Wallets, Warnings, and Weak Links

12/3/2025, 10:46:14 AM
Intermediate
Wallets
The article not only dissects several major security incidents, such as those involving Bybit and Atomic Wallet, which involved staggering amounts of stolen funds, but also delves further into the myth of self-custody and the true role of hardware wallets. It aims to help readers identify the blind spots in security protection.

Hello,

It starts with a message. The branding looks credible, the logo checks out too, and the LinkedIn profile shows a few shared connections. The recruiter says they came across your GitHub and want to offer you a contract role with a well-funded AI-meets-DeFi protocol. You skim their site. It’s sleek, believable, jargon-rich in all the expected places. There’s a shortlisting test. It’s sent in a ZIP file.

You unzip it, and the installer launches — a wallet permission prompt flickers on the screen for a second. You click through it without thinking. Nothing happens just yet. The laptop doesn’t freeze. Five minutes later, your Solana wallet is empty.

This is not a random imagination. It’s more or less the flow that blockchain analysis experts have been documenting in hacking campaigns linked to North Korean operators. Fake recruiters, trojan-infected test files and malware are being used to hack wallets.

In today’s piece, I will take you through the evolution of crypto exploits in 2025 and how you could keep yourself safe from some of the most common types of on-chain exploits.

Onto the story now,

Prathik

Between January and September 2025, crypto thefts by North Korea-linked hackers crossed $2 billion. According to blockchain analysis firm Elliptic, 2025 is already the worst year on record for digital asset crime by value.

A large portion of the total losses is attributed to the February Bybit hack, which wiped out $1.4 billion from the crypto exchange. The cumulative value of crypto assets stolen by the North Korean regime has now exceeded $6 billion.


@Elliptic

Beyond the alarming numbers, what stands out in Elliptic’s report is how the weaknesses in crypto exploits have changed. It notes that “the majority of the hacks in 2025 have been perpetrated through social engineering attacks,” a change from earlier years when North Korea’s record hauls came from breaking infrastructure. Take the infamous Ronin Network hacks in 2022 and 2024, or the DAO hack of 2016.

Lately, that weak link has shifted from infrastructure to human. Chainalysis also reported private key compromises accounting for the largest share (43.8%) of stolen crypto in 2024.

It’s clear that as crypto evolves and security strengthens at the protocol and blockchain levels, attackers are instead finding it easier to target humans holding the private keys.

It is also becoming more organised at this level, rather than random individual targeting. Recent FBI and CISA advisories and news reports described North Korean-linked campaigns that blend fake job offers to crypto engineers, trojanised wallet software, and malicious open-source code contributions to pull off exploits. Although the tools the hackers rely on are technical, the entry point is human and psychological.

The Bybit hack, the largest crypto heist, shows how that plays out at scale. When roughly $1.4 billion of ETH was drained from a wallet cluster, early technical breakdowns pointed to a lapse in signers verifying what they were approving. The Ethereum network did its job correctly by executing valid and signed transactions, but what failed was the manual, human element.

Read: The Bybit Hack

Similarly, during the Atomic Wallet hack, about $35-100 million worth of crypto assets vanished due to malware targeting how private keys were stored on users’ machines.

You see the same idea playing out in many cases. When humans make transfers without verifying the entire wallet address or store keys with minimal security, there’s little the protocol can do to help.

Self-Custody Isn’t Foolproof

“Not your keys, not your coins” still holds, but the problem arises when people stop thinking after that.

Over the past three years, many users have moved funds off exchanges, driven as much by fear of another FTX-style collapse as by ideological conviction. The cumulative trading volume on DEXs has more than tripled, from $3.2 trillion to $11.4 trillion, over the past three years.


@DeFiLlama

Although it looks like an upgrade in security culture, the risk has moved from custodial to do-it-yourself chaos. Browser extensions on laptops, seed phrases saved in mobile phone chats or email drafts and private keys sitting in unencrypted note apps do little to ward off the danger lurking.

What self-custody was meant to solve was dependency: on exchanges, on custodians, on anyone who could pause withdrawals or go bust. What it has not yet solved is literacy. Private keys give you control, but they also give you full-fledged responsibility.

How do you really address this issue, then?

Hardware Wallets Help with Friction

Cold storage fixes part of the issue. It moves your assets offline and puts them in an equivalent of a vault.

Is the problem solved? Partially.

By moving keys off general-purpose devices, hardware wallets can eliminate the need for browser extensions or for approving transactions with a single click. They introduce physical confirmation, a type of friction that protects you.

Not Your Keys? Not Your Coins. Not at This Price Either!

Exchanges get hacked. Hot wallets get drained. Hardware wallets are the only way to truly own your assets.

Meet OneKey: The industry’s leading open-source hardware wallet. It is the easiest, most secure way to take your coins offline and out of reach.

Black Friday is the best time to secure your bag!

We recommend OneKey, no compromises.

Still deciding? Shall we spoil you with some exclusive goodies?

From Nov 28-Dec 2, use code BF25:

  • 25% OFF Bundles (Best Value)
  • 15% OFF Single Wallets
  • Wild Bonus: 2 random buyers get their entire order FREE

It’s the cheapest insurance policy you’ll ever buy for your portfolio

But a hardware wallet is still a tool.

Security teams at wallet providers have been blunt about this. Ledger has reported repeated phishing campaigns piggybacking on its brand with fake browser extensions and cloned versions of Ledger Live. The interface is familiar enough to feel safe, but at some point, the user is prompted to enter a recovery phrase. Once the phrase is compromised, the rest is a foregone conclusion.

People can also be duped into entering recovery phrases on fake firmware update pages.

