{"id":92781,"date":"2025-12-30T17:02:54","date_gmt":"2025-12-30T14:02:54","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=92781"},"modified":"2025-12-31T07:26:33","modified_gmt":"2025-12-31T04:26:33","slug":"crypto-phishing-losses-plunge-83-in-2025","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/crypto-phishing-losses-plunge-83-in-2025\/","title":{"rendered":"Crypto Phishing Losses Drop by 83% in 2025"},"content":{"rendered":"<p>Funds stolen via phishing attacks fell 83% to $83.85 million in 2025, according to a report by <a href=\"https:\/\/www.slowmist.com\/report\/2025-Blockchain-Security-and-AML-Annual-Report(EN).pdf\">SlowMist<\/a>.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-7208123a64c1ed27-2319464969086716.webp\" alt=\"\u0421\u043d\u0438\u043c\u043e\u043a \u044d\u043a\u0440\u0430\u043d\u0430 2025-12-30 163222\" class=\"wp-image-272833\"\/><figcaption class=\"wp-element-caption\">Source: SlowMist.<\/figcaption><\/figure>\n<p>In 2024 the figure stood at $494 million. The number of affected users also decreased \u2014 106,106 people fell victim, down 68% year on year.<\/p>\n<p>Analysts identified a direct correlation between market activity and the success of attacks. The peak came in the third quarter, when Ethereum rallied. In August and September scammers stole about 29% of the annual total (over $31 million).<\/p>\n<p>In the fourth quarter, as markets cooled, drainer activity fell to a low \u2014 losses in December were just $2.04 million.<\/p>\n<p>Key attack methods:<\/p>\n<ol class=\"wp-block-list\">\n<li><strong><span data-descr=\"special digital signatures that allow a one-time, gasless approval for a smart contract to spend tokens\" class=\"old_tooltip\">Permit signatures<\/span>.<\/strong> They remain the primary tool for thefts, accounting for 38% of major incidents (losses above $1 million).<\/li>\n<li><a href=\"https:\/\/forklog.com\/en\/news\/account-abstraction-angst-how-the-pectra-upgrade-made-life-easier-for-hackers\"><strong>EIP-7702<\/strong><\/a>. After the <a href=\"https:\/\/forklog.com\/en\/news\/pectra-steering-ethereum-toward-scale-and-mass-adoption\">Pectra<\/a> upgrade, a new threat vector emerged. Attackers began using <a href=\"https:\/\/forklog.com\/en\/news\/what-is-account-abstraction\">account abstraction<\/a> to bundle malicious operations.<\/li>\n<\/ol>\n<p>The largest single theft of the year occurred in September \u2014 a user lost $6.5 million due to a forged Permit signature.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-4e33a8f76d13ee9e-2319484235280266.webp\" alt=\"\u0421\u043d\u0438\u043c\u043e\u043a \u044d\u043a\u0440\u0430\u043d\u0430 2025-12-30 163428\" class=\"wp-image-272834\"\/><figcaption class=\"wp-element-caption\">Source: SlowMist.<\/figcaption><\/figure>\n<p>Experts cautioned that lower figures do not mean the threat has disappeared. The drainer ecosystem is evolving, splitting into mass phishing aimed at retail users and sophisticated targeted attacks on major projects.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cIf markets recover, hacking activity will rise with them,\u201d the researchers said.<\/em><\/p>\n<\/blockquote>\n<h2 class=\"wp-block-heading\">Total losses rose 46%<\/h2>\n<p>Despite the downturn in phishing drainers, overall damage to the crypto industry rose sharply in 2025. SlowMist logged 200 security incidents with aggregate losses of $2.935 billion.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-bef7b5d850415905-2319517908139501.webp\" alt=\"\u0421\u043d\u0438\u043c\u043e\u043a \u044d\u043a\u0440\u0430\u043d\u0430 2025-12-30 163541\" class=\"wp-image-272835\"\/><figcaption class=\"wp-element-caption\">Source: SlowMist.<\/figcaption><\/figure>\n<p>By comparison, 2024 saw twice as many attacks (410) but a smaller haul of $2.013 billion. The year\u2019s pattern: fewer breaches, but larger average hauls and more severe fallout.<\/p>\n<p>The most targeted ecosystem remained Ethereum ($183 million in losses), followed by <a href=\"https:\/\/forklog.com\/en\/news\/what-is-solana-sol\">Solana<\/a> and <a href=\"https:\/\/forklog.com\/en\/news\/what-is-arbitrum\">Arbitrum<\/a> with about $17 million each.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-707b34ca1f9e6d3a-2319541068852921.webp\" alt=\"\u0421\u043d\u0438\u043c\u043e\u043a \u044d\u043a\u0440\u0430\u043d\u0430 2025-12-30 163718\" class=\"wp-image-272836\"\/><figcaption class=\"wp-element-caption\">Source: SlowMist.<\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\">Centralised exchanges lost more than DeFi<\/h2>\n<p>In 2025 the focus of attacks shifted from decentralised protocols to large centralised platforms (CeFi).<\/p>\n<p>The DeFi sector remained the leader by number of incidents (126 breaches, 63% of the total). However, total losses in the segment fell 37% to $649 million.