HomeSecurity ArchitectureHow Cyber Criminals Steal Cryptocurrency

How Cyber Criminals Steal Cryptocurrency

Published on

spot_img

Cryptocurrencies like Bitcoin and Ethereum continue to be prime targets for online criminals, who exploit vulnerabilities in major trading platforms and individual users’ digital wallets to carry out hefty thefts. The recent heist of US$1.5 billion worth of Ethereum from the Bybit platform, which the FBI has attributed to North Korean hackers, stands as the largest known theft in a growing list of such incidents.

Despite the transparency of blockchain technology, which publicly records transactions involving cryptocurrencies, theft remains a prevalent issue. A report from Chainalysis revealed that an estimated US$2.2 billion worth of assets was stolen in 2024, marking the fourth consecutive year that the global total exceeded US$1 billion. Notably, 60% of all crypto thefts by value in 2024 were linked to North Korea, with hackers from the country gaining renown for their sophisticated and persistent methods.

Cybercriminals often target cryptocurrency trading platforms and digital wallets, exploiting security vulnerabilities to access funds. While using major platforms involves trusting them with securing the cryptocurrency, hackers can bypass defenses through cyberattacks. The most common method of stealing crypto in 2024, according to Chainalysis, involved compromising owners’ private keys, accounting for nearly 43% of stolen funds that year. These key access codes can be obtained through social engineering tactics like phishing or hacking, allowing thieves to transfer assets out of wallets.

Blockchain technology, developed in the late 2000s, is lauded for its high level of security in recording ownership and transactions. Each transaction is recorded in a digital ledger, with copies dispersed across numerous participants’ computers, making it extremely challenging to tamper with the information. While attacks on the blockchain itself are possible, such as attempting to rewrite transactions, the difficulty level is notably high. In 2019, Gate.io fell victim to a blockchain attack, losing $200,000 in the process.

One of blockchain’s key virtues is traceability, as all transactions are publicly visible, theoretically enabling easy tracking of stolen assets. However, criminals can employ “mixers” to obscure the origin of funds, making tracing nearly impossible. These technologies blend cryptocurrency funds to conceal their source, impeding efforts to connect the assets back to their original source. Despite the challenges posed by such tactics, efforts to combat crypto theft continue to evolve in a bid to enhance security within the digital asset space.

Source link

Latest articles

Cybersecurity Program Expands at EWU

Eastern Washington University Strengthens Cybersecurity Program to Address Workforce Shortage In a concerted effort to...

Germany Makes Another Attempt at ISP Data Retention Mandate

Berlin Proposes Three-Month Requirement to Store IP Addresses On April 23, 2026, the German government...

Google Prefers General-Purpose Gemini Models Over Cybersecurity-Specific Solutions

Google Cloud's chief operations officer, Francis DeSouza, has made a significant announcement regarding the...

GitLab Addresses Vulnerabilities That Could Enable User Session Hijacking

GitLab, the popular DevOps platform, has taken significant steps to bolster its security posture...

More like this

Cybersecurity Program Expands at EWU

Eastern Washington University Strengthens Cybersecurity Program to Address Workforce Shortage In a concerted effort to...

Germany Makes Another Attempt at ISP Data Retention Mandate

Berlin Proposes Three-Month Requirement to Store IP Addresses On April 23, 2026, the German government...

Google Prefers General-Purpose Gemini Models Over Cybersecurity-Specific Solutions

Google Cloud's chief operations officer, Francis DeSouza, has made a significant announcement regarding the...