<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>Social Engineering Attacks Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/social-engineering-attacks/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/social-engineering-attacks/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Mon, 19 Jan 2026 07:38:19 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>Social Engineering Attacks Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/social-engineering-attacks/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Critical Report on Hacked Crypto Projects Has Been Released</title>
		<link>https://coinengineer.net/blog/critical-report-on-hacked-crypto-projects-has-been-released/</link>
					<comments>https://coinengineer.net/blog/critical-report-on-hacked-crypto-projects-has-been-released/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Mon, 19 Jan 2026 13:00:56 +0000</pubDate>
				<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[crypto security risk]]></category>
		<category><![CDATA[crypto trust erosion]]></category>
		<category><![CDATA[hacked crypto projects]]></category>
		<category><![CDATA[post-hack recovery]]></category>
		<category><![CDATA[Social Engineering Attacks]]></category>
		<category><![CDATA[web3 incident response]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=61992</guid>

					<description><![CDATA[<p>A striking report has surfaced in the crypto space at a critical moment. According to data shared by Mitchell Amador, CEO of Web3 security platform Immunefi, nearly 80% of crypto projects that suffer a cyberattack never fully recover. More importantly, the core problem often runs deeper than the stolen funds themselves. Amador’s assessment comes as</p>
<p>The post <a href="https://coinengineer.net/blog/critical-report-on-hacked-crypto-projects-has-been-released/">Critical Report on Hacked Crypto Projects Has Been Released</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="312" data-end="637">A striking report has surfaced in the <strong>crypto</strong> space at a critical moment. According to data shared by Mitchell Amador, CEO of Web3 security platform Immunefi, nearly <strong data-start="477" data-end="549">80% </strong>of <strong data-start="477" data-end="549">crypto projects </strong>that suffer a cyberattack never fully recover. More importantly, the core problem often runs deeper than the stolen funds themselves.</p>
<p data-start="639" data-end="854">Amador’s assessment comes as 2025 has been marked by a surge in high-profile exploits. While markets search for a new trust equilibrium, a lack of operational readiness is leaving many projects permanently weakened.</p>
<h3 data-start="856" data-end="899">The First Hours Define a Project’s Fate</h3>
<p data-start="901" data-end="1132">According to Amador, the moment an exploit is detected, most protocols effectively freeze. Teams often lack a clear understanding of how exposed they are and rarely have a predefined incident response plan for a large-scale breach.</p>
<p data-start="1134" data-end="1427">This uncertainty slows decision-making. Valuable time is lost as teams debate whether to pause contracts or keep systems running. Amador stresses that additional losses frequently occur during these early hours, when improvisation replaces structured response and coordination breaks down.</p>
<p data-start="1134" data-end="1427"><img fetchpriority="high" decoding="async" class="alignnone size-large wp-image-61994" src="https://coinengineer.net/blog/wp-content/uploads/2026/01/crypto-hack-1024x594.png" alt="" width="1020" height="592" srcset="https://coinengineer.net/blog/wp-content/uploads/2026/01/crypto-hack-1024x594.png 1024w, https://coinengineer.net/blog/wp-content/uploads/2026/01/crypto-hack-300x174.png 300w, https://coinengineer.net/blog/wp-content/uploads/2026/01/crypto-hack-768x446.png 768w, https://coinengineer.net/blog/wp-content/uploads/2026/01/crypto-hack.png 1335w" sizes="(max-width: 1020px) 100vw, 1020px" /></p>
<h3 data-start="1429" data-end="1482">Silence Doesn’t Repair Trust — It Amplifies Panic</h3>
<p data-start="1484" data-end="1729">Following a hack, many projects hesitate to pause smart contracts due to reputational concerns. At the same time, communication with users often collapses. According to Amador, this silence does not stabilize the situation — it intensifies fear.</p>
<p data-start="1731" data-end="1995">“Nearly 80% of hacked projects never fully recover,” Amador notes, adding that the primary damage stems not from the initial loss of funds, but from operational breakdown and erosion of trust during the response phase. Once lost, that trust is rarely restored.</p>
<h3 data-start="1997" data-end="2029">Fixing the Code Isn’t Enough</h3>
<p data-start="2031" data-end="2284">A similar warning comes from Alex Katz, CEO of Web3 security firm Kerberus. Katz argues that even technically resolved incidents often mark the beginning of a project’s decline. Users leave, liquidity dries up, and reputational damage becomes permanent.</p>
<p data-start="2286" data-end="2562">At the same time, the nature of attacks is shifting. Smart contract vulnerabilities are no longer the dominant threat. Human error has become the weakest link, with users unknowingly approving malicious transactions, interacting with fake interfaces, or exposing private keys.</p>
<h3 data-start="2564" data-end="2615">Losses Hit Record Levels, Risk Turns Structural</h3>
<p data-start="2617" data-end="2871">Crypto security challenges intensified sharply in 2025. Total losses reached <strong data-start="2694" data-end="2710">$3.4 billion</strong>, the highest level since 2022. Just three incidents accounted for <strong data-start="2777" data-end="2798">69% of all losses</strong>, with the $1.4 billion Bybit exploit standing out as a defining example.</p>
<p data-start="2873" data-end="3105">Amador warns that AI-powered social engineering is accelerating this trend. Attackers can now deploy thousands of tailored phishing messages daily, pushing security risks far beyond smart contracts and into operational preparedness.</p>
<h3 data-start="3107" data-end="3155">2026 Could Be Stronger — Under One Condition</h3>
<p data-start="3157" data-end="3462">Despite the grim data, Amador remains cautiously optimistic. He believes smart contract security is improving faster than ever, driven by better development standards, stronger audits, and more mature monitoring tools. In his view, 2026 could become the strongest year yet for smart contract security.</p>
<p data-start="3464" data-end="3747">However, one issue remains unresolved: response readiness. Amador emphasizes that teams must act decisively and communicate immediately when incidents occur, even if the full scope is unclear. Early intervention, he argues, causes far less damage than allowing uncertainty to spiral.</p>
<p data-start="3464" data-end="3747"><em class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Telegram, </a><a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">YouTube</a>, and <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Twitter</a> channels for the latest <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/critical-report-on-hacked-crypto-projects-has-been-released/">Critical Report on Hacked Crypto Projects Has Been Released</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/critical-report-on-hacked-crypto-projects-has-been-released/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/09/hacker-eth-ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/09/hacker-eth-ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>FBI and Japan Reveal Details of the $305M DMM Hack</title>
		<link>https://coinengineer.net/blog/fbi-and-japan-reveal-details-of-the-305m-dmm-hack/</link>
					<comments>https://coinengineer.net/blog/fbi-and-japan-reveal-details-of-the-305m-dmm-hack/#respond</comments>
		
