Social engineering accounts for majority of crypto TVL exploits in 2025, report shows

ambcryptoPubblicato 2025-12-26Pubblicato ultima volta 2025-12-26

Introduzione

In 2025, crypto theft and exploits have resulted in over $2.53 billion in losses, with broader theft estimates reaching up to $3.4 billion. Social engineering emerged as the dominant attack method, accounting for 55.3% ($1.39 billion) of total exploit-related value. Private key compromises represented 15% ($0.37 billion), while other techniques like infinite mint attacks and smart contract exploits made up the remainder. North Korea-linked hackers were the most prolific threat actors, responsible for at least $2.02 billion in stolen crypto, largely due to a $1.4 billion breach of the Bybit exchange. The data indicates a shift in exploitation focus from technical vulnerabilities to human and operational weaknesses, emphasizing the need for improved user security, key management, and operational safeguards rather than solely relying on code fixes.

Crypto theft and exploits have continued at historically high levels in 2025, with industry data showing more than $2.53 billion in losses linked to exploits this year — and broader theft figures pushing that total even higher, according to Sentora and a recent Chainalysis report.

Sentora’s latest chart on “Total TVL of Exploits 2025” breaks down how the losses occurred. It reveals that social engineering remains the dominant attack technique, accounting for 55.3 % [$1.39 billion] of exploit-related value taken so far.

Other techniques, such as private key compromise, infinite mint attacks, and smart contract exploits, together accounted for the remainder of losses.

Social engineering and human-centric attacks surge

The Sentora data highlights how the focus of exploitation has shifted. While smart contract bugs and protocol vulnerabilities remain significant concerns, social engineering now outweighs purely technical exploits by a substantial margin.

Private key compromises, which can be related to phishing, malware, or inadequate credential management, accounted for 15 % of exploit losses [$0.37 billion].

This highlights how adversaries are increasingly targeting human and operational weaknesses alongside traditional code flaws.

Industry-wide exploits tops $3B

Separate 2025 analysis by Chainalysis, corroborated by industry monitoring firms’ estimates, suggests that between $2.7 billion and $3.4 billion in cryptocurrency was stolen across all theft categories this year.

This includes large single-event breaches, personal wallet thefts, and other illicit activity.

North Korea–linked hackers again emerged as the most prolific threat actors. Chainalysis reported that at least $2.02 billion in stolen crypto this year was tied to DPRK-affiliated groups, a roughly 51% increase year-over-year from 2024 levels.

Much of this total stemmed from a record-setting exploit of the Bybit exchange, where attackers stole an estimated $1.4 billion in assets.

Exploit landscape evolving

Industry analysts say the broader trend reflects improvements in automated auditing, formal verification, and protocol safety tooling, making large smart contract vulnerabilities rarer.

Meanwhile, attackers have shifted toward tactics that exploit users and privileged access.

Chainalysis also noted a sharp increase in personal wallet thefts this year, with thousands of individual victims affected. However, those losses were smaller on a per-incident basis compared with large institutional hacks.

What this means for the ecosystem

Taken together, the data suggests that mitigating exploits in 2025 has less to do with fixing code and more to do with improving user security, key management practices, and operational hygiene across exchanges, custodians, and wallet providers.


Final Thoughts

  • Crypto losses in 2025 are being driven far more by human and operational failures than by smart contract bugs, with social engineering now the dominant attack vector.
  • As attackers increasingly bypass protocol code to target users, wallets, and access controls, improving user security and operational safeguards has become as critical as technical audits for reducing future losses.

Domande pertinenti

QAccording to the report, what percentage of the $2.53 billion in exploit-related losses in 2025 was attributed to social engineering?

A55.3% of the exploit-related losses, amounting to $1.39 billion, were attributed to social engineering.

QWhich country-linked hackers were identified as the most prolific threat actors in 2025, and how much stolen crypto were they responsible for?

ANorth Korea-linked hackers were the most prolific threat actors, responsible for at least $2.02 billion in stolen cryptocurrency, a roughly 51% increase from 2024.

QWhat was the estimated total range of cryptocurrency stolen across all theft categories in 2025, according to Chainalysis and industry monitoring firms?

AThe estimated total range of cryptocurrency stolen across all theft categories in 2025 was between $2.7 billion and $3.4 billion.

QBesides social engineering, what were the other techniques mentioned that contributed to the exploit losses?

AOther techniques contributing to the losses included private key compromise, infinite mint attacks, and smart contract exploits.

QWhat does the data suggest is the primary focus for mitigating exploits in 2025, according to the article's conclusion?

AThe data suggests that mitigating exploits in 2025 has less to do with fixing code and more to do with improving user security, key management practices, and operational hygiene across exchanges, custodians, and wallet providers.

Letture associate

iQiyi Is Too Impatient

The article "iQiyi Is Too Impatient" discusses the controversy surrounding the Chinese streaming platform IQiyi's recent announcement of an "AI Actor Library" during its 2026 World Conference. IQiyi claimed over 100 actors, including well-known names like Zhang Ruoyun and Yu Hewei, had joined the initiative. CEO Gong Yu suggested AI could enable actors to "star in 14 dramas a year instead of 4" and that "live-action filming might become a world cultural heritage." The announcement quickly sparked backlash. Multiple actors named in the list issued urgent statements denying they had signed any AI-related authorization agreements. This forced IQiyi to clarify that inclusion in the library only indicated a willingness to *consider* AI projects, with separate negotiations required for any specific role. The incident, which trended on social media with hashtags like "IQiyi is crazy," is presented as a sign of the company's growing desperation. Facing intense competition from short-video platforms like Douyin and Kuaishou, as well as Bilibili and Xiaohongshu, IQiyi's financial performance has weakened, with revenues declining for two consecutive years. The author argues that IQiyi is "too impatient" to tell a compelling AI story to reassure the market, especially as it pursues a listing on the Hong Kong stock exchange. The piece concludes by outlining three key "AI questions" IQiyi must answer: defining its role as a tool provider versus a content creator, balancing the "coldness" of AI with the human element audiences desire, and properly managing the interests of platforms, actors, and viewers. The core dilemma is that while AI can reduce costs and increase efficiency, it risks creating homogenized, formulaic content and devaluing human performers.

marsbit51 min fa

iQiyi Is Too Impatient

marsbit51 min fa

Trading

Spot
Futures
活动图片