Crypto theft in 2025 wasn’t driven by exotic exploits or obscure code flaws. It was driven by people. As attackers refined social engineering tactics and layered in artificial intelligence, scams became harder to spot and more costly than ever. Security experts say the next big battle for crypto isn’t in codebases, but in human behavior.

The biggest crypto threat isn’t code, it’s conversation
Most major crypto losses in 2025 didn’t begin with a technical vulnerability. They started with a message, a call, or a convincing interaction. According to Nick Percoco, chief security officer at Kraken, attackers are no longer forcing their way in. They’re being let in.
Chainalysis data shows that from January to early December 2025, more than $3.4 billion was stolen from the crypto industry. Nearly half of that total came from the February Bybit compromise, where attackers used social engineering to gain access before injecting malicious JavaScript that altered transaction details and quietly siphoned funds.
Social engineering works by manipulating trust. It pushes victims into revealing sensitive information or approving actions they normally wouldn’t. Percoco argues that modern crypto security is now psychological. Strong defenses matter, but recognizing pressure, urgency, and false familiarity matters more. If someone is rushing you, instilling panic, or sounding unusually authoritative, that’s often the real red flag.
Automation and infrastructure discipline are now essential
Reducing human error is becoming a core security strategy. Percoco advises minimizing trust points by automating defenses wherever possible and verifying every interaction through strong authentication. The goal is to move from reacting to breaches to preventing them before damage is done.
Supply chain attacks have made this even more urgent. A small breach upstream can cascade into a major failure later. One weak link can undermine an entire system. Smarter identity verification and AI driven threat detection are already helping systems spot abnormal behavior before users or analysts notice anything wrong.
Lisa, a security operations lead at SlowMist, says developer ecosystems were heavily targeted in 2025. Cloud credential leaks and poisoned dependencies allowed attackers to inject malicious code and steal secrets at scale. She recommends pinning dependency versions, verifying package integrity, isolating build environments, and reviewing updates carefully before deployment. As credential theft and tailored phishing grow more advanced, these practices are no longer optional.
AI deepfakes and physical threats raise the stakes
Artificial intelligence is making social engineering more convincing. Steven Walbroehl, CTO of Halborn, warns that attackers are now running personalized, context aware scams that bypass traditional security training. In one case earlier this year, multiple crypto founders reported near misses involving fake Zoom calls powered by deepfakes.
To counter this, Walbroehl suggests cryptographic proof of personhood for critical communications, hardware based authentication tied to biometrics, and anomaly detection systems that learn normal transaction behavior. Simple verification rituals, like pre shared phrases, can also stop sophisticated impersonation attempts.
Beyond digital threats, physical attacks also surged. At least 65 wrench attacks were recorded in 2025, nearly double the previous bull market peak. Former CIA officer Beau notes that while such attacks remain rare, discretion matters. Avoid advertising wealth, scrub personal data from public records, and invest in basic home security. The less visible you are, the safer you tend to be.