Summary: Social engineering accounts for majority of crypto TVL exploits in 2025, report shows

Published: 2 months and 1 day ago
Based on article from AMBCrypto

The cryptocurrency landscape in 2025 has been marked by significant financial losses, as illicit activities continue to evolve and adapt. While billions have been siphoned from the crypto ecosystem, the dominant methods of attack have seen a notable shift, moving away from purely technical vulnerabilities to exploit human and operational weaknesses. This recalibration in attack vectors demands a fundamental re-evaluation of security strategies across the industry.

The Shifting Landscape of Crypto Exploits

This year, exploits alone accounted for over $2.53 billion in losses, with broader theft figures pushing the total stolen cryptocurrency to between $2.7 billion and $3.4 billion, according to industry reports. A critical insight from Sentora data highlights that social engineering now stands as the predominant attack technique, responsible for a staggering 55.3% ($1.39 billion) of exploit-related value. This includes methods such as phishing, malware, and inadequate credential management, leading to private key compromises that contributed 15% ($0.37 billion) to the overall losses. This clearly indicates that adversaries are increasingly targeting human errors and operational flaws rather than just code vulnerabilities. The reason behind this shift is attributed to advancements in automated auditing, formal verification, and protocol safety tooling, which have made large-scale smart contract vulnerabilities less common. Consequently, attackers have pivoted towards exploiting users and privileged access. North Korea-linked hacking groups have emerged as the most prolific threat actors, responsible for an estimated $2.02 billion in stolen crypto this year—a 51% increase from 2024. A prime example is the record-setting $1.4 billion exploit of the Bybit exchange, largely attributed to these state-sponsored groups.

Prioritizing Human-Centric Security

The implications of this data for the cryptocurrency industry are profound. Mitigation efforts in 2025 and beyond must prioritize human and operational security over solely technical fixes. This necessitates a robust focus on improving user security education, implementing stringent key management practices, and upholding strong operational hygiene across all platforms, including exchanges, custodians, and individual wallet providers. As attackers bypass complex protocol code to target the human element, enhancing these foundational aspects of security is paramount to significantly reduce future losses and safeguard the integrity of the crypto ecosystem.

Cookies Policy - Privacy Policy - Terms of Use - © 2025 Altfins, j. s. a.