British sprinter Chijindu “CJ” Ujah was formally charged with conspiracy to defraud after being arrested on April 29 as part of a wider cryptocurrency fraud investigation. Authorities allege an organized group used impersonation and social-engineering tactics to obtain wallet seed phrases and drain victims’ digital assets.
The case matters because it highlights a persistent non-technical threat to crypto custody. Investigators say the alleged scheme did not rely on a protocol exploit, but on persuading victims to surrender the master keys to their wallets, including one reported loss of £300,000.
Police Allege Seed Phrase Theft Through Impersonation
The investigation was led by the Eastern Region Special Operations Unit, with support from multiple police forces. Officers carried out coordinated raids in Kent, Essex, London and Wakefield on April 29, arresting ten suspects as part of a multi-jurisdictional enforcement operation.
Prosecutors announced charges on May 10, 2026, naming Ujah among the accused. Fellow sprinter Brandon Mingeli was also charged, while investigators allege the group posed as law-enforcement officers and cryptocurrency company representatives to gain victims’ trust.
According to authorities, the alleged fraud centered on seed phrases, which give full control over crypto wallets. Once those credentials are compromised, on-chain transfers can become irreversible, making recovery difficult even when investigators identify the fraud pattern.
Ujah, 32, has been released on bail and is due to appear at Chelmsford Crown Court on May 28, 2026. The criminal case is separate from his earlier sporting disciplinary matter, a 22-month doping ban after the Tokyo Olympic cycle.
Custody Risk Extends Beyond Technical Exploits
The case reinforces the operational risk created by social engineering. Even sophisticated custody systems can be undermined when users or counterparties are tricked into revealing private recovery credentials.
Service providers should strengthen client communications around one basic control point: legitimate platforms and authorities will never request seed phrases or private keys. That message needs to be embedded into onboarding, support flows and incident-response playbooks.
The investigation also underscores the need for clear escalation channels with law enforcement. When social-engineering losses occur, rapid triage can help preserve evidence, support forensic tracing and improve the chances of coordinated recovery efforts.
Institutional operators should review custody governance, counterparty notification procedures and off-ramp controls. Stronger internal protocols can help firms respond when fraudulent transfers intersect with exchanges, brokers or payment rails.
Ujah’s May 28 court appearance will determine the next procedural step in the prosecution. Beyond the individual defendants, the case shows that market integrity depends on user protection, reporting discipline and cross-agency coordination, not only smart-contract security.
