Cryptocurrency hackers move out of the usage of Smart Contract weak spots and goals at users through social engineering systems, said Web3 Cybersecurity Company Certik.
So far, greater than $ 2.1 billion have been stolen into cryptocurrency attacks in 2025, with the vast majority of the losses of temporary pockets and phishing attacks, in line with Certik.
Krypto -Phishing attacks are social engineering programs during which attackers share fraudulent compounds as a way to steal the sensitive information of the victims, comparable to the private keys to Krypto letters.
According to Ronghui Gu, the co-founder of Certik, the increasing variety of social engineering attacks suggests.
Source: Certik
Certik observed a shifting of the attack patterns of intelligent contracts and weaknesses of the blockchain infrastructure to make use of gaps in human behavior, Gu CoinTelegraph said in the course of the Daily X rooms chain response on June 2 and added:
“The majority of those 2.1 billion US dollars were attributable to compromises in containers, essential mismanagement and operational problems.”
Phishing fraud cost the crypto industry in 2024 in 296 incidents over $ 1 billion and, in line with Certik, made it the costliest attack vector within the industry.
Source: cointelegraph
The comments of the cyber security expert come only a month after Bitcoin (BTC) value 330.7 million US dollars from the wallet of an older US person got here in a social engineering program, CoinTelegraph reported on April 30.
Social engineering programs comparable to address poisoning don’t require hacking. Instead, attackers send the victims to send assets to fraudulent wallet.
Hackers at all times goal the weakest member
While the rise of social engineering programs is a signed sign, it will probably be a signal for more robust, decentralized financing protocols (Defi).
“The attacker at all times focuses on the weakest point,” said Certiks GU and added:
“Smart contracts or blockchain code itself was the weakest point, but now the attackers feel that the weakest points can come from human behavior relatively than from the code.”
GU said that the industry now had to take a position in a greater case -pocket safety, access control, monitoring transactions and simulation tools in real time as a way to reduce future incidents.
The lion's share within the stolen value in 2025 got here from the 1.4 billion dollar -Börshack on February 21, when the infamous North Korean Lazarus group staged the best exploit in crypto history.
This individual incident corresponds to greater than 60% of the worth that was lost in all crypto hacks in 2024 when the industry, in line with Certik's annual Hack3D report, stolen 2.3 billion US dollars in 760 security incidents in the protection incidents of two.3 billion US dollars.