The post How to Protect Your Crypto From Social Engineering in 2026 appeared on BitcoinEthereumNews.com. The majority of crypto exploits in the coming year won’The post How to Protect Your Crypto From Social Engineering in 2026 appeared on BitcoinEthereumNews.com. The majority of crypto exploits in the coming year won’

How to Protect Your Crypto From Social Engineering in 2026

For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

The majority of crypto exploits in the coming year won’t be caused by a zero-day bug in your favorite protocol, say crypto security experts. It’s going to be caused by you. 

That’s because 2025 has shown that the majority of hacks don’t start with malicious code; they begin with a conversation, Nick Percoco, chief security officer of crypto exchange Kraken, told Cointelegraph. 

From January to early December 2025, data from Chainalysis shows that the crypto industry witnessed over $3.4 billion in theft, with the February compromise of Bybit accounting for nearly half of that total. 

Over $3.4 billion was stolen by bad actors this year. Source: Chainalysis

During the attack, bad actors gained access through social engineering, injected a malicious JavaScript payload that allowed them to modify transaction details and siphon off funds.

What is social engineering? 

Social engineering is a cyberattack method that manipulates people into revealing confidential information or performing actions that compromise security. 

Percoco said the battleground for crypto security will be in the mind, not cyberspace. 

Tip 1: Use automation where possible 

Supply chain compromises have also proven to be a key challenge this year, according to Percoco, as a seemingly minor breach can prove to be devastating later on, because “it’s a digital Jenga tower, and the integrity of every single block matters.” 

In the year ahead, Percoco recommends reducing human trust points through actions like automating defenses where possible and verifying every digital interaction through authentication in a “shift from reactive defense to proactive prevention.”

“In crypto especially, the weakest link remains human trust, amplified by greed and FOMO. That’s the crack that attackers exploit every time. But no technology replaces good habits,” he added.

Tip 2: Silo out infrastructure

Lisa, the security operations lead from SlowMist, said bad actors increasingly targeted developer ecosystems this year, which, combined with cloud-credential leaks, created opportunities to inject malicious code, steal secrets, and poison software updates. 

“Developers can mitigate these risks by pinning dependency versions, verifying package integrity, isolating build environments, and reviewing updates before deployment,” she said. 

Going into 2026, Lisa predicts the most significant threats will likely stem from increasingly sophisticated credential-theft and social-engineering operations. 

Source: SlowMist

“Threat actors are already leveraging AI-generated deepfakes, tailored phishing, and even fake developer hiring tests to obtain wallet keys, cloud credentials, and signing tokens. These attacks are becoming more automated and convincing, and we expect this trend to continue,” she said. 

To stay safe, Lisa’s advice for organizations is to implement strong access control, key rotation, hardware-backed authentication, infrastructure segmentation, and anomaly detection and monitoring. 

Individuals should rely on hardware wallets, avoid interacting with unverified files, cross-check identities across independent channels, and treat unsolicited links or downloads with caution.

Tip 3: Proof of personhood to battle AI deepfakes

Steven Walbroehl, co-founder and chief technology officer of blockchain cybersecurity firm Halborn, predicts AI-enhanced social engineering will play a significant role in the crypto hackers’ playbooks.

In March, at least three crypto founders reported foiling an attempt from alleged North Korean hackers to steal sensitive data through fake Zoom calls that used deepfakes.

Walbroehl warns that hackers are using AI to create highly personalized, context-aware attacks that bypass traditional security awareness training.

To combat this, he suggests implementing cryptographic proof-of-personhood for all critical communications, hardware-based authentication with biometric binding, anomaly detection systems that baseline normal transaction patterns, and establishing verification protocols using pre-shared secrets or phrases. 

Tip 4: Keep your crypto to yourself

Wrench attacks, or physical attacks on crypto holders, were also a prominent theme of 2025, with at least 65 recorded instances, according to Bitcoin OG and cypherpunk Jameson Lopps’ GitHub list. The last bull market peak in 2021 was previously the worst year on record, with a total of 36 recorded attacks 

An X user under the handle Beau, a former CIA officer, said in an X post on Dec. 2 that wrench attacks are still relatively rare, but he still recommends crypto users take precautions by not talking about wealth or disclosing crypto holdings or extravagant lifestyles online as a start. 

Source: Beau

He also suggests becoming a “hard target” by using data cleanup tools to hide private personal information, such as home addresses, and investing in home defenses like security cameras and alarms. 

Tip 5: Don’t skimp on the tried and true security tips 

David Schwed, a security expert who has worked at Robinhood as the chief information security officer, said his top tip is to stick to reputable businesses that demonstrate vigilant security practices, including rigorous and regular third-party security audits of their entire stack, from smart contracts to infrastructure.

