Close Menu
    What's Hot

    Solana Price Outlook: Will SOL Recover With Strong Institutional Buying? 

    Bitcoin and ether ETFs see $200 million outflows ahead of Christmas

    Bitcoin Triggers Sharp Flash Crash to $24K on Binance USD1 Pair

    Facebook X (Twitter) Instagram
    Thursday, December 25
    • About us
    • Contact us
    • Privacy Policy
    • Contact
    Facebook X (Twitter) Instagram
    kryptodaily.com
    • Home
    • Crypto News
      • Altcoin
      • Ethereum
      • NFT
    • Learn Crypto
      • Bitcoin
      • Blockchain
    • Live Chart
    • About Us
    • Contact
    kryptodaily.com
    Home»Ethereum»How to Protect Your Crypto From Social Engineering in 2026
    Ethereum

    How to Protect Your Crypto From Social Engineering in 2026

    KryptonewsBy KryptonewsDecember 25, 2025No Comments6 Mins Read
    Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
    Follow Us
    Google News Flipboard
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    The majority of crypto exploits in the coming year won’t be caused by a zero-day bug in your favorite protocol, say crypto security experts. It’s going to be caused by you. 

    That’s because 2025 has shown that the majority of hacks don’t start with malicious code; they begin with a conversation, Nick Percoco, chief security officer of crypto exchange Kraken, told Cointelegraph. 

    “Attackers aren’t breaking in, they’re being invited in.”

    From January to early December 2025, data from Chainalysis shows that the crypto industry witnessed over $3.4 billion in theft, with the February compromise of Bybit accounting for nearly half of that total. 

    Over $3.4 billion was stolen by bad actors this year. Source: Chainalysis

    During the attack, bad actors gained access through social engineering, injected a malicious JavaScript payload that allowed them to modify transaction details and siphon off funds.

    What is social engineering? 

    Social engineering is a cyberattack method that manipulates people into revealing confidential information or performing actions that compromise security. 

    Percoco said the battleground for crypto security will be in the mind, not cyberspace. 

    “Security is no longer about building higher walls, it’s about training your mind to recognize manipulation. The goal should be simple: don’t hand over the keys to the castle just because someone sounds like they belong inside or are instilling panic.” 

    Tip 1: Use automation where possible 

    Supply chain compromises have also proven to be a key challenge this year, according to Percoco, as a seemingly minor breach can prove to be devastating later on, because “it’s a digital Jenga tower, and the integrity of every single block matters.”