Close Menu
Cryptosphere Update
  • Crypto News
  • Economy
  • Crypto Markets
  • World News
  • Technology
  • Breaking Views
What's Hot

24/7 Takeover: How Cryptocurrency’s $130 Billion TradFi Surge Is Absorbing Global Commodity Trading

March 7, 2026

Former Michigan State football coach Sherone Moore enters plea deal

March 7, 2026

Clinton reflects on friendship with Pastor Jesse Jackson

March 6, 2026
Facebook X (Twitter) Instagram
Trending
  • 24/7 Takeover: How Cryptocurrency’s $130 Billion TradFi Surge Is Absorbing Global Commodity Trading
  • Former Michigan State football coach Sherone Moore enters plea deal
  • Clinton reflects on friendship with Pastor Jesse Jackson
  • The war between the US and Iran is already hitting consumers’ pockets. Here’s how to do it
  • Utexo raises $7.5 million to launch Bitcoin-native USDT payments infrastructure
  • Employment statistics for February 2026:
  • The 2026 labor market is expected to begin to take shape with the February employment statistics
  • Altcoin Season “The Game Is Over”: Matt Hogan
Facebook X (Twitter) Instagram
Cryptosphere Update
  • Crypto News
  • Economy
  • Crypto Markets
  • World News
  • Technology
  • Breaking Views
Crypto Heatmap
Cryptosphere Update
Home » Why can’t businesses stop social engineering attacks?
Breaking Views

Why can’t businesses stop social engineering attacks?

Vickie HelmBy Vickie HelmJanuary 12, 2026No Comments6 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Why can't businesses stop social engineering attacks?
Share
Facebook Twitter LinkedIn Pinterest Email

Disclosure: The views and opinions expressed herein belong solely to the authors and do not represent the views and opinions of crypto.news editorials.

Over the past year, most of the biggest abuses in cryptocurrencies have had the same root cause: humans. In the past few months alone, Ledger has urged users to pause on-chain activity after npm maintainers were fooled and malicious packages were spread. Workday reveals a social engineering campaign that accessed data from a third-party CRM. And operators with ties to North Korea continued to solicit fake jobs for crypto teams in order to distribute malware.

summary

Cryptocurrency is not being hacked, it is being talked into transferring the virtual currency itself. Today, most breaches are not caused by code corruption, but by phishing, fake updates, and spoofing, with humans being the primary target. Programmable money turns small mistakes into catastrophic losses. A single key leak or approved request can cause funds to be instantly and irrevocably revoked, making social engineering a system-wide risk rather than user error. Until operational security is treated like core infrastructure, exploits will continue to grow. Audits and code reviews cannot stop human deception. All it can do is enforce standards for devices, access, and training.

Despite spending billions of dollars on cybersecurity, companies continue to be victimized by simple social engineering. Teams pour money into technical safeguards, audits, and code reviews while ignoring operational security, device hygiene, and basic human factors. As more financial activities move on-chain, that blind spot becomes a systemic risk to digital infrastructure.

The only way to slow the proliferation of social engineering attacks is widespread and continued investment in operational security, which will reduce the returns on these tactics.

Social engineering is the Achilles heel of cybersecurity

Verizon’s 2025 Data Breach Investigations Report states that the “human element” of cybersecurity (phishing, stolen credentials, routine mistakes) is involved in approximately 60% of data breaches.

Social engineering works because it targets humans, not code, and exploits trust, urgency, familiarity, and everydayness. These types of exploits cannot be eliminated with coding audits and are difficult to prevent with automated cybersecurity tools. Code reviews and other common cybersecurity practices can’t stop employees from approving fraudulent requests that look like they come from their managers or downloading fake Zoom updates that look legitimate.

Even highly skilled teams can be caught. Human weakness is universal and stubborn. As a result, social engineering continues to cause real-world incidents.

Cryptocurrency raises the stakes

Programmable money concentrates risk. In Web3, compromising a seed phrase or API token can be the equivalent of breaking into a bank vault. The irreversible nature of cryptocurrency transactions magnifies mistakes. Once funds are transferred, there is often no way to reverse the transaction. One mishandling of device security or keys can result in asset loss. Because of Web3’s distributed design, there is often no help desk to contact, leaving users to fend for themselves.

Hackers, including state-sponsored mercenaries, have taken note of the effectiveness of social engineering attacks and adapted accordingly. The activity attributed to North Korea’s Lazarus Group relies heavily on social engineering, including fake job postings, tainted PDFs, malicious packages, and tailored phishing targeting human vulnerabilities.

These exploits are incredibly effective and easy to execute, and technology companies can’t seem to prevent them. Unlike zero-day exploits that are quickly patched (which forces hackers to find new exploit strategies), hackers can leverage the same social engineering tactics over and over again autonomously, spending more time hacking and less time doing research and development.