What a hardware wallet does is shift the attack surface and introduce friction points to reduce the likelihood of an exploit. It does not entirely remove it.

Separation is Key

Hardware wallets work best when the user buys them from trusted channels and secures the recovery material offline and out of sight.

Most people who live in this stuff every day, including incident responders, on-chain sleuths, and wallet engineers, advise separating and diversifying risk.

One wallet for day-to-day use, another that rarely, if ever, touches the internet. Small balances for experimentation and DeFi farming, while keeping the larger ones vaulted, which require multiple steps to access.

On top of all this sits basic hygiene.

Some boring, repeated habits can often save the day. Never type a seed phrase into a website, no matter how urgent the pop-up sounds. Check the full address on the hardware screen after a copy-paste. Pause before approving any transaction that isn’t clearly under your control. Be sceptical of unsolicited links and “support” messages until proven otherwise.

None of these behaviours guarantees safety. There is always some residual risk. But each of these takes a step further in reducing the risk.

Right now, the biggest threat to most users isn’t a zero-day exploit. It’s the message they didn’t double-check, the installer they instantly downloaded and ran because the job offer sounded good, and the seed phrase they wrote on the same piece of paper as their grocery checklist.

When people in charge of billions treat these risks as background noise, they end up as case studies with “exploits” labelled across them.

That’s it for today. I’ll see you with the next one.

Until then … stay sharp,

Prathik

Disclaimer:

  1. This article is reprinted from [thetokendispatch]. All copyrights belong to the original author [Prathik Desai]. If there are objections to this reprint, please contact the Gate Learn team, and they will handle it promptly.
  2. Liability Disclaimer: The views and opinions expressed in this article are solely those of the author and do not constitute any investment advice.
  3. Translations of the article into other languages are done by the Gate Learn team. Unless mentioned, copying, distributing, or plagiarizing the translated articles is prohibited.

Share

Crypto Calendar
Abu Dhabi Buluşması
Helium, 10 Aralık'ta Abu Dhabi'de Helium House networking etkinliğine ev sahipliği yapacak ve bu etkinlik, 11-13 Aralık tarihlerinde düzenlenecek olan Solana Breakpoint konferansının öncesi olarak konumlandırılacak. Tek günlük toplantıda, Helium ekosistemindeki profesyonel ağ kurma, fikir alışverişi ve topluluk tartışmalarına odaklanılacak.
HNT
-0.85%
2025-12-09
Hayabusa Yükseltmesi
VeChain, Aralık ayında planlanan Hayabusa yükseltmesini duyurdu. Bu yükseltmenin, protokol performansını ve tokenomi'yi önemli ölçüde artırmayı hedeflediği belirtiliyor ve ekip, bu güncellemeyi bugüne kadarki en çok fayda odaklı VeChain sürümü olarak nitelendiriyor.
VET
-3.53%
2025-12-27
Litewallet Gün Batımları
Litecoin Vakfı, Litewallet uygulamasının 31 Aralık'ta resmi olarak sona ereceğini duyurdu. Uygulama artık aktif olarak korunmamakta olup, bu tarihe kadar yalnızca kritik hata düzeltmeleri yapılacaktır. Destek sohbeti de bu tarihten sonra sona erecektir. Kullanıcıların Nexus Cüzdan'a geçiş yapmaları teşvik edilmektedir; Litewallet içinde geçiş araçları ve adım adım bir kılavuz sağlanmıştır.
LTC
-1.1%
2025-12-30
OM Token Göçü Sona Erdi
MANTRA Chain, kullanıcıları OM token'larını 15 Ocak'tan önce MANTRA Chain ana ağına taşımaları için bir hatırlatma yayınladı. Taşıma işlemi, $OM'nin yerel zincirine geçişi sırasında ekosistemdeki katılıma devam edilmesini sağlar.
OM
-4.32%
2026-01-14
CSM Fiyat Değişikliği
Hedera, Ocak 2026'dan itibaren KonsensüsSubmitMessage hizmeti için sabit USD ücretinin $0.0001'den $0.0008'e yükseleceğini duyurdu.
HBAR
-2.94%
2026-01-27
sign up guide logosign up guide logo
sign up guide content imgsign up guide content img
Start Now
Sign up and get a
$100
Voucher!
Create Account

Related Articles

How to Do Your Own Research (DYOR)?
Beginner

How to Do Your Own Research (DYOR)?

"Research means that you don’t know, but are willing to find out." - Charles F. Kettering.
12/15/2022, 9:56:17 AM
What Is Fundamental Analysis?
Intermediate

What Is Fundamental Analysis?

Suitable indicators and tools combined with crypto news make up the best possible fundamental analysis for decision-making
8/12/2025, 10:42:08 AM
What Is Ethereum 2.0? Understanding The Merge
Intermediate

What Is Ethereum 2.0? Understanding The Merge

A change in one of the top cryptocurrencies that might impact the whole ecosystem
1/18/2023, 2:25:24 PM
What Is a Cold Wallet?
Beginner

What Is a Cold Wallet?

A quick overview of what a Cold Wallet is, taking into account its different types and advantages
1/9/2023, 10:43:03 AM
Beginners’ Guide to Trading
Beginner

Beginners’ Guide to Trading

This article opens the gate to cryptocurrency trading, explores unknown areas, explains crypto projects, and warns readers about potential risks.
11/21/2022, 10:23:38 AM
What Is Solana?
06:10
Beginner

What Is Solana?

As a blockchain project, Solana aims to optimize network scalability and increase speed, and adopts a unique proof of history algorithm to significantly improve the efficiency of on-chain transactions and sequencing.
3/3/2023, 3:30:19 AM