CustodyStress
Archive › Physical coercion
Part of the CustodyStress archive of observed Bitcoin custody incidents
CS-00637

The attackers transferred 2.5 BTC before leaving.

Constrained
Case description
A Dutch Bitcoin trader was attacked in March 2019 by individuals who had obtained their home address from a data breach. The attackers posed as a courier service to gain entry and then physically assaulted the trader, demanding their hardware wallet PIN. The trader provided access under duress. The attackers transferred 2.5 BTC before leaving. Dutch police made two arrests using CCTV footage.
Custody context
Stress conditionPhysical coercion
Custody systemMobile or software wallet
OutcomeConstrained
DocumentationUnknown
Year observed2019
CountryNetherlands
Structural dependencies observed
Single point of failure
What this illustrates
There was only one way in. When that path was gone, so was access. Whether full access was ultimately possible is unclear, but significant delay or outside intervention was involved.
Outcome interpretation
Access remained possible, but only with delay, dependence, or significant difficulty.
Source
Publicly Reported
Evidence type
News article
Related cases involving physical coercion
105 cases involve physical coercion 572 cases involve mobile or software wallet View archive statistics →
This archive documents observed custody survivability failures. It does not attempt to document all Bitcoin losses or security incidents. Submit a case
← All cases
Framework references
Terms guide
Survives
Access remained possible under the reported conditions.
Constrained
Access remained possible, but only with delay, dependence, or significant difficulty.
Blocked
Access was not possible under the reported conditions.
Indeterminate
There was not enough information to determine the outcome.
Single-person knowledge
Recovery depended on information or capability held by one individual who was unavailable.
Institutional dependence
Recovery depended on a third-party institution or service that was inaccessible or uncooperative.
Documentation gap
Recovery depended on instructions that were missing, incomplete, or unclear.
Authority mismatch
The person with legal authority to act did not have operational access, or vice versa.