gtag('config', 'G-0PFHD683JR');
Bitcoin

Human behavior infiltrators are exploited: CERTIK

Web3 Cybersecurity Certik said that Cryptocurrency are away from exploiting smart contracts and targeting users through social engineering plans.

More than 2.1 billion dollars in attacks related to the coded currency have been stolen in 2025, with the largest part of the losses of the concession portfolio and pure hunting attacks, According to To CERTIK.

Crystation attacks are social engineering plans where attackers share fraudulent links to steal sensitive information for victims, such as the special keys to the encryption governor.

The increasing number of social engineering attacks indicates that infiltrators change the attacks, according to the co -founder of CERTIK.

source: certificate

Related to: Coinbase data leakage can make users at an actual risk: Techcrunch founder

CERTIK has noticed a shift in attack patterns of smart contracts and weaknesses in the infrastructure infrastructure to exploit gaps in human behavior. Display On June 2, adding:

“The majority of this amount was $ 2.1 billion, resulting from the concessions of the portfolio, the main mismanagement, and operational issues.”

The coding processes cost more than a billion dollars through 296 accidents in 2024, making it the most expensive vector for this industry, according to CERTIK.

source: Cointelegraph

The comments of the cybersecurity expert came only one month after the social engineering plan that witnessed $ 330.7 million from Bitcoin (BTC) stolen from an elderly American individual portfolio.

Social engineering plans such as poisoning with titles that do not require any penetration. Instead, attackers deceive the victims to send assets to the addresses of the fraudulent portfolio.

Related to: Hoskinson returns by scrutiny, which is “severely painful” with Cardano treasury claims worth $ 600 million

The infiltrators always target the weakest link

While the rise of social engineering plans is a disturbing sign, it may be a sign of the most powerful decentralized financing protocols (Defi).

“The attackers are always weakened,” he explained, adding:

“Smart contracts or the Blockchain code themselves were the weakest point, but the attackers now feel that the weakest points may come from human behavior instead of the code.”

GU said that the industry must now invest in the security of a better wallet, control access, monitoring transactions in an actual time, and simulation tools to reduce future accidents.

The lion’s share of the stolen value in 2025 stems from the penetration of $ 1.4 billion on February 21, when the North Korean Group of Lazaros organized the largest exploitation in the date of encryption.

This individual incident constituted more than 60 % of the lost value in all encryption breakthroughs in 2024, when the industry witnessed $ 2.3 billion stolen through 760 security accidents, According to To the annual Hack3D report for Certik.

https://www.youtube.com/watch?

magazine: Coinbase Hack shows that the law may not protect you: this is the reason