News
Claude Helped Recover $400K in Bitcoin Locked in a Forgotten Wallet for 11 Years

Image: Flickr / Wikimedia Commons

Claude Helped Recover $400K in Bitcoin Locked in a Forgotten Wallet for 11 Years

A pseudonymous X user credited Anthropic's AI with solving a technical wallet recovery problem that defeated brute-force tools and professional services for over a decade.

Brian Weerasinghe
May 14, 20264 min read

This article was produced by the AETW editorial team.

A Bitcoin holder known as @cprkrn recovered 5 BTC worth roughly $400,000 on May 13, 2026, after using Anthropic's Claude to dig through 11 years of old computer files and fix a bug in a password recovery tool.

A Decade-Old Problem, Solved in a Day

On May 13, 2026, a pseudonymous X user known as @cprkrn posted one of the more striking moments crypto Twitter has seen in recent memory. He had just recovered 5 BTC, worth roughly $400,000 at current prices, from a wallet he had been locked out of since around 2015. The post, which tagged Anthropic and CEO Dario Amodei by name, hit 14 million views by the following day.

The backstory is straightforward enough. While in college, @cprkrn changed the password to his Bitcoin wallet while intoxicated and forgot it entirely. He still had an old mnemonic phrase, but it no longer unlocked the current wallet file. Over the following years, he burned through roughly 7 trillion password combinations using tools like btcrecover and Hashcat, spent around $250 on professional recovery services, and came up empty every time.

What Claude Actually Did

What Claude Actually Did

Source: X - cprkrn

The breakthrough came when @cprkrn, out of options, uploaded the entire contents of his old college computer into Claude. The AI located an older wallet backup file from December 2019 that predated the password change. That older file could be decrypted with the mnemonic phrase he had been holding onto the whole time.

Claude also identified a bug in how btcrecover was handling the decryption. The tool was concatenating a shared key and the password in the wrong order, which had been causing every prior recovery attempt to fail silently. Once Claude corrected the logic, ran the updated process, and extracted the private keys in Wallet Import Format, the output read: 'PRIVATE KEYS DECRYPTED! WE GOT IT!!! THE 5 BTC IS YOURS!' The keys matched the target address exactly. The 5 BTC, received on April 1, 2015 and untouched on-chain since, were swept out the same day.

It is worth being precise about what happened here. Claude did not break Bitcoin's cryptography, guess the password, or bypass any encryption. What it did was perform what amounts to digital archaeology on a disorganized archive of old files, identify a relevant backup the user did not know existed, and debug a tool that had been silently producing incorrect results. That is still a meaningful demonstration of capability, just a different one than the viral framing implied.

The Bigger Picture for Lost Bitcoin

There are an estimated 3.8 million Bitcoin considered permanently inaccessible, according to Unchained Capital, representing roughly 19% of the total supply. Many of those coins belong to early holders who bought during the 2013 to 2016 period, moved wallet files between machines without keeping records, and no longer remember which backup corresponds to which password. With Bitcoin trading around $80,000, even a small wallet from the early days can represent six figures.

Professional recovery firms have existed for years to address this problem, typically charging 20% of recovered funds and relying on GPU clusters to test billions of password variations. Their effectiveness depends on the user having partial password knowledge or an intact, known-format wallet file. The @cprkrn case adds a different vector: using an LLM to scan unstructured archives, recognize legacy file formats, identify which backup is relevant, and surface a path that pure brute-force methods cannot find.

The experience also highlighted a practical lesson. The passwords themselves were not the bottleneck. The bottleneck was finding the right file among years of accumulated digital clutter and understanding why existing recovery tools were failing. Those are pattern-recognition and debugging tasks, which happen to be areas where large language models have real, demonstrable utility.

Security Questions Worth Asking

A smaller thread of responses raised a legitimate concern: feeding encrypted wallet files and associated credentials into a third-party AI system introduces its own risks. @cprkrn's recovery worked because he already possessed the correct older password, and Claude processed the files without any evidence of data exfiltration. But users in similar situations should think carefully about what they are uploading and to whom. Encrypted wallet files paired with any credential information represent high-value targets.

For now, the episode reads as a proof of concept. AI assistants are not replacing cryptographic security or professional recovery services, but they are reducing the technical barrier to a class of problem that previously required either deep expertise or expensive help. For the large number of early Bitcoin holders sitting on wallets they cannot open, that may be the most relevant takeaway.

Sources

Brian Weerasinghe

AI & Technology Researcher

Brian Weerasinhe is the founder and editor of AI Eating The World, where he covers artificial intelligence, tech companies, layoffs, startups, and the future of work. His reporting focuses on how AI is transforming businesses, products, and the global workforce. He writes about major developments across the AI industry, from enterprise adoption and funding trends to the real-world impact of automation and emerging technologies.

Trusted AI LeaderTrusted AI LeaderTrusted AI LeaderTrusted AI Leader
Trusted by founders and builders

The most important AI developments, distilled daily

Join the community of builders, researchers, and executives who start their morning with our curated intelligence brief.

Free, no spam, unsubscribe anytime.