the-scenes operators using young people to commit violent crimes. The two high school students may have been promised quick large sums of money, but in reality, they became disposable pawns in a larger criminal network. Even if arrested, the true masterminds “Red” and “8” remain at large, continuing to recruit new young offenders.
This operational model presents significant challenges for law enforcement. Young offenders often lack experience and are more easily apprehended, but their knowledge of the behind-the-scenes organizers is limited. Encrypted communication tools and crypto payment systems make tracking funds and communications extremely difficult. Even if the perpetrators are arrested, the actual organizers can continue operating.
Authorities have not yet linked this incident to another crypto-ransomware case that occurred the same day in Tucson (about two hours’ drive away). However, two crimes targeting crypto holders happened in relatively close regions on the same day, which may not be mere coincidence. Investigators are assessing whether these cases are connected within the same criminal network.
Stay Low-Profile: Avoid publicly sharing crypto holdings on social media
Use Multi-Signature Wallets: Prevent single private key leaks from risking assets
Physical Security: Install security systems and surveillance cameras
Asset Diversification: Do not store all assets in a single hot wallet
Emergency Protocols: Prepare decoy wallets with small funds for coercion situations
Although the suspects are minors, prosecutors intend to try them as adults, which could lead to much harsher penalties than juvenile court. The charges of kidnapping, serious assault, and home invasion could result in decades of imprisonment in Arizona. The older suspect also faces additional charges of unlawful escape, further increasing potential sentences.
Bail set at $50,000 and electronic monitoring indicate the court views them as risks but not the highest danger level. However, given the interstate nature of the crime and violence involved, prosecutors may seek severe sentences at trial. Defense may emphasize the suspects’ age and manipulation by the behind-the-scenes operators, but such defenses are limited against clear evidence of violent home invasion.
This case may set a legal precedent for crypto-related violent crimes. As such incidents increase, law enforcement and legislators are exploring whether to establish specialized legal frameworks for crypto-related offenses.
Related Articles
7 Malaysian police officers threaten and extort Chinese tourists, forcing them to transfer 352,000 yuan in cryptocurrency
SBF Denies FTX Bankruptcy in Prison, Reveals Truth, and $8 Billion Funding Gap Sparks New Crypto Controversy
SBF account claims FTX has never gone bankrupt: Lawyer filed a false bankruptcy claim after takeover for profit
Xinbi is still operating after the crackdown, with a trading volume of $17.9 billion.
Assisting Turkey in freezing $1 billion in assets, Tether's compliance approach has changed. The new measures aim to support Turkey's efforts to combat financial crimes and enforce sanctions. Tether is now implementing stricter verification processes and collaborating more closely with regulatory authorities to ensure compliance with international standards. This shift reflects a broader move within the industry to enhance transparency and accountability in digital asset management.