However, regardless of the technology, Schwed said users should avoid using the same password for multiple accounts, opt to use a hardware token as a multifactor authentication method and safeguard the seed phrase by securely encrypting it or storing it offline in a secure, physical location.

He also advises using a dedicated hardware wallet for significant holdings and minimizing holdings in exchanges.

Related: Spear phishing is North Korean hackers’ top tactic: How to stay safe

“Security hinges on the interaction layer. Users must remain hyper vigilant when connecting a hardware wallet to a new web application and must thoroughly validate the transaction data displayed on the hardware device’s screen before signing. This prevents ‘blind signing’ of malicious contracts,” Schwed added.

Lisa said her best tips are to only use official software, avoid interaction with unverified URLs, and separate funds across hot, warm, and cold configurations. 

To counter the growing sophistication of scams like social engineering and phishing, Kraken’s Percoco recommends “radical skepticism” at all times, by verifying the authenticity and assuming every message is a test of awareness.

“And one universal truth remains: no legitimate company, service, or opportunity will ever ask for your seed phrase or login credentials. The moment they do, you’re talking to a scammer,” Percoco added. 

Meanwhile, Walbroehl recommends generating keys using cryptographically secure random number generators, strict segregation between development and production environments, regular security audits and incident response planning with regular drills. 

Magazine: When privacy and AML laws conflict: Crypto projects’ impossible choice

Source: https://cointelegraph.com/news/crypto-security-human-layer-threats-2026-expert-tips?utm_source=rss_feed&utm_medium=feed&utm_campaign=rss_partner_inbound

Market Opportunity
Threshold Logo
Threshold Price(T)
$0.006476
$0.006476$0.006476
-1.68%
USD
Threshold (T) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

US Jobs Miss Fails to Stop Bitcoin Erasing Its $74,000 Breakout Attempt

US Jobs Miss Fails to Stop Bitcoin Erasing Its $74,000 Breakout Attempt

The post US Jobs Miss Fails to Stop Bitcoin Erasing Its $74,000 Breakout Attempt appeared on BitcoinEthereumNews.com. Bitcoin (BTC) slipped under $70,000 around
Share
BitcoinEthereumNews2026/03/07 13:50
CEO Sandeep Nailwal Shared Highlights About RWA on Polygon

CEO Sandeep Nailwal Shared Highlights About RWA on Polygon

The post CEO Sandeep Nailwal Shared Highlights About RWA on Polygon appeared on BitcoinEthereumNews.com. Polygon CEO Sandeep Nailwal highlighted Polygon’s lead in global bonds, Spiko US T-Bill, and Spiko Euro T-Bill. Polygon published an X post to share that its roadmap to GigaGas was still scaling. Sentiments around POL price were last seen to be bearish. Polygon CEO Sandeep Nailwal shared key pointers from the Dune and RWA.xyz report. These pertain to highlights about RWA on Polygon. Simultaneously, Polygon underlined its roadmap towards GigaGas. Sentiments around POL price were last seen fumbling under bearish emotions. Polygon CEO Sandeep Nailwal on Polygon RWA CEO Sandeep Nailwal highlighted three key points from the Dune and RWA.xyz report. The Chief Executive of Polygon maintained that Polygon PoS was hosting RWA TVL worth $1.13 billion across 269 assets plus 2,900 holders. Nailwal confirmed from the report that RWA was happening on Polygon. The Dune and https://t.co/W6WSFlHoQF report on RWA is out and it shows that RWA is happening on Polygon. Here are a few highlights: – Leading in Global Bonds: Polygon holds 62% share of tokenized global bonds (driven by Spiko’s euro MMF and Cashlink euro issues) – Spiko U.S.… — Sandeep | CEO, Polygon Foundation (※,※) (@sandeepnailwal) September 17, 2025 The X post published by Polygon CEO Sandeep Nailwal underlined that the ecosystem was leading in global bonds by holding a 62% share of tokenized global bonds. He further highlighted that Polygon was leading with Spiko US T-Bill at approximately 29% share of TVL along with Ethereum, adding that the ecosystem had more than 50% share in the number of holders. Finally, Sandeep highlighted from the report that there was a strong adoption for Spiko Euro T-Bill with 38% share of TVL. He added that 68% of returns were on Polygon across all the chains. Polygon Roadmap to GigaGas In a different update from Polygon, the community…
Share
BitcoinEthereumNews2025/09/18 01:10
SushiSwap (SUSHI) Price Prediction 2026, 2027-2030: Future Outlook, Targets, and Long-Term Forecast

SushiSwap (SUSHI) Price Prediction 2026, 2027-2030: Future Outlook, Targets, and Long-Term Forecast

The post SushiSwap (SUSHI) Price Prediction 2026, 2027-2030: Future Outlook, Targets, and Long-Term Forecast appeared first on Coinpedia Fintech News Story Highlights
Share
CoinPedia2026/03/07 14:37