Blog

Hackers take advantage of human behavior: Certik


Cryptocurrency hackers are moving to exploit the weaknesses in intelligent contracts and targeting users through social engineering schemes, web3 cybersecurity company Certik said.

More than $ 2.1 billion were stolen in cryptocurrency-related attacks until 2025, with a huge losses derived from pursuit compromises and phishing attacks, According to That certificate.

Crypto phishing attacks Social engineering schemes are where attacks share fraudulent links to steal sensitive information of victims, such as private keys to crypto wallets.

Increasing the number of social engineering attacks suggests hackers are moving the attack vectors, according to Ronghui Gu, Certik co-founder.

Source: Certik

Related: Coinbase data can put users in physical risk: TechCrunch Founder

The Certik noticed a transfer of attack patterns from intelligent contracts and weaknesses to blockchain infrastructure in exploiting loopholes in human behavior, GU told Cointelegraph during the reaction of the chain -day -day X -day spaces X Show On June 2, adding:

“Most of this $ 2.1 billion is caused by purse compromises, basic mismanagement, and operational issues.”

Costs phishing scam The crypto industry of more than $ 1 billion over the entire 296 incident in 2024, making them the most expensive vector attack for the industry, Certik said.

Source: Cointelegraph

Cybersecurity’s expert comments only came one month after a Social engineering scheme Saw $ 330.7 million worth of bitcoin (Btc) stolen from the purse of an elderly US individual, Cointelegraph reported on April 30.

Social Engineering Schemes Address of poisoning Do not require any hacking. Instead, the attacks are cheating on victims of sending possessions to deceptive wallet addresses.

Related: Hoskinson promises to be audited, is ‘deeply injured’ by $ 600m Cardano Treasury Claims

Hackers always target the weakest link

As the social engineering schemes rise is about signing, it may be a signal of more stable decentralized financial protocols (DEFI).

“Attacks always target the weakest point,” GU explained, adding certik:

“The wise contracts or blockchain code itself is the weakest point, but now the feeling of attacks are like weak points can come from human behavior rather than code.”

GU said the industry should now invest in better purse security, control control, real-time transaction monitoring, and simulation tools to reduce future incidents.

The lion portion of the stolen value in 2025 derived from $ 1.4 Billion Bybit Exchange Hack In Feb. 21, when the shame North Korean Lazarus Group presented the largest exploitation In the history of crypto.

One incident cost more than 60% of the amount lost to all crypto hacks in 2024, when the industry saw $ 2.3 billion stolen throughout 760 onchain security incidents, According to In the annual Hack3D report of Certik.

https://www.youtube.com/watch?v=kynq5Yofkwo

Magazine: Coinbase Hack shows the law probably won’t protect you: here’s why