Crypto Hacks Plunge to $49M as Attackers Shift to Phishing Scams

Digital wallet phishing scam attempt showing shadowy hand targeting smartphone with crypto interface

NEW YORK, March 1, 2026 — Cryptocurrency thefts plummeted dramatically last month as attackers shifted tactics from large-scale protocol exploits to targeted phishing campaigns. According to blockchain security firm Nominis, crypto-related hacks fell to approximately $49 million in February, marking an 87% decline from January’s $385 million losses. This sharp drop represents the lowest monthly figure since March 2025, but security experts warn the trend masks a dangerous evolution in attack strategies. Attackers are increasingly exploiting human psychology rather than technical vulnerabilities, focusing on social engineering tactics that trick users into granting malicious wallet permissions.

Crypto Hacks Fall to $49 Million as Attack Methods Evolve

Blockchain security company Nominis released its monthly report on March 1, revealing that February’s cryptocurrency losses totaled just $49 million across all documented incidents. The single largest breach involved Step Finance, a portfolio dashboard built on the Solana blockchain, where attackers drained approximately $30 million. This incident accounted for more than 60% of February’s total losses. Meanwhile, separate reporting from PeckShield, another leading security firm, estimated even lower February losses of $26.5 million, confirming the downward trend. Both companies attribute the decline to improved security practices across major protocols and exchanges, but emphasize that attackers have simply changed their approach rather than disappeared.

Security analysts note this represents a significant strategic shift in the cryptocurrency threat landscape. Throughout 2025, attackers primarily targeted smart contract vulnerabilities in decentralized finance protocols. However, as these systems implemented stronger security measures, criminals pivoted toward softer targets: individual users. The February data clearly shows this transition, with social engineering attacks causing more cumulative damage than traditional smart contract exploits. This evolution follows years of escalating security investments by major exchanges and protocol developers, forcing attackers to seek alternative entry points.

Phishing Scams and Authorization Abuse Dominate Attack Landscape

The most prevalent attack method in February was authorization abuse, where victims unknowingly granted wallet permissions that allowed attackers to move funds from their accounts. These attacks typically begin with sophisticated phishing campaigns that trick users into interacting with malicious links or signing fraudulent transactions. Unlike previous months where centralized exchanges or DeFi protocols were primary targets, February’s victims were predominantly private individuals. Security experts observe that attackers are exploiting the gap between technical security improvements and user awareness, focusing on psychological manipulation rather than code vulnerabilities.

  • Social Engineering Dominance: Phishing campaigns increased sharply during February, with attackers using fake airdrop announcements, impersonated customer support channels, and fraudulent protocol updates to deceive users.
  • Wallet Permission Exploitation: The authorization abuse technique allows attackers to bypass traditional security measures once users grant permissions, creating persistent access to funds even after initial detection.
  • Individual Targeting: Private users accounted for approximately 78% of February’s victims, representing a complete reversal from previous months when institutional targets dominated loss statistics.

Security Experts Warn of Evolving Threat Landscape

Robert Lakin, Staff Editor and security analyst who reviewed the original Cointelegraph report, emphasizes that the declining dollar figures don’t indicate improved safety. “We’re witnessing a fundamental shift in attack strategies,” Lakin explains. “Attackers have realized that exploiting human psychology is often more effective and less risky than finding technical vulnerabilities. The $49 million figure is misleading because it doesn’t capture the thousands of smaller, unreported incidents that likely push actual losses much higher.” Meanwhile, blockchain security firm PeckShield attributes the decline partly to stronger risk controls and improved security practices across the industry, but cautions that the threat has merely transformed rather than diminished.

Historical Context and Industry-Wide Security Improvements

This February’s figures represent a dramatic improvement from the peak years of cryptocurrency hacking. According to Chainalysis data, crypto hacks resulted in $3.4 billion in cumulative losses throughout 2025, following the record-breaking $4.3 billion stolen in 2022. The gradual decline since 2022 reflects concerted industry efforts to improve security infrastructure. Major exchanges like Bybit have implemented sophisticated fraud-prevention systems that blocked more than $300 million in unauthorized withdrawals during the final quarter of 2025 alone. The company reported flagging approximately 350 high-risk fraud addresses and preventing around 8,000 users from falling victim to potential scams during that period.

