$2.1B CRYPTO STOLEN IN 2025 AS HACKERS SHIFT FOCUS FROM CODE TO USERS: CERTIK
The cryptocurrency landscape is constantly evolving, and unfortunately, so are the tactics of cybercriminals. 米5月s pグローバルサービス部門pmi、予想52.3に対し最終53.7In 2025, a staggering $2.1 billion has already been siphoned from the crypto ecosystem, not primarily through intricate smart contract exploits, but through simpler, yet effective methods: targeting *you*, the user. In 2025, over $2.1B in crypto has been stolen as hackers pivot from smart contract exploits to phishing and social engineering attacks, CertiK reports. Home Trending History Notifications Subscriptions Your Videos Your Audios Your Playlists Your Posts Transfer History Watch Later Rated PostsLeading blockchain security firm CertiK has raised the alarm, revealing a significant shift in focus by hackers. This article is based on: $2.1B crypto stolen in 2025 as hackers shift focus from code to users: CertiK. Further Reading. Deepen your understanding with these related articles: Crypto token failures soar, with 1 in 4 launched since 2025 dying in Q1: CoinGecko; Multi-wallet usage up 16%, but AI may address crypto fragmentation gapThey are increasingly turning to phishing scams, social engineering tactics, and wallet compromises to pilfer digital assets.This marks a crucial change from previous years where vulnerabilities in code were the primary attack vector. $2.1B crypto stolen in 2025 as hackers shift focus from code to users: CertiK Coin Telegraph 7 minutes ago 11 Hackers are moving from smart contract vulnerabilities to exploiting human behavioural weaknesses, according to the co-founder of Web3 cybersecurity firm CertiK.Understanding this shift and taking proactive measures to protect your crypto is now more critical than ever. Solana Trump NFTs Airdropped to Crypto Dinner Guests, High Secondary Market SalesWe'll delve into the details of CertiK's findings, explore the types of attacks on the rise, and provide actionable steps you can take to fortify your defenses in this increasingly hostile digital environment. Cryptocurrency hackers are moving away from exploiting smart contract vulnerabilities and instead targeting users through social engineering schemes, according to Web3 cybersecurity firm CertiK.More than $2.1 billion has been stolen in cryptocurrency-related attacks so far in 2025, with the bulk ofAre your digital assets truly safe?This article will help you assess your risk and empower you with the knowledge to stay one step ahead of the hackers.
The $2.1 Billion Crypto Heist: A Breakdown of CertiK's Findings
CertiK's latest report paints a concerning picture of the current state of crypto security.The headline figure of $2.1 billion stolen is alarming enough, but the underlying details reveal a worrying trend.Hackers are finding it easier and more profitable to target individuals rather than spending the time and resources required to uncover and exploit complex smart contract vulnerabilities.This shift highlights the importance of user education and security awareness in the crypto space.
CertiK's co-founder, Ronghui Gu, emphasized this change during a recent interview, stating that hackers are now exploiting human behavioral weaknesses through phishing and social engineering attacks. Here s how you can stay safe from these hackers. Crypto Scams Cost $2.2B in 2025. This new warning from CertiK comes after they recently shared their big annual Hack3d Report. According to that report, more than $2.3 billion was stolen in 2025 alone through 760 different on-chain attacks.This means that even the most secure blockchain technology is vulnerable if users fall prey to these deceptive tactics.
Why the Shift?From Code Exploits to Social Engineering
The transition from targeting smart contract vulnerabilities to focusing on users is driven by several factors:
- Increased Difficulty of Smart Contract Exploits: As blockchain technology matures and smart contract auditing becomes more sophisticated, identifying and exploiting vulnerabilities in code is becoming increasingly challenging and expensive for hackers.
- Ease of Exploiting Human Psychology: Phishing, social engineering, and other user-focused attacks rely on manipulating human emotions and trust, which are often easier to exploit than technical vulnerabilities.
- Lower Risk for Hackers: User-focused attacks often involve less technical expertise and carry a lower risk of detection and prosecution for the attackers.
- Higher Potential Return: Targeting individuals can provide access to entire wallets and exchange accounts, potentially yielding a greater return than exploiting a single smart contract vulnerability.
Common Crypto Scams and How to Avoid Them
Understanding the tactics used by hackers is the first step in protecting yourself. U.S. SEC Chairman: Future Crypto Policies Will Follow Public Rule-Making ProcessHere are some of the most common crypto scams and how to avoid falling victim to them:
Phishing Attacks
Phishing attacks involve tricking users into revealing their private keys, passwords, or other sensitive information.These attacks often come in the form of:
- Fake Websites: Replicas of legitimate crypto exchanges, wallets, or other services. More than $2.1 billion has been stolen in cryptocurrency-related attacks so far in 2025, with the bulk of losses coming from wallet compromises and phishing attacks, according to CertiK. CryptoAlways double-check the URL and look for the HTTPS security certificate.
