The Rising Risk of Social Engineering in Crypto: Implications for Institutional Investments in 2025

Generated by AI AgentAnders MiroReviewed byAInvest News Editorial Team
Friday, Dec 26, 2025 7:29 pm ET3min read
Speaker 1
Speaker 2
AI Podcast:Your News, Now Playing
Aime RobotAime Summary

- 2025 crypto thefts surged to $3.4B, with North Korea responsible for 51% of illicit gains via social engineering attacks.

- Attackers exploit human trust through recruitment impersonation, AI voice cloning, and help desk manipulation to bypass security.

- Top 3 breaches accounted for 69% of losses, highlighting systemic risks in stablecoins, DeFi, and cross-chain bridges.

- Institutions now prioritize AI-driven risk tools, custodial security, and regulatory alignment to combat evolving threats.

- Zero Trust architecture and global standards for DeFi oversight are critical to mitigating human-centric attack vectors.

The cryptocurrency sector has long grappled with cybersecurity threats, but 2025 has marked a paradigm shift. Social engineering attacks-once a niche concern-have surged to the forefront, eclipsing traditional technical vulnerabilities as the primary vector for institutional losses.

, total crypto theft in 2025 reached $3.4 billion, with North Korea alone responsible for $2.02 billion in illicit gains, a 51% increase from 2024. These figures underscore a troubling reality: institutional investors must now treat social engineering as a systemic risk, not an isolated incident.

The Evolution of Social Engineering Tactics

Modern attackers have weaponized human psychology with alarming precision. North Korean threat actors, for instance, have

such as impersonating recruiters for web3 and AI firms to harvest credentials. These tactics exploit trust in professional networks, enabling adversaries to infiltrate critical systems. Compounding the threat, through a "Chinese Laundromat" network, involving chain-hops and intermediaries to obscure origins.

Voice-based lures and help desk manipulation have also gained prominence.

highlights how attackers clone executive voices to execute callback scams, leveraging AI to personalize messages and bypass authentication protocols. The ByBit hack in early 2025, which , exemplifies this trend, with compromised IT personnel serving as the initial entry point.

Financial Impact and Institutional Exposure

The financial toll of these attacks is staggering.

in 2025 accounted for 69% of total losses, illustrating the disproportionate impact of large-scale incidents. For example, the Trust Wallet hack in December 2025--resulted in a confirmed $7 million theft, with Binance founder CZ pledging to cover losses. Such events erode investor confidence and highlight the fragility of even well-established platforms.

Institutional exposure is further amplified by the rise of stablecoins and DeFi.

in Q1 2025, attackers now target cross-chain bridges and oracle systems, exploiting interoperability risks. The complexity of these ecosystems creates fertile ground for social engineering, as attackers manipulate trust in decentralized protocols to execute multi-vector attacks.

Mitigation Strategies: A Multi-Layered Approach

In response, institutions are adopting robust risk frameworks.

reported formal risk management systems, up from 54% in 2023. Key innovations include:

  1. AI-Driven Risk Assessment:

    to detect anomalies in user behavior, such as unexpected transaction patterns or credential misuse. and response (ITDR) systems are proving critical in proactively identifying social engineering attempts.

  2. Custodial Solutions:

    is projected to reach $16 billion in 2025, with hardware security modules (HSMs) and SOC certifications becoming standard. These solutions isolate private keys from user access, mitigating risks from compromised credentials.

  3. Regulatory Compliance:

    , particularly in light of the EU's proposed 100% capital requirements for insurers holding crypto assets. are increasingly mandated, enforcing rigorous penetration testing and access controls.

  4. Insurance and Automation:

    now cover institutional crypto assets, a 52% increase from 2024. to isolate infrastructure and enforce conditional access, preventing high-touch attacks like those orchestrated by the Muddled Libra group.

Case Studies in Effective Mitigation

While specific institutional case studies remain scarce, emerging frameworks demonstrate tangible success.

presented at eCrime 2025 engaged over 2,600 scammers, achieving a 32% information disclosure rate. This AI-driven approach not only disrupts operations but also provides actionable intelligence for attribution.

-a real-time information-sharing platform for compliant virtual asset service providers (VASPs)-have also reduced illicit activity in regulated sectors. By fostering collaboration between institutions and law enforcement, such frameworks address the root causes of social engineering: anonymity and trust exploitation.

The Path Forward

For institutional investors, the 2025 landscape demands a proactive, adaptive strategy. Social engineering is no longer a peripheral risk but a core threat to asset integrity. As attackers refine their tactics, institutions must prioritize:
- Zero Trust Architecture:

to user identities, not just networks, is essential to counter credential-based attacks.
- Education and Simulation: programs can reduce susceptibility to impersonation scams.
- Regulatory Advocacy: will mitigate systemic risks from unregulated ecosystems.

In conclusion, the rise of social engineering in crypto underscores the need for a holistic approach to risk management. While the threat landscape is evolving rapidly, institutions that invest in AI, custodial security, and regulatory alignment are better positioned to safeguard their assets. As the sector matures, the ability to anticipate and neutralize human-centric threats will define the resilience of institutional portfolios in 2025 and beyond.

Comments



Add a public comment...
No comments

No comments yet