Kristoffer Koch Recovers 5000 BTC After Forgotten Wallet Password — 2013
SurvivedWallet passphrase was unavailable — a recovery path existed and access was restored.
Kristoffer Koch, a Norwegian engineering student, encountered Bitcoin in late 2009 while researching encryption for his university thesis. Intrigued by the emerging technology, he purchased 5000 BTC for approximately 150 Norwegian kroner ($27 USD) at a time when individual coins traded for fractions of a cent. He stored the coins in a software wallet on his personal computer and then abandoned both the investment and any record of its access credentials, treating the purchase as a casual technical experiment with negligible monetary value.
For three and a half years, the wallet remained dormant and inaccessible. In April 2013, a friend emailed Koch a newspaper article describing Bitcoin's dramatic price appreciation. The article triggered Koch's memory of his early purchase. He attempted to access his wallet but discovered he had no record of the passphrase. Rather than accept permanent loss, Koch undertook a sustained password recovery effort, eventually regaining access to his 5000 BTC holdings.
When verified, the coins were valued at approximately $886,000 USD — a 32,800x return on his original $27 investment. Koch immediately liquidated 1000 BTC and used the proceeds to purchase an apartment in Oslo's Toyen district, becoming one of the earliest documented Bitcoin millionaires. Norwegian tax records cited in domestic media indicated Koch retained approximately 60 BTC as of 2018, suggesting he had continued to divest holdings over the intervening years.
The case exemplifies both the extreme early-stage volatility of Bitcoin and the vulnerability of software-based self-custody to operator error, even when the underlying recovery mechanism (passphrase reconstruction) remains technically viable.
| Stress condition | Passphrase unavailable |
| Custody system | Software wallet |
| Outcome | Survived |
| Documentation | Present and interpretable |
| Year observed | 2009 |
| Country | Norway |
Why passphrases fail years after they are set
The failure mode documented consistently across observed cases is temporal: the passphrase is set with confidence, not used for an extended period, and then cannot be reproduced exactly when needed. A single character difference — different capitalization, an added space, a slightly different special character — produces a different wallet with a zero balance. The holder may be certain they remember the passphrase while being unable to produce the exact string that was originally set.
What makes this particularly difficult is that there is no signal at the moment of failure. A wrong passphrase does not produce an error message. It opens an empty wallet. The holder sees a zero balance and typically concludes the passphrase was wrong — but without knowing which part was wrong, or by how much.
Professional passphrase recovery services can attempt permutations when the holder has partial information: they remember the general structure, typical patterns they use for passwords, the approximate length, or that it included a specific word. Recovery from total non-recollection is not feasible.
The preventive action is to store a passphrase record — not with the seed phrase, which would defeat its security purpose, but in a separate secure location accessible to the holder and potentially a designated recovery person. A passphrase that exists only in memory has a time horizon: it will eventually be forgotten, and the timing is unpredictable.