BTCC / BTCC Square / Global Cryptocurrency /
Social Engineering Emerges as Dominant Threat in Crypto Sector

Social Engineering Emerges as Dominant Threat in Crypto Sector

Published:
2025-12-27 10:31:02
22
2
BTCCSquare news:

Cybercriminals pivoted decisively toward psychological manipulation in 2025, with social engineering attacks driving a record $2.5 billion in crypto losses. Phishing campaigns, spoofed platforms, and impersonation of industry figures now eclipse technical exploits as the primary attack vector.

The shift reflects threat actors' growing sophistication—exploiting human vulnerabilities rather than code vulnerabilities. Losses surged 40% year-over-year, with fake wallet approvals and fraudulent customer support schemes accounting for 62% of incidents.

Security analysts note a troubling convergence: attackers combine blockchain-native tactics like token impersonation with traditional con artistry. One notorious operation cloned a DeFi platform's front end, siphoning $200 million from users who signed malicious contracts.

|Square

Get the BTCC app to start your crypto journey

Get started today Scan to join our 100M+ users

All articles reposted on this platform are sourced from public networks and are intended solely for the purpose of disseminating industry information. They do not represent any official stance of BTCC. All intellectual property rights belong to their original authors. If you believe any content infringes upon your rights or is suspected of copyright violation, please contact us at [email protected]. We will address the matter promptly and in accordance with applicable laws.BTCC makes no explicit or implied warranties regarding the accuracy, timeliness, or completeness of the republished information and assumes no direct or indirect liability for any consequences arising from reliance on such content. All materials are provided for industry research reference only and shall not be construed as investment, legal, or business advice. BTCC bears no legal responsibility for any actions taken based on the content provided herein.