"Over $2.4 billion was stolen in the first half of 2025, already surpassing 2024's total. Everyday traps such as phishing, toxic approvals and fake support cause more damage than exotic exploits. Strong 2FA, careful signing, hot/cold wallet separation and clean devices dramatically reduce risk. Having a recovery plan with revocation tools, support contacts and reporting portals can turn a mistake into a setback instead of a disaster."
"Crypto hacks are still on the rise. In the first half of 2025 alone, security firms recorded more than $2.4 billion stolen across more than 300 incidents, already exceeding 2024's total thefts. One major breach, the Bybit theft attributed to North Korean groups, skewed the numbers upward, but it shouldn't claim all the attention. Most everyday losses still come from simple traps: phishing links, malicious wallet approvals, SIM swaps and fake support accounts."
"SIM-swap attacks remain one of the most common ways criminals drain wallets, and prosecutors continue to seize millions tied to them. The safer move is phishing-resistant two-factor authentication (2FA) (think hardware security keys or platform passkeys). Start by locking down your most critical logins: email, exchanges and your password manager. US cybersecurity agencies like the Cybersecurity and Infrastructure Security Agency stress this because it blocks phishing tricks and push-fatigue scams that bypass weaker forms of multi-factor authentication (MFA)."
Crypto thefts exceeded $2.4 billion in the first half of 2025 across more than 300 incidents, surpassing all of 2024's losses. One large breach (the Bybit theft linked to North Korean groups) inflated totals but everyday scams cause most harm. Common attack vectors include phishing links, malicious wallet approvals, SIM swaps, and fake support accounts. Simple protective habits dramatically reduce risk: use phishing-resistant two-factor authentication, prefer long unique passphrases, store backup codes offline, and enable withdrawal allowlists. Separate hot and cold wallets, keep devices clean, and sign transactions carefully. Maintain a recovery plan with revocation tools, support contacts, and reporting portals.
Read at cointelegraph.com
Unable to calculate read time
Collection
[
|
...
]