South Korea arrests two over alleged theft of 22 BTC from seized-evidence holdings
South Korean police detained two suspects for allegedly stealing 22 BTC that had been seized in a 2021 hacking probe. The real story is public-sector crypto custody—and how to fix it.

Because Bitcoin
February 25, 2026
A brief headline out of Seoul is doing more than it seems: police arrested two individuals for the alleged theft of 22 BTC that had been seized as evidence in a 2021 hacking investigation. The number is small by crypto standards, but the signal is loud. When governments take custody of digital assets, the weakest link is rarely the blockchain—it’s the human and procedural perimeter wrapped around it.
The core issue isn’t theft; it’s state-grade key management Seized crypto turns law enforcement into a de facto custodian. Many agencies still treat bitcoin like a file to be stored or a device to be locked away. That mindset invites error. Coins aren’t “held” by hardware; they’re controlled by private keys and spending policies. Without institutional-grade controls—segregated duties, verifiable audit trails, and cryptographic policies—evidence custody becomes a soft target for insiders, contractors, or anyone who can socially engineer access.
What robust evidence custody should look like - Policy-anchored multisig or threshold signatures: Use a 2-of-3 or 3-of-5 scheme with keys split across independent departments (investigations, internal affairs, treasury/finance), each governed by distinct approval workflows. - Hardware-backed isolation: Keys generated and stored in certified HSMs or hardened wallets with secure elements; no hot wallets, no shared passphrases, no “one safe, one key.” - Tamper-evident process, not just tamper-resistant storage: Every action (deposit, address creation, test spend) should write to an immutable log with out-of-band verification and periodic third-party attestation. - Operational speed bumps: Time-locked outputs, spending limits, and enforced delays create space for detection before funds can move, even if a threshold is compromised. - People and process hygiene: Background checks, rotation of signers, mandatory vacations, red-team drills, and clear sanctions policy reduce collusion and complacency risk. - Forensics-grade segregation: Each case gets its own addresses and policies; no co-mingling across investigations to minimize blast radius and simplify provenance.
Why these lapses keep happening - Tooling gaps: Many public agencies still rely on ad hoc hardware wallets configured by a small technical group. That concentrates knowledge and control, which is efficient until it isn’t. - Psychological shortcuts: When evidence “just sits there,” teams normalize risk, overlook key refresh cycles, and skip dual-control because “it’s inconvenient.” - Procurement inertia: Buying compliant HSMs and managed custody services often requires budget cycles and certifications that lag the threat landscape. - Ambiguity around ownership and accountability: If finance “owns” the assets, investigations “touch” the wallets, and IT “maintains” devices, responsibility diffuses—exactly where attackers thrive.
Why the market should care Even modest incidents erode the credibility of crypto enforcement and, by extension, judicial outcomes. Defendants can challenge chain-of-custody. Victims can question restitution. Investors see governance risk, not technology risk. This narrative affects policy: when digital assets look hard to safeguard, regulators reach for blunt tools that can stifle legitimate activity. Conversely, when the public sector demonstrates disciplined crypto custody, it de-risks the asset class for pensions, insurers, and corporates that take their cues from government-grade controls.
What to do next—practical, near-term fixes - Adopt external qualified custodians for high-value evidence under court-approved frameworks; keep investigatory access via view-only, whitelisted paths. - If self-custodying, formalize a cryptographic policy: threshold signatures, independent key ceremonies, documented recovery, and mandatory key rotation after every sensitive event. - Implement continuous monitoring: chain analytics alerts to track any movement from evidence addresses, plus internal alerting for policy-bypass attempts. - Publish redacted custody standards: sunlight raises internal bar, improves training, and signals seriousness to courts and the public.
Incidents like this will continue to surface until evidence management for digital assets is treated with the same rigor as central bank vault operations—codified policy, cryptography-enforced controls, and auditable governance. The blockchain isn’t the vulnerability; the operational layer is. South Korea’s reported arrests around 22 BTC seized from a 2021 hack probe are a reminder that crypto security is, first and foremost, a discipline—not a device.
