MISTRIAL: Jury Deadlocks in MIT Grad Brothers’ $25M Crypto Heist Case

By Katie Williams

Published on:

MISTRIAL: Jury Deadlocks in MIT Grad Brothers' $25M Crypto Heist Case

A federal judge has declared a mistrial in the highly-anticipated case against two MIT-educated brothers accused of executing a first-of-its-kind scheme to steal an estimated $25 million worth of cryptocurrency from the Ethereum blockchain.

Thank you for reading this post, don't forget to subscribe!

The jury, after a complex three-week trial, informed U.S. District Judge Jessica Clarke in Manhattan that they were unable to reach a unanimous verdict on the charges of wire fraud and money laundering against Anton and James Peraire-Bueno.

The Core Conflict: Fraud vs. Trading Strategy

Prosecution (U.S. Government)Defense (Peraire-Bueno Brothers)
AllegationThe brothers plotted for months to manipulate the Ethereum blockchain’s validation protocols (MEV-boost) to execute a “high-speed bait-and-switch” transaction.The maneuver was a novel and successful “trading strategy,” not fraud, executed in the unregulated, competitive environment of the blockchain.
ActionAccused of fraudulently gaining access to pending transactions and altering the movement of funds.Argued they simply “outsmarted some predatory automated trading bots” using superior coding skills.
TimelineThe alleged heist took just 12 seconds in April 2023.The action was legitimate exploitation of a technological loophole, not a crime.

The case centered on whether the complex, bot-on-bot maneuver constituted wire fraud—requiring a finding of intentional deception—or was simply a sophisticated use of the open-source blockchain’s rules.

What Happens Next?

With the jury hung, the federal government now has the option to pursue a retrial of the Peraire-Bueno brothers on the same charges. Given the novelty and high-profile nature of the alleged crypto theft, a second trial is a strong possibility.

Would you like me to explain the legal implications of a mistrial, or find out more about the specific technical vulnerability (MEV-boost) at the heart of the case?