CustodyStress
Archive › Documentation absent
Part of the CustodyStress archive of observed Bitcoin custody incidents
CS-01349

Hidden wallet discovered — hardware wallet (2025)

Survives
Case description
A 2025 recovery case involved a Bitcoin holder who had engraved their seed phrase on a steel plate but had transposed two of the words during the engraving process. The error was not discovered until the holder attempted to restore their wallet after a device failure. Having verified the seed phrase once at setup in 2019 and never since, the holder had not detected the transposition. A recovery specialist built a targeted brute-force attack using the 23 known correct words and testing all valid BIP39 words in the two transposed positions. The correct combination was identified within 48 hours, and the wallet was restored. The case highlighted the importance of verifying seed phrase backups by actually restoring to a test device.
Custody context
Stress conditionDocumentation absent
Custody systemHardware wallet (single key)
OutcomeSurvives
DocumentationUnknown
Year observed2025
CountryUnited States
Structural dependencies observed
Single point of failure
Outcome interpretation
Access remained possible under the reported conditions.
Source
Privately Reported
Evidence type
News article
Related cases involving documentation absent
193 cases involve documentation absent 274 cases involve hardware wallet (single key) View archive statistics →
This archive documents observed custody survivability failures. It does not attempt to document all Bitcoin losses or security incidents. Submit a case
← All cases
Framework references
Terms guide
Survives
Access remained possible under the reported conditions.
Constrained
Access remained possible, but only with delay, dependence, or significant difficulty.
Blocked
Access was not possible under the reported conditions.
Indeterminate
There was not enough information to determine the outcome.
Single-person knowledge
Recovery depended on information or capability held by one individual who was unavailable.
Institutional dependence
Recovery depended on a third-party institution or service that was inaccessible or uncooperative.
Documentation gap
Recovery depended on instructions that were missing, incomplete, or unclear.
Authority mismatch
The person with legal authority to act did not have operational access, or vice versa.