• Dapps:16.23K
  • Blockchains:78
  • Active users:66.47M
  • 30d volume:$303.26B
  • 30d transactions:$879.24M

How Social Engineering Attacks Threaten the Crypto Industry

user avatar

by Giorgi Kostiuk

a year ago


  1. Recent Instances of Social Engineering Attacks
  2. What is a Social Engineering Attack?
  3. How Different are North Korean Attacks?

  4. As the popularity of cryptocurrencies, NFTs, and Web3 continues to grow, the number of attacks using social engineering techniques has increased significantly, especially from North Korean hackers. A group of hackers known as 'Lazarus Group' is allegedly behind the Rs 2000 crore WazirX hack.

    Recent Instances of Social Engineering Attacks

    Cybercriminals are increasingly targeting centralized exchanges due to the large amounts of assets they hold. For example, in May 2024, a Japanese exchange called DMM was hacked, and $305 million in Bitcoin was stolen. In July 2024, an Indian exchange WazirX was also hacked, losing $230 million. Despite improved defense mechanisms, these exchanges failed to withstand well-organized groups like North Korea’s 'Lazarus'. Cryptoware attacks have surged in 2024. This year, the largest ransom paid was $75 million, indicating that hackers are now targeting large companies.

    What is a Social Engineering Attack?

    Social engineering in the crypto space involves tricking individuals into revealing confidential information or engaging in activities that pose a significant threat to their security. Attackers rely on psychological manipulation to create a sense of urgency, fear, or curiosity. For instance, a scammer might send a phishing email that appears to come from a trusted source, asking the user to click a link that leads to sharing crucial information such as passwords or private keys.

    How Different are North Korean Attacks?

    North Korean social engineering campaigns are more advanced. They conduct extensive pre-operational research, gathering detailed information about specific DeFi or cryptocurrency issues via social media and official networks. One common method used by North Korean hackers is impersonation. They often pose as trusted figures or organizations, such as recruiters or technology experts, using real images and creating fake websites to enhance their credibility.

    In conclusion, social engineering attacks, particularly by North Korea, represent a significant threat to the cryptocurrency and DeFi sectors. These attacks exploit human psychology rather than technical weaknesses, making them challenging to detect and prevent. Users must stay informed, implement robust security measures, and educate employees to better defend against these persistent and evolving threats.

0

Rewards

chest
chest
chest
chest

More rewards

Discover enhanced rewards on our social media.

chest

Other news

Arthur Hayes Executes Major Cryptocurrency Withdrawal from Binance

chest

Arthur Hayes executed a withdrawal of approximately $2 million worth of four major cryptocurrencies from Binance, sparking market analysis.

user avatarLeo van der Veen

UXLINK Announces Strategic Pivot for 2026

chest

UXLINK announces a strategic pivot for 2026, shifting focus from social infrastructure to large-scale value realization through AI-powered markets and expanded financial ecosystems.

user avatarTenzin Dorje

UXLINK Maintains Infrastructure Role Amid Strategic Shift

chest

UXLINK will continue to serve as an infrastructure provider for Web3 projects while pursuing new value creation initiatives in 2026.

user avatarAisha Farooq

UXLINK to Launch UXPredict and Expand PayFi Ecosystem

chest

UXLINK plans to launch UXPredict, an AI-based social prediction market, and expand its PayFi ecosystem in 2026, targeting economic benefits from social interactions in Asia.

user avatarLi Weicheng

OnChain Connectivity Identified as Key to Web3 Neobanks' Success

chest

The 071Labs report emphasizes that onchain connectivity is a decisive factor for the success of Web3 neobanks, enabling seamless integration with blockchain networks and decentralized applications.

user avatarBayarjavkhlan Ganbaatar

Investor Strategies Shift Amid Market Volatility

chest

Investors are adapting their strategies to shorter holding periods and quicker profit-taking due to increased market volatility.

user avatarElias Mukuru

Important disclaimer: The information presented on the Dapp.Expert portal is intended solely for informational purposes and does not constitute an investment recommendation or a guide to action in the field of cryptocurrencies. The Dapp.Expert team is not responsible for any potential losses or missed profits associated with the use of materials published on the site. Before making investment decisions in cryptocurrencies, we recommend consulting a qualified financial advisor.