Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Social engineering is the primary method of crypto attacks in 2025: hackers steal assets worth $282 trillion
The crypto world faces serious threats as it enters 2025. A major hacking incident demonstrates how social engineering is the most dangerous technique in modern attacks. A hacker successfully drained the victim’s hardware wallet worth $282 million through social manipulation, drawing industry attention to the increasing vulnerability of users.
Massive Attack on Digital Wallets
The incident occurred in early January when a hacker carried out a coordinated attack that successfully stole 2.05 million Litecoin (LTC) and 1,459 Bitcoin (BTC) from the victim. According to renowned blockchain researcher ZachXBT, the stolen funds were immediately converted into Monero (XMR), a privacy coin that is difficult to trace. The movement of these funds caused a 70% surge in XMR’s price over the next four days, creating a market anomaly that caught the crypto community’s attention.
Recent data shows LTC is currently trading at $59.58, down 8.99% in the last 24 hours, while BTC is at $78.90K, down 6.13%. The value lost from the hack amounts to millions of dollars at the time of the incident.
Social Engineering Is the Most Effective Attack Tactic
Social engineering is a manipulative approach involving impersonation as a trusted employee or authoritative figure. Hackers build trust with their victims through seemingly authentic communication, then persuade victims to reveal sensitive information such as private keys, recovery phrases, or login details.
This method proves highly effective because it targets the human element, often the weakest link in layered security systems. Unlike purely technical attacks that require advanced coding skills, these attacks exploit psychology and trust. The hacking incident involved persuading victims to access or transfer their own assets unknowingly.
Tracking Funds Across Blockchains
Some of the stolen Bitcoin was moved across various blockchains using Thorchain, a cross-chain protocol that enables cross-platform exchanges. The funds moved between Ethereum, Ripple, and Litecoin before being converted into their final form. ZachXBT’s analysis confirms there is no indication of North Korean threat actors involved in this incident, dismissing early speculation about state involvement.
The researcher notes that although some funds have been traced, the complexity of their movement across blockchains and conversion into Monero makes recovery very challenging. This highlights the need for more advanced blockchain forensic tools.
Security Trends 2025: Rising Social Engineering
This incident is not isolated but part of a growing trend in 2025. Social engineering is the primary threat facing the crypto community, surpassing even traditional technical attacks. Ledger’s breach data in early January exposed users’ personal information—including names and contacts—making it easier for hackers to target potential victims with personalized social engineering campaigns.
Ledger, a leading hardware wallet provider, experienced unauthorized access to its user database, creating an ideal environment for targeted social engineering attacks. This vulnerability shows that technical encryption protections alone are not enough without user education and security awareness.
Implications for Crypto Users
The identity of the victims remains unclear—whether wealthy individuals or institutional entities—still remains a mystery. However, this event reveals a frightening reality: even securely stored crypto assets can be lost through human manipulation. Users need to increase vigilance against suspicious communications, verify identities through independent channels, and avoid sharing sensitive information via insecure communication channels.
The emerging trend indicates that social engineering is a primary focus for hackers in their campaigns this year, demanding a more comprehensive industry response in user security education.