On Sept 9, 2025, the DOJ filed a civil forfeiture action to seize over $5 million in Bitcoin tied to SIM-swap thefts. Attackers rerouted phone numbers, beat weak SMS 2FA, and pushed funds through gambling sites and rapid in/out hops to add “noise.” None of it erased the trail.
Why this matters
- SMS codes are fragile: control of your number can equal control of your accounts.
- Noise ≠ invisibility: circular flows and quick exchange hops still leave links.
- Civil forfeiture preserves value: fast filings can freeze suspected proceeds before they scatter.
What’s inside the full guide
- How SIM-swaps actually work and why crypto holders are prime targets
- Step-by-step hardening: retire SMS 2FA, set a carrier port-out PIN, segment devices/email, tighten withdrawal allow-lists
- First-hour response if your number is hijacked (carrier, email, accounts, evidence, reports)
- Signals and controls for banks/fintechs/exchanges to spot and stop SIM-swap-driven outflows
- Realistic recovery paths: interdiction at exchanges, civil preservation, restitution
Read the full guide on BlockDivers → https://blockdivers.com/the-doj-moves-to-seize-5-million-in-btc/