A futuristic cityscape with tall, colorful
Crypto

‘GothFerrari’ gets 78 months as prosecutors detail $250M crypto theft ring

Prosecutors said the group escalated to home break-ins for hardware wallets when remote access failed.

Federal prosecutors sentenced Marlon Ferro, a 20-year-old from Santa Ana known online as “GothFerrari,” to 78 months in prison for his role in a RICO crypto theft conspiracy. The case narrative describes a theft playbook that moved from remote compromise to physical burglaries aimed at hardware wallets when victims could not be coerced or hacked.

Key Takeaways

  • Marlon Ferro, 20, was sentenced to 78 months in federal prison, three years of supervised release, and ordered to pay $2.5 million in restitution.
  • Prosecutors described a multi-state and overseas conspiracy that operated from late 2023 to early 2025 and defrauded victims of more than $250 million.
  • The group allegedly used Ferro as an “instrument of last resort” to steal hardware wallets through home break-ins when remote hacking or persuasion failed.
  • Prosecutors tied Ferro to a February 2024 Texas burglary involving a hardware wallet holding about 100 BTC and to a later New Mexico break-in captured on home surveillance.

‘GothFerrari’ Sentenced: 78 Months, Supervised Release, and $2.5M Restitution

Marlon Ferro (20, Santa Ana, California), known online as “GothFerrari,” was sentenced to 78 months in federal prison, three years of supervised release, and ordered to pay $2.5 million in restitution, the US Attorney’s Office for the District of Columbia said on May 7, 2026.

Ferro pleaded guilty in October 2025 to participating in a Racketeer Influenced and Corrupt Organizations (RICO) conspiracy. RICO is designed for enterprise-style cases, where prosecutors argue a coordinated group committed a pattern of crimes rather than a one-off theft.

Prosecutors framed the broader operation as a crypto theft ring that defrauded victims of more than $250 million and ran from late 2023 to early 2025, with members across California, Connecticut, New York, Florida, and overseas. The investigation was led by the FBI and IRS Criminal Investigation.

From Social Engineering to Home Invasions: Why Hardware Wallets Became the Target

The trader-relevant detail is not the luxury spending. It is the escalation path.

US Attorney Jeanine Ferris Pirro wrote that “Marlon Ferro served as the criminal enterprise’s instrument of last resort,” describing a workflow where co-conspirators first attempted to talk victims into surrendering crypto or hack accounts remotely. When victims kept funds on hardware wallets, prosecutors said the group shifted incentives from digital compromise to physical theft.

A hardware wallet stores private keys offline, which can make remote theft harder. The second-order effect is obvious: if remote access fails, attackers may pivot to coercion, burglary, or targeting the recovery information and devices themselves.

Texas 100 BTC Theft and the New Mexico Brick Break-In: The Operational Details Prosecutors Highlighted

Prosecutors tied Ferro to a February 2024 incident in Winnsboro, Texas, where they said he traveled to a victim’s home, broke in, and stole a hardware wallet holding about 100 BTC worth more than $5 million at the time.

Months later, prosecutors said Ferro flew to New Mexico, staked out a residence for days, and used a brick to smash his way inside. Co-conspirators allegedly monitored the victim’s location through the victim’s iCloud account, and a home surveillance camera recorded the burglary.

That New Mexico description matters because it is not an onchain failure mode. It is an offchain account-compromise problem that enabled real-world targeting, reinforcing that custody risk spans cloud logins, identity documents, and location data as much as it spans smart contracts.

Security Backdrop: April 2026 Hack Losses and the Onchain–Offchain Attack Surface

The sentencing lands in a market where security shocks remain lumpy and dominated by a small number of large events. DefiLlama data cited April 2026 crypto hack losses at $629.7 million, driven largely by KelpDAO’s $293 million exploit and Drift Protocol’s $280 million hack, together accounting for more than 90% of the month’s losses.

Chainalysis security head Yaniv Nissenboim said April’s surge “reflects a shift toward sophisticated attacks targeting the infrastructure connecting onchain protocols to offchain systems.” The Ferro case fits that same onchain–offchain theme from the user side: cloud access and identity tooling can be the bridge from digital compromise to physical loss.

Next signals are procedural and evidentiary. Any additional indictments, pleas, or sentencings tied to the late-2023-to-early-2025 conspiracy would clarify whether prosecutors are building a wider enterprise case. More detail on how “more than $250 million” in victim losses was calculated, and how that relates to Ferro’s $2.5 million restitution order, would also sharpen the financial picture. On the protocol side, follow-on disclosures from KelpDAO and Drift Protocol, including post-mortems and remediation timelines, will matter for whether April’s loss concentration was an outlier or a repeatable pattern.

I read this sentencing as a clean reminder that “self-custody” is not a single risk bucket. The threshold that matters is whether attackers keep treating hardware wallets as a hard stop, or whether more crews decide the workaround is offchain compromise plus physical access, like the iCloud-tracking allegation prosecutors described.

This looks more like a sentiment catalyst than a fundamental shift for market structure, but it does change holder behavior at the margin. If follow-on cases expand the same conspiracy and courts publish clearer loss and restitution math, the setup starts to look structural rather than narrative-driven, because it would confirm a scalable playbook that turns digital targeting into real-world extraction.

Sources