- Spoofed Emails: Emails that appear to be from trusted sources, such as exchanges or wallet providers, requesting personal information or urging you to click on malicious links. The RWA market surged more than 260% during the first half of 2025, surpassing $23 billion in total valuation. from regulatory developments in the broader crypto space. stolen in 2025 asNever click on links in emails from unknown or suspicious senders.
- Fake Social Media Accounts: Impersonating legitimate crypto projects or personalities to promote scams or collect personal information.Verify the authenticity of social media accounts before interacting with them.
How to avoid phishing:
- Always verify the authenticity of websites and emails before entering any personal information.
- Enable two-factor authentication (2FA) on all your crypto accounts.
- Use a password manager to generate and store strong, unique passwords for each account.
- Be wary of unsolicited emails or messages asking for personal information.
- Never click on links in emails or messages from unknown or suspicious senders.
Social Engineering Attacks
Social engineering attacks involve manipulating users into performing actions that compromise their security.These attacks can take many forms, including:
- Romance Scams: Building relationships with victims online and then convincing them to invest in fraudulent crypto projects.
- Investment Scams: Promising high returns on investments in fake or worthless crypto projects.
- Impersonation Scams: Posing as customer support representatives or other trusted individuals to gain access to user accounts or personal information.
How to avoid social engineering attacks:
- Be skeptical of anyone who promises guaranteed profits or high returns on crypto investments.
- Never share your private keys or passwords with anyone, regardless of their position or claims.
- Do your own research before investing in any crypto project.
- Be wary of unsolicited offers or requests for help.
- Trust your instincts.If something seems too good to be true, it probably is.
Wallet Compromises
Wallet compromises occur when hackers gain access to your crypto wallets, allowing them to steal your funds.This can happen through:
- Weak Passwords: Using easily guessable passwords or reusing passwords across multiple accounts.
- Malware: Downloading malicious software that steals your private keys or wallet information.
- Keylogger: Software that records your keystrokes, allowing hackers to capture your passwords and private keys.
- Seed Phrase Exposure: Exposing your seed phrase (recovery phrase) to hackers, either intentionally or unintentionally.
How to avoid wallet compromises:
- Use strong, unique passwords for all your crypto wallets and accounts.
- Store your private keys and seed phrases offline in a secure location.
- Use a hardware wallet for added security.
- Be careful about downloading software from untrusted sources.
- Use a reputable antivirus program to protect your computer from malware.
- Never share your seed phrase with anyone.
Protecting Your Crypto: Actionable Steps You Can Take
Now that you understand the types of attacks that are on the rise, here are some actionable steps you can take to protect your crypto assets:
- Educate Yourself: Stay informed about the latest crypto scams and security threats. On J, the EF introduced a restructured unit simply named Protocol, marking a shift in how it approaches Ethereum s long-standing scaling bottlenecks and usability issues. This piece is a guest post by blocmates, a media and research hub [ ]Article Source: news.bitcoin.comFollow reputable crypto news sources and security blogs.
- Use Strong Passwords: Create strong, unique passwords for all your crypto accounts and wallets. More than $2.1 billion worth of Bitcoin has been stolen in 2025, with hackers increasingly targeting users instead of code vulnerabilities, according to cybersecurity firm CertiK. Causes of Bitcoin losses. Ronghui Gu, co-founder of CertiK, said during a June 2 interview on Cointelegraph s Chain Reaction show thatUse a password manager to generate and store your passwords securely.
- Enable Two-Factor Authentication (2FA): Enable 2FA on all your crypto accounts to add an extra layer of security.
- Store Your Private Keys Securely: Store your private keys offline in a secure location. cointelegraph.com: Hackers are moving from smart contract vulnerabilities to exploiting human behavioural weaknesses, according to the co-founder of Web3 cybersecurity firm CertiK.Consider using a hardware wallet for added security.
- Be Wary of Phishing Attacks: Be cautious of unsolicited emails, messages, or phone calls asking for personal information.Always verify the authenticity of websites and emails before entering any sensitive information.
- Do Your Own Research (DYOR): Before investing in any crypto project, do your own research and understand the risks involved.
- Use Reputable Exchanges and Wallets: Choose reputable crypto exchanges and wallets that have a strong track record of security.
- Keep Your Software Up to Date: Keep your operating system, antivirus software, and crypto wallets up to date to protect against known vulnerabilities.
- Be Careful What You Click: Avoid clicking on links from unknown or suspicious sources.
- Report Suspicious Activity: If you suspect that you have been targeted by a scam, report it to the relevant authorities and alert the crypto community.
