Bitcoin Depot, the largest Bitcoin ATM operator in the United States, has confirmed that attackers stole approximately 50.903 Bitcoin — valued at roughly $3.665 million — after compromising credentials tied to the company’s digital asset settlement accounts. The company disclosed the incident in a Form 8-K filing with the U.S. Securities and Exchange Commission on April 8, 2026.
How the Attack Unfolded
According to the SEC filing, Bitcoin Depot detected unauthorized access to its internal IT systems on March 23, 2026. However, on-chain analysis published by independent researcher ZachXBT indicates the suspicious outflows actually occurred on March 20 — 3 days before the company identified the intrusion. The stolen funds were traced to KuCoin deposit addresses.
That 3-day window is significant. Settlement account credentials used to move Bitcoin directly from corporate wallets represent some of the highest-value access an attacker can obtain inside a cryptocurrency infrastructure company. Three days of undetected access against accounts of that sensitivity points to gaps in real-time transaction monitoring and anomaly detection on outbound transfers — controls that should have flagged a transfer of 50 Bitcoin from corporate settlement accounts almost immediately.
The attacker obtained those credentials and used them to transfer Bitcoin directly from company-controlled wallets. Bitcoin Depot did not disclose the method by which the credentials were compromised, noting the investigation remains ongoing. The company activated its incident response protocols upon detection, engaged external cybersecurity experts, and notified law enforcement.
SEC Disclosure and the Material Incident Standard
Bitcoin Depot is publicly traded on the Nasdaq under the ticker BTM, which subjects it to the SEC’s cybersecurity disclosure rules introduced in 2023. Under those rules, public companies must disclose material cybersecurity incidents within 4 business days of determining that an incident is material. Bitcoin Depot detected the breach on March 23 but did not determine materiality until April 6 — the point at which the company assessed the potential reputational, legal, regulatory, and response costs as significant enough to require disclosure. The 8-K was filed on April 8.
The materiality determination timeline is notable. Companies have some flexibility in when they classify an incident as material, but the gap between detection on March 23 and the materiality determination on April 6 — nearly 2 weeks — may draw regulatory scrutiny, particularly given that $3.665 million in corporate assets had already been transferred out before the breach was even detected.
Scope and Customer Impact
Bitcoin Depot operates more than 25,000 Bitcoin ATM and BDCheckout locations worldwide, making it one of the largest crypto infrastructure operators in the country. The company stated the incident was contained to its corporate environment and did not affect customer platforms, ATM operations, divisions, systems, or data. There is no current evidence that customer information was accessed or exfiltrated.
Bitcoin Depot acknowledged it carries cybersecurity insurance that may offset some losses but cautioned that full recovery is not guaranteed. A preliminary loss of $3.665 million has been recorded, though the final financial impact may change as the investigation progresses.
Credential Theft Remains the Primary Risk Vector
The Bitcoin Depot breach is consistent with a broader pattern in the cryptocurrency sector where attackers bypass on-chain security entirely by targeting the off-chain infrastructure surrounding digital asset operations. Rather than exploiting a blockchain protocol or smart contract flaw, the attacker simply obtained valid credentials and transferred funds through legitimate account access — an approach that is harder to detect and leaves fewer forensic traces than a technical exploit.
This incident follows Bitcoin Depot’s disclosure of a separate prior breach in which customer data was exposed, with that earlier disclosure delayed by approximately one year due to an ongoing law enforcement investigation. That breach targeted customer information rather than corporate funds. The two incidents together illustrate that both customer data and corporate treasury present distinct but equally significant attack surfaces for cryptocurrency infrastructure operators.