		<dc:creator><![CDATA[Tanju Akbıyık]]></dc:creator>
		<pubDate>Tue, 24 Dec 2024 15:35:44 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[Crypto Exchange Hack]]></category>
		<category><![CDATA[DMM Hack]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[Social Engineering Attacks]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=33978</guid>

					<description><![CDATA[<p>The U.S. Federal Bureau of Investigation (FBI) and Japan’s National Police Agency (NPA) have unveiled details of a $305 million Bitcoin theft from Japan-based crypto exchange DMM, attributed to North Korea-linked hackers. The attack was executed using social engineering techniques and resulted in the theft of 4,502.9 Bitcoin in May. Social Engineering Tactics of the</p>
<p>The post <a href="https://coinengineer.net/blog/fbi-and-japan-reveal-details-of-the-305m-dmm-hack/">FBI and Japan Reveal Details of the $305M DMM Hack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The <strong>U.S. Federal Bureau of Investigation</strong> (<em><strong>FBI</strong></em>) and <strong>Japan</strong>’s <strong>National Police Agency</strong> (<em><strong>NPA</strong></em>) have unveiled details of a <strong>$305 million Bitcoin theft</strong> from Japan-based crypto exchange <strong>DMM</strong>, attributed to North Korea-linked hackers. The attack was executed using social engineering techniques and resulted in the theft of <strong>4,502.9 Bitcoin</strong> in May.</p>
<h2>Social Engineering Tactics of the Hackers</h2>
<p>According to the <strong>FBI</strong>, the attack was carried out by the North Korean-linked <strong>TraderTraitor</strong> group, known for targeting company employees through social engineering.</p>
<p>In March, a North Korean threat actor posed as a fake recruiter on <strong>LinkedIn</strong> and contacted an employee of <strong>Ginco</strong>, a Japan-based crypto wallet company. The hacker sent the employee a malicious link disguised as a <strong>GitHub-based</strong> recruitment test. When the employee copied the link to their personal GitHub account, their system was compromised.</p>
<p>In May, the compromised information was used to impersonate Ginco’s communication system. The hackers posed as DMM employees, manipulated a legitimate transaction request, and successfully executed a massive Bitcoin transfer.</p>
<h2>The Fate of the Stolen Funds</h2>
<p>The FBI reported that the stolen Bitcoin was transferred to wallets under the control of the TraderTraitor group. It was emphasized that the North Korean regime uses such illicit activities to circumvent economic sanctions and generate revenue.</p>
<p>The FBI announced its continued efforts, in collaboration with Japanese authorities and international partners, to expose and counter North Korea’s illegal crypto activities.</p>
<p>The DMM hack stands out as one of the largest crypto heists of 2024 but is just one of many incidents that occurred throughout the year. Stay vigilant against phishing scams!</p>
<hr />
<p><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/fbi-and-japan-reveal-details-of-the-305m-dmm-hack/">FBI and Japan Reveal Details of the $305M DMM Hack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/fbi-and-japan-reveal-details-of-the-305m-dmm-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/12/FBI-and-Japan-Reveal-Details-of-the-305M-DMM-Hack.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/12/FBI-and-Japan-Reveal-Details-of-the-305M-DMM-Hack.png' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