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-9ad3d6b8eef50b4a-2319558801277395.webp\" alt=\"\u0421\u043d\u0438\u043c\u043e\u043a \u044d\u043a\u0440\u0430\u043d\u0430 2025-12-30 163826\" class=\"wp-image-272837\"\/><figcaption class=\"wp-element-caption\">Source: SlowMist.<\/figcaption><\/figure>\n<p>CeFi saw just 22 incidents, but the damage was colossal \u2014 $1.8 billion.<\/p>\n<p>The year\u2019s main \u201cevent\u201d was the <a href=\"https:\/\/forklog.com\/en\/news\/life-after-bybit\">Bybit exchange hack<\/a>, in which attackers withdrew $1.46 billion in assets. Experts linked the attack to North Korean hackers.<\/p>\n<p>The top three incidents also included attacks on <a href=\"https:\/\/forklog.com\/en\/news\/analysts-uncover-cause-of-cetus-hack\">Cetus Protocol<\/a> ($230 million) and <a href=\"https:\/\/forklog.com\/en\/news\/balancer-defi-protocol-suffers-128m-hack\">Balancer V2<\/a> ($121 million).<\/p>\n<h2 class=\"wp-block-heading\">Social engineering: fake employers and counterfeit wallets<\/h2>\n<p>Hackers increasingly forgo technical intrusions in favour of manipulating people. The report highlighted the main ploys:<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>fake interviews:<\/strong> criminals search for developers on LinkedIn, posing as recruiters for well-known projects. Under the guise of a \u201ctest task\u201d they ask candidates to download and run code containing hidden trojans to steal keys;<\/li>\n<li><strong>bogus security experts:<\/strong> scammers build personas of white-hat hackers on social networks, offer to \u201caudit\u201d wallets and, under that pretext, obtain access to assets;<\/li>\n<li><strong>hardware wallets:<\/strong> users buy devices from unofficial sellers. Such devices arrive already activated or with a pre-set seed phrase known to the attackers.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">Supply-chain and browser-extension threats<\/h2>\n<p>Attackers target software supply chains to compromise many users at once:<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>open-source poisoning:<\/strong> hackers upload malicious code to popular GitHub repositories, often masquerading as useful tools such as trading bots for Solana;<\/li>\n<li><strong>dangerous extensions<\/strong>: in 2025, some popular browser plug-ins (for example, VPN services or tools for <a href=\"https:\/\/forklog.com\/en\/news\/what-is-web3\">Web3<\/a>) covertly collected user data, including AI chats and exchange cookies.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">AI in hackers\u2019 toolkit<\/h2>\n<p>Artificial intelligence has become a powerful instrument for fraudsters. <a href=\"https:\/\/forklog.com\/en\/news\/what-is-a-deepfake\">Deepfake<\/a> technology is used to create videos featuring well-known figures promoting scam projects.<\/p>\n<p>There have been cases of corporate fraud: an employee of a Hong Kong firm transferred large sums after a video conference in which all his \u201ccolleagues\u201d and \u201cboss\u201d were generated by a neural network in real time.<\/p>\n<p>Hackers also use AI models (such as Gemini or Claude) to write and constantly modify malicious code to evade antivirus systems.<\/p>\n<p>Earlier, Chainalysis estimated that since the start of the year hackers have <a href=\"https:\/\/forklog.com\/en\/news\/losses-from-crypto-hacks-reached-3-4bn-in-2025\">stolen<\/a> more than $3.4 billion in cryptocurrency.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Funds stolen via phishing fell 83% to $83.85m in 2025, SlowMist reports.<\/p>\n","protected":false},"author":1,"featured_media":92782,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"Crypto phishing losses fell 83% to $83.85m in 2025, per SlowMist.","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[44,1252],"class_list":["post-92781","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybercrime","tag-reports"],"aioseo_notices":[],"amp_enabled":true,"views":"252","promo_type":"1","layout_type":"1","short_excerpt":"Crypto phishing losses fell 83% to $83.85m in 2025, per SlowMist.","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/92781","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=92781"}],"version-history":[{"count":2,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/92781\/revisions"}],"predecessor-version":[{"id":92794,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/92781\/revisions\/92794"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/92782"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=92781"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=92781"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=92781"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}