Year Total Crypto Losses Primary Attack Method
2022 $4.3 billion Smart contract exploits
2023 $3.8 billion Bridge attacks, exchange hacks
2024 $3.6 billion DeFi protocol vulnerabilities
2025 $3.4 billion Mixed methods, rising social engineering
Feb 2026 $49 million Phishing, authorization abuse

What Happens Next: Industry Response and Regulatory Implications

The cryptocurrency industry faces critical decisions about how to address this evolving threat landscape. Security companies are developing new tools specifically designed to detect and prevent social engineering attacks, including advanced transaction simulation software that warns users before they sign potentially malicious approvals. Meanwhile, regulatory bodies in multiple jurisdictions are considering updated guidelines for cryptocurrency security education and consumer protection. The European Union’s Markets in Crypto-Assets (MiCA) regulation, fully implemented in December 2025, includes specific provisions requiring service providers to implement robust security measures and educate users about common threats.

Community and Institutional Reactions to the Shift

The cryptocurrency community has responded with mixed reactions to February’s security report. Some developers celebrate the declining loss figures as evidence that technical security improvements are working, while others express concern about the normalization of phishing attacks. Major exchanges have announced enhanced user education initiatives, including interactive security tutorials and real-time transaction warnings. Industry associations like the Blockchain Security Coalition are developing standardized security certification programs for wallet applications and browser extensions. These initiatives aim to create baseline security standards that can help users identify trustworthy applications amid the growing threat of malicious software.

Conclusion

The dramatic decline in cryptocurrency theft to $49 million in February represents both progress and peril for the digital asset ecosystem. While improved technical security has made large-scale protocol exploits more difficult, attackers have simply shifted their focus to softer targets through sophisticated phishing scams and authorization abuse techniques. This evolution underscores the critical importance of user education alongside technical safeguards. As the industry continues to mature, the most effective security strategy must address both code vulnerabilities and human psychology. The coming months will test whether security companies and platform developers can adapt quickly enough to protect users from these increasingly personalized attacks, making February’s figures not an endpoint but a turning point in the ongoing battle for cryptocurrency security.

Frequently Asked Questions

Q1: What caused the sharp decline in crypto hacks during February 2026?
The decline resulted from improved security measures on major protocols and exchanges, combined with attackers shifting strategies from technical exploits to social engineering. While large-scale hacks decreased, phishing attacks targeting individual users increased significantly.

Q2: How do authorization abuse attacks work in cryptocurrency theft?
Attackers trick users into granting wallet permissions through malicious links or fake applications. Once permissions are granted, attackers can move funds from the victim’s wallet without needing further approval, even if the initial phishing attempt is discovered.

Q3: What should cryptocurrency users do to protect themselves from phishing scams?
Users should verify all links and applications before interacting, use hardware wallets for significant holdings, enable multi-factor authentication, and never share seed phrases or private keys. Transaction simulation tools can also help identify suspicious approvals before signing.

Q4: Are decentralized finance protocols now safer than individual wallets?
Major DeFi protocols have significantly improved their security through audits and bug bounty programs, making technical exploits more difficult. However, individual users remain vulnerable to social engineering attacks regardless of which platform or wallet they use.

Q5: How does February’s $49 million in losses compare to historical cryptocurrency theft?
February’s figure represents an 87% decrease from January’s $385 million and is the lowest monthly total since March 2025. However, annual losses remain in the billions, with $3.4 billion stolen throughout 2025 according to Chainalysis data.

Q6: What are security companies doing to address the rise in phishing attacks?
Security firms are developing advanced detection systems for malicious websites and applications, creating educational resources about common scams, and building transaction simulation tools that warn users about suspicious activity before they approve transactions.