Businesses need to invest in operational security

Too many organizations still treat security as a compliance exercise, reinforced by permissive regulatory standards. Companies routinely pass audits and issue clean reports despite obvious operational risks, such as admin keys stored on personal laptops, credentials shared via chat or email, outdated access privileges that are never updated, and travel laptops repurposed as development machines.

Correcting this lack of discipline requires explicit and mandatory operational security. Teams should use managed devices, strong endpoint protection, and full disk encryption. Corporate logins should leverage password managers and phishing-resistant MFA. System administrators must carefully manage permissions and access. These controls are not foolproof, but they can help make social engineering attacks more difficult and reduce the impact of potential exploits.

Most importantly, teams need to invest in operational security training. Your employees (not your cybersecurity team) are your first line of defense against social engineering attacks. Companies should spend time training their teams to identify potential phishing attacks, practice safe data hygiene, and understand operational security practices.

Importantly, organizations cannot be expected to adopt enhanced cybersecurity postures voluntarily. Regulators need to step in and set enforceable operational baselines that make real security not optional. Compliance frameworks should go beyond documentation to require empirical proof of secure practices: validated key management, regular access reviews, endpoint hardening, and phishing response simulations. Without regulatory teeth, incentives will always favor optics over results.

Social engineering is only getting worse

With attack rates rapidly increasing, it’s important to invest in operational security now.

Generative AI has changed the economics of deception. Attackers can now personalize, localize, and automate phishing at an industrial scale. Campaigns that were once focused on a single user or business can now target thousands of businesses with little additional cost. Phishing attacks can be customized with just a few clicks and include personal details to make the spoofed email seem legitimate.

AI also accelerates reconnaissance. Public footprints, leaked credentials, and open source intelligence can be mined into a “summary” about each victim, helping hackers develop convincing attacks.

slow down attack speed

Social engineering thrives when implicit trust and convenience take precedence over verification and prudence. Organizations must adopt a more defensive posture and assume (correctly) that they are under constant threat of social engineering attacks.

Teams should adopt Zero Trust principles in their daily work and embed operational security principles throughout the company. You need to train your employees on operational security so they can stop attacks early and keep your team up to date on the latest social engineering tactics.

Most importantly, companies need to find where trust is still alive in their operations (where attackers can impersonate employees, software, or customers) and add additional safeguards.

Social engineering will not disappear, but it can be made much less effective and far less catastrophic when an attack occurs. As the industry strengthens its defenses against these attacks, social engineering will become less lucrative for hackers and attacks will become less frequent, ultimately bringing a true end to this stifling cycle of exploitation.

Jan Philippe Fritsche

Dr. Jan Philippe Fritsche I am the Managing Director of Oak Security, a cybersecurity company specializing in Web3 audits. Prior to his role at Oak Security, he gained extensive experience in econometrics and risk modeling, holding positions at institutions such as the European Central Bank and DIW Berlin. He holds a Ph.D. in Economics from Humboldt University in Berlin.

attacks businesses Engineering social stop
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
vickiehelminc
Vickie Helm

Related Posts

Opinion: The fatal flaw in the Bitcoin debate is that it confuses value and utility.

February 23, 2026

Changes in digital asset laws in the United States, China, and United Arab Emirates

February 22, 2026

When markets collapse, traders turn to AI

February 21, 2026

Blockchain technology upgrades political campaign finance

February 20, 2026
Add A Comment

Comments are closed.

Popular Posts

PPI January 2026:

February 27, 2026

The US military reportedly shot down a Border Patrol drone with a laser, sparking a new air force blockade and derision from lawmakers.

February 27, 2026

Bitcoin traders wary of leverage as market uncertainty soars – Learn more

February 21, 2026

24/7 Takeover: How Cryptocurrency’s $130 Billion TradFi Surge Is Absorbing Global Commodity Trading

March 7, 2026
Latest Posts

24/7 Takeover: How Cryptocurrency’s $130 Billion TradFi Surge Is Absorbing Global Commodity Trading

March 7, 2026

Former Michigan State football coach Sherone Moore enters plea deal

March 7, 2026

Clinton reflects on friendship with Pastor Jesse Jackson

March 6, 2026

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

About
About

At Cryptosphere Update, we are dedicated to bringing you in-depth coverage of the rapidly evolving crypto landscape, from market trends and emerging blockchain projects to regulatory developments and expert analysis. Our mission is to keep you informed and ahead of the curve in the ever-changing world of digital assets.

Facebook X (Twitter) Instagram Pinterest YouTube
Don't Miss

24/7 Takeover: How Cryptocurrency’s $130 Billion TradFi Surge Is Absorbing Global Commodity Trading

March 7, 2026

Former Michigan State football coach Sherone Moore enters plea deal

March 7, 2026

Clinton reflects on friendship with Pastor Jesse Jackson

March 6, 2026
Newsletter

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

© 2026 Cryptosphere Update. All Rights Reserved.
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.