Crypto Scams and Hacks Surge to $370M in January: CertiK

TheNewsCryptoОпубликовано 2026-02-02Обновлено 2026-02-02

Введение

In January, cryptocurrency scams and hacks surged to $370.3 million, marking the highest monthly loss in 11 months and a fourfold increase from January of the previous year. The majority of the stolen funds came from a single social engineering scam that resulted in a $284 million loss. Phishing attacks accounted for over $311.3 million of the total. The month's largest incidents included a $28.9 million hack on Step Finance, a $26.4 million exploit of the Truebit protocol due to a smart contract bug, and a $13.3 million attack on SwapNet. Overall, 16 major hacks were recorded, causing $86.01 million in losses—a slight decrease from the previous year but a 13% rise from December. The figures represent a 214% increase from December's losses and highlight a significant escalation in crypto security breaches.

The total value of stolen cryptocurrencies via exploits and scams extended to $370.3 million last month, the biggest monthly figure hit in 11 months and around a fourfold increase from January of last year.

CertiK, the biggest Web3 security service provider, stated on January 31 that out of 40 scam incidents that happened in January, the major portion of the total value stolen came from one victim that lost about $284 million because of a social engineering scam.

Around over $370 million stolen was accounted for by phishing scams, which stole over $311.3 million over the month. This month’s figure is the biggest loss, followed by the Bybit hack in February 2025.

In February 2025, the hackers swept off around $1.5 billion overall over the month, a major portion of which came from the $1.4 billion hack on crypto exchange Bybit. The recent amount marks over a 277% surge from January 2025, when attackers swept in and stole $98 million.

The Biggest Surge

CertiK also mentioned that it is also a 214% surge from December, witnessing $117.8 million lost to crypto theft. The blockchain security and data analytics company, PeckShield, revealed on February 1 that the hack of Step Finance in the last month of January was the biggest for the month.

Attackers swept $28.9 million in the attack on the decentralised finance portfolio tracker, where a lot of its treasury wallets were risked, having over 261,000 Solana (SOL) taken. After this, the biggest exploit for the month was the $26.4 million attack on the Truebit protocol on January 8, when a bug in a smart contract permitted an attacker to mint tokens almost for free. This also banged the price of the Truebit (TRU) token.

PeckShield also highlighted the $13.3 million hack on liquidity provider SwapNet on January 26 and the $7 million hack against the blockchain protocol Saga on January 21. The firm mentioned that there were around 16 hacks overall in January, equating to $86.01 million in losses, a 1.42% fall from a year ago, but over a 13% rise from December.

Highlighted Crypto News Today:

CrossCurve Bridge Exploit Exposes $3 Million Loss in Cross-Chain Security Breach

TagsCertiKHackScam

Связанные с этим вопросы

QWhat was the total value of stolen cryptocurrencies in January according to CertiK?

A$370.3 million

QWhich single incident accounted for the majority of the stolen funds in January?

AA social engineering scam that resulted in a loss of about $284 million to one victim.

QWhat was the most significant hack prior to January's surge, as mentioned in the article?

AThe Bybit hack in February 2025, where approximately $1.4 billion was stolen.

QAccording to PeckShield, which was the largest individual hack incident in January?

AThe $28.9 million hack of Step Finance.

QWhat type of attack was responsible for the majority of the stolen funds in January?

APhishing scams, which stole over $311.3 million.

Похожее

OpenAI Post-Training Engineer Weng Jiayi Proposes a New Paradigm Hypothesis for Agentic AI

OpenAI engineer Weng Jiayi's "Heuristic Learning" experiments propose a new paradigm for Agentic AI, suggesting that intelligent agents can improve not just by training neural networks, but also by autonomously writing and refining code based on environmental feedback. In the experiment, a coding agent (powered by Codex) was tasked with developing and maintaining a programmatic strategy for the Atari game Breakout. Starting from a basic prompt, the agent iteratively wrote code, ran the game, analyzed logs and video replays to identify failures, and then modified the code. Through this engineering loop of "code-run-debug-update," it evolved a pure Python heuristic strategy that achieved a perfect score of 864 in Breakout and performed competitively with deep reinforcement learning (RL) algorithms in MuJoCo control tasks like Ant and HalfCheetah. This approach, termed Heuristic Learning (HL), contrasts with Deep RL. In HL, experience is captured in readable, modifiable code, tests, logs, and configurations—a software system—rather than being encoded solely into opaque neural network weights. This offers potential advantages in explainability, auditability for safety-critical applications, easier integration of regression tests to combat catastrophic forgetting, and more efficient sample use in early learning stages, as demonstrated in broader tests on 57 Atari games. However, the blog acknowledges clear limitations. Programmatic strategies struggle with tasks requiring long-horizon planning or complex perception (e.g., Montezuma's Revenge), areas where neural networks excel. The future vision is a hybrid architecture: specialized neural networks for fast perception (System 1), HL systems for rules, safety, and local recovery (also System 1), and LLM agents providing high-level feedback and learning from the HL system's data (System 2). The core proposition is that in the era of capable coding agents, a significant portion of an AI's learned experience could be maintained as an auditable, evolving software system.

marsbit25 мин. назад

OpenAI Post-Training Engineer Weng Jiayi Proposes a New Paradigm Hypothesis for Agentic AI

marsbit25 мин. назад

Your Claude Will Dream Tonight, Don't Disturb It

This article explores the recent phenomenon of AI companies increasingly using anthropomorphic language—like "thinking," "memory," "hallucination," and now "dreaming"—to describe machine learning processes. Focusing on Anthropic's newly announced "Dreaming" feature for its Claude Agent platform, the piece explains that this function is essentially an automated, offline batch processing of an agent's operational logs. It analyzes past task sessions to identify patterns, optimize future actions, and consolidate learnings into a persistent memory system, akin to a form of reinforcement learning and self-correction. The article draws parallels to similar features in other AI agent systems like Hermes Agent and OpenClaw, which also implement mechanisms for reviewing historical data, extracting reusable "skills," and strengthening long-term memory. It notes a key difference from human dreaming: these AI "dreams" still consume computational resources and user tokens. Further context is provided by discussing the technical challenges of managing AI "memory" or context, highlighting the computational expense of large context windows and innovations like Subquadratic's new model claiming drastically longer contexts. The core critique argues that this strategic use of human-centric vocabulary does more than market products; it subtly reshapes user perception. By framing algorithms with terms associated with consciousness, companies blur the line between tool and autonomous entity. This linguistic shift can influence user expectations, tolerance for errors, and even perceptions of responsibility when systems fail, potentially diverting scrutiny from the companies and engineers behind the technology. The article concludes by speculating that terms like "daydreaming" for predictive task simulation might be next, continuing this trend of embedding the idea of an "inner life" into computational processes.

marsbit27 мин. назад

Your Claude Will Dream Tonight, Don't Disturb It

marsbit27 мин. назад

Торговля

Спот
Фьючерсы
活动图片