Phishing Attacks Surge as Crypto Heists Decline in February
Cryptocurrency is a high-risk asset class, and investing carries significant risk, including the potential loss of some or all of your investment. The information on this website is provided for informational and educational purposes only and does not constitute financial, investment, or gambling advice. Cryptowinx does not endorse any specific exchange or gaming platform. For more details, please read our terms and full disclaimer.
Cryptowinx navigates the digital asset universe with a dynamic, forward-looking vision. Throughout our evolution, we have followed every market cycle, from vertical rises to corrections, always remaining a solid point of reference for our community. Our team is made up of industry experts and analysts who experience the blockchain ecosystem daily: we constantly monitor Bitcoin’s stability, study the expansion of the Ethereum ecosystem, and analyze the new frontiers of crypto casinos. We are committed to absolute editorial integrity, separating the signal from the noise through rigorous fact-checking and multi-perspective news analysis. In a landscape where innovations emerge in moments, our mission is to simplify complex concepts and offer transparency into what is established and what is still experimental.
Learn more Cryptowinx
In a notable shift in the landscape of cryptocurrency theft, February’s figures revealed a significant decrease in conventional hacks. While the industry has faced considerable losses in the past, recent reports indicate that phishing schemes now account for a notable portion of the risks.
During the last quarter of 2022, Bybit reported preventing over $300 million in unauthorized withdrawals, emphasizing the stark contrast with February’s estimated losses of nearly $50 million across the entire cryptocurrency sector, as outlined by security firm Nominis.
Despite the apparent drop from January’s staggering $385 million, experts suggest that the decline should not overshadow the evolving tactics used by cybercriminals. Rather than relying solely on software vulnerabilities, attackers have increasingly turned to social engineering techniques, exploiting human error to access sensitive information.
This month saw a troubling rise in phishing operations. These scams frequently involve deceptive communications aimed at tricking users into clicking harmful links or authorizing transactions without proper awareness. Among these tactics, the most common involved manipulation that led users to unknowingly grant wallet permissions.
After obtaining these permissions, attackers could easily transfer funds, with individual users often being their primary targets, rather than major exchanges or protocols.
A particularly damaging event in February was attributed to a single breach. Step Finance, a platform for portfolio analytics on the Solana blockchain, suffered a loss of around $30 million. Excluding this incident from the total shifts the narrative, revealing that February may have been significantly quieter had it not occurred.
The overall statistics support this perspective, as blockchain security firm PeckShield reported total losses of $26.5 million for the monthβthe lowest since March 2025. This decline is in part attributed to improved risk management and enhanced security practices within the industry.
Nevertheless, the overarching picture remains concerning, with crypto hacks inflicting a staggering $3.4 billion in damages last year, as highlighted by Chainalysis data. This statistic underscores the ongoing vulnerabilities that still need to be addressed.
Bybit’s own security measures reflect the continuous effort to combat these threats. The exchange’s fraud detection systems flagged over 350 high-risk addresses and prevented around 8,000 users from falling victim to potential scams, all within the span of a single quarter.
While large-scale attacks on protocols may be decreasing, the rise in scams targeting individual users highlights a troubling redirection of criminal strategies. Enhanced smart contract audits and improved monitoring processes might be closing one avenue for attackers; however, as long as individuals can be misled into authorizing incorrect transactions, vulnerabilities will remain.

Commentaries
Add your comment
Fill in necessary fields and publish