
In a significant enforcement action against cryptocurrency-related crimes, the US Federal Bureau of Investigation confiscated over $260,000 worth of digital assets following an investigation into NFT phishing attacks. The seizure, which took place in late 2022, was made possible through collaboration with blockchain investigator ZachXBT, who provided crucial intelligence that led to the identification of the perpetrator.
According to a forfeiture document published by the FBI, the agency seized multiple high-value assets from Chase Senecal, a resident of Brunswick, Maine. The confiscated items included 86.5678 ETH (Ethereum), two premium NFTs—Bored Ape Yacht Club #9658 and Doodle #3114—and an Audemars Piguet Royal Oak Watch valued at $41,000.
This case represents a notable example of how blockchain analysis and traditional law enforcement can work together to combat digital asset crimes.
The investigation highlights the growing sophistication of NFT-related scams and the importance of blockchain forensics in tracking illicit cryptocurrency transactions. The case also demonstrates the FBI's increasing focus on cryptocurrency crimes, as digital assets become more prevalent in both legitimate commerce and criminal activities.
The breakthrough in this case came from the meticulous investigative work of ZachXBT, a pseudonymous blockchain sleuth who has built a reputation for tracking cryptocurrency scams and identifying bad actors in the digital asset space. After months of persistent tracking, ZachXBT successfully identified Chase Senecal, who operated online under the alias "HZ" or "Horror," as one of the main perpetrators behind a series of NFT and cryptocurrency phishing attacks.
ZachXBT's investigation methodology involved tracing blockchain transactions across multiple wallets and platforms, connecting seemingly unrelated addresses to build a comprehensive picture of Senecal's criminal activities. The investigator publicly shared findings in a detailed Twitter thread, explaining how transactions related to numerous NFT hacks could be traced back to specific wallet addresses controlled by Senecal.
A critical piece of evidence emerged when ZachXBT discovered that the account used to purchase the luxury Audemars Piguet watch was directly linked to addresses involved in the phishing attacks. This connection between stolen cryptocurrency funds and a high-value physical purchase provided law enforcement with a clear trail to follow. The FBI took note of these findings and subsequently executed the asset seizure operation, demonstrating the value of open-source blockchain intelligence in modern criminal investigations.
The collaboration between independent blockchain investigators and federal law enforcement represents a new model for combating cryptocurrency crimes, where technical expertise from the crypto community complements traditional investigative methods.
The investigation revealed a sophisticated operation involving multiple attack vectors commonly used in cryptocurrency scams. According to the summary of the investigation, Senecal's criminal activities began when he purchased access to a Twitter panel from an individual known as "Cam," a SIM swapper, in mid-2022. This access allowed Senecal to compromise Twitter accounts belonging to prominent NFT projects and individuals within the cryptocurrency community.
Once Senecal gained control of these accounts, he used them to execute phishing attacks targeting NFT holders. The typical attack pattern involved posting fraudulent links or announcements from compromised accounts, tricking followers into connecting their cryptocurrency wallets to malicious websites. When victims attempted to interact with what appeared to be legitimate NFT drops or giveaways, their digital assets were stolen.
Beyond Twitter account compromises, ZachXBT's investigation revealed that Senecal was also involved in attacking Discord servers—platforms widely used by NFT communities for communication and coordination. The address that Senecal used to pay for the luxury watch was found to be connected to numerous Discord server attacks, further establishing the scope of his criminal activities.
The stolen funds were then laundered through various cryptocurrency addresses before being used to purchase high-value items like the Audemars Piguet watch and premium NFTs. This attempt to convert stolen digital assets into luxury goods ultimately became Senecal's downfall, as it created a traceable connection between the criminal activities and real-world transactions.
ZachXBT's investigation uncovered that Senecal was not operating alone but was part of a larger criminal network responsible for a multi-million dollar cryptocurrency scheme. The investigator claimed that this group had compromised more than 600 Discord servers and over 12 Twitter accounts, affecting numerous prominent figures and projects in the NFT space.
Among the victims of Senecal's attacks were high-profile accounts belonging to the NFT project JRNY Club and animator DeeKay Kwon. These compromises resulted in significant financial losses for community members who trusted announcements from these accounts. The scale of the operation demonstrates how organized cryptocurrency crime has become, with criminals developing specialized skills in social engineering, technical exploitation, and money laundering.
This case is part of a broader pattern of FBI involvement in cryptocurrency-related enforcement actions. In a related development, the FBI was also involved in the arrest of Anatoly Legkodymov, the Russian founder of Hong Kong-registered crypto exchange Bitzlato, who faced charges for processing $700 million in illicit funds. These cases collectively signal increased regulatory scrutiny and law enforcement focus on cryptocurrency crimes.
The successful seizure of assets in the Senecal case sends a strong message to would-be cryptocurrency criminals that blockchain transactions, despite their pseudonymous nature, can be traced and that law enforcement agencies are developing the capabilities to pursue digital asset crimes effectively. It also highlights the importance of community-driven security efforts, as independent investigators like ZachXBT play a crucial role in identifying and exposing bad actors in the cryptocurrency ecosystem.
For the broader crypto community, this case serves as a reminder of the ongoing security challenges in the NFT and digital asset space, emphasizing the need for continued vigilance, improved security practices, and collaboration between technical experts and law enforcement to combat increasingly sophisticated cyber crimes.
The FBI can seize crypto and NFTs through legal authority when assets are tied to criminal activity, money laundering, or fraud. Law enforcement obtains court orders to freeze wallets and accounts, then transfers seized assets to government custody for forfeiture proceedings.
The Twitter user provided a tip-off that led to the FBI's seizure of $260,000 in NFTs and cryptocurrencies. The user reported suspicious blockchain activities and wallet addresses associated with illegal transactions, enabling law enforcement to track and recover the digital assets.
Maintain compliance with local regulations, report taxable income accurately, use legitimate wallets with proper KYC verification, avoid suspicious transactions, and keep detailed records of all acquisitions and holdings to demonstrate legal origin.
Law enforcement defines cryptocurrencies as digital assets with transaction records on blockchain networks, while NFTs are unique tokenized digital items. Both are tracked through blockchain analysis tools that monitor wallet addresses, transaction patterns, and exchange flows to identify illicit activities and asset recovery.
This seizure highlights key crypto security risks: inadequate wallet security practices, phishing and social engineering vulnerabilities, compromised private keys, insufficient due diligence on counterparty platforms, and the need for multi-signature authentication and cold storage solutions for significant holdings.
Comply with local regulations, report taxes accurately, use regulated platforms, verify counterparty identity, maintain transaction records, avoid sanctioned assets, and consult legal professionals for jurisdiction-specific guidance.