The Role of Security Audits and Certifications
While the focus has shifted to user-targeted attacks, the importance of secure code and smart contract audits remains paramount. Related: $2.1B crypto stolen in 2025 as hackers shift focus from code to users: CertiK DePIN poised to reshape computing infrastructure. The report adds that as DePIN adoption grows, it mayCompanies like CertiK offer security audits and certifications for crypto projects to identify and mitigate potential vulnerabilities. Trump-Backed DeFi Project WLFI Airdrops USD1 Tokens to Presale ParticipantsWhile this doesn't directly prevent phishing scams, it ensures the underlying technology is as secure as possible, reducing the risk of rug pulls or other code-related exploits.
Choosing projects that have undergone rigorous security audits and have received certifications can offer a degree of assurance, although it's not a foolproof guarantee against all risks.
The Future of Crypto Security: AI and Proactive Measures
The crypto security landscape is constantly evolving, and new technologies are emerging to help combat the growing threat of cybercrime. A recent report from CertiK, a leading blockchain security company, highlights a significant increase in crypto-related theft, predicting that by 2025, hackers could pilfer upwards of $2.1 billionArtificial intelligence (AI) is playing an increasingly important role in detecting and preventing crypto scams.AI-powered tools can analyze vast amounts of data to identify suspicious patterns and flag potential phishing attacks or fraudulent transactions.
Furthermore, proactive measures such as bug bounty programs encourage ethical hackers to identify and report vulnerabilities in crypto projects, helping to improve security before exploits can occur.
How Multi-Wallet Usage Impacts Security
The trend of multi-wallet usage, which has reportedly increased by 16%, presents both opportunities and challenges for crypto security. Hackers are moving from smart contract vulnerabilities to exploiting human behavioural weaknesses, according to the co-founder of Web3 cybersecurity firm CertiK.While diversifying your holdings across multiple wallets can limit the damage from a single compromise, it also increases the attack surface. Hackers are moving from smart contract vulnerabilities to exploiting human behavioural weaknesses, according to the co-founder of Web3 cybersecurity firm CertiK. J Home Pulse AI Chart Market MoodManaging multiple wallets requires diligent security practices and a heightened awareness of potential threats.
AI-powered solutions may eventually address the fragmentation gap by providing a unified view of your assets across multiple wallets and automatically detecting suspicious activity.
What About Regulatory Developments?
Regulatory developments in the crypto space are also playing a significant role in shaping the security landscape.Clear and consistent regulations can help to reduce fraud and scams by providing a framework for responsible innovation and investor protection.
However, regulations alone are not enough to solve the problem of crypto theft. $2.1B crypto stolen in 2025 as hackers shift focus from code to users However, this week didn t bring only positive news from the market, there were some concerning developments as well. According to a recent post on Twitter by blockchain security firm CertiK, hackers are shifting their focus away from smart contract vulnerabilities andUser education and proactive security measures are also essential to protect against evolving threats.
Real-World Examples of Crypto Scams in 2025
To illustrate the impact of these scams, let's look at a few hypothetical, but realistic, examples:
- The Fake Airdrop: A user receives an email claiming to be from a popular crypto exchange, offering a free airdrop of a new token.The email contains a link to a fake website that asks for their private key to claim the airdrop. $2.1B crypto stolen in 2025 as hackers shift focus from code to users: CertiK 11 minutes ago Hackers are moving from smart contract vulnerabilities to exploiting human behavioural weaknesses, according to the co-founder of Web3 cybersecurity firm CertiK.The user enters their key and their wallet is immediately emptied.
- The Romance Scammer: A user connects with someone online who claims to be a wealthy crypto investor.After building trust, the scammer convinces the user to invest in a fraudulent crypto project. Over $2.1 billion in crypto stolen in 2025 so far. Hackers are ditching code exploits and targeting humans with phishing and social engineering. Wallet compromises and mismanaged keysThe user sends their funds to the scammer and never sees them again.
- The Impersonation Scam: A user receives a phone call from someone claiming to be a customer support representative from their crypto exchange. $2.1B crypto stolen in 2025 as hackers shift focus from code to users: CertiK. Hackers are moving from smart contract vulnerabilities to exploiting human behavioural weaknesses, according to the co-founder of Web3 cybersecurityThe ""representative"" asks for their login credentials to help them resolve a ""security issue."" The user provides their credentials and their account is compromised.
Conclusion: Staying Vigilant in a Shifting Landscape
The fact that over $2.1 billion in crypto has been stolen in 2025 due to hackers targeting users, as reported by CertiK, is a stark reminder that the crypto security landscape is constantly evolving.The shift from code exploits to social engineering and phishing tactics highlights the importance of user education and proactive security measures.By understanding the common types of scams, following the actionable steps outlined in this article, and staying informed about the latest threats, you can significantly reduce your risk of becoming a victim.Remember, your security is ultimately your responsibility.Staying vigilant and informed is the best defense against the ever-evolving tactics of crypto criminals.Protecting your digital assets requires a multi-faceted approach, combining technical security measures with a healthy dose of skepticism and awareness.Don't let yourself become another statistic in the ongoing battle against crypto theft.Secure your crypto today!
Comments