Crypto exploit losses plummeted to $49 million in February, a massive cooling-off period following January's $385 million bloodbath. While the headlines focus on the lower headline number, the real story is a tactical pivot: bad actors are abandoning complex smart contract exploits in favor of high-volume social engineering and wallet permission abuse.

Why are crypto attackers shifting from protocol hacks to phishing?

For years, the "degen" narrative focused on massive protocol drains—think bridge hacks or flash loan attacks. However, as decentralized finance (DeFi) protocols harden their code through rigorous audits and bug bounty programs, the path of least resistance has shifted. Attackers are finding that it is significantly easier to trick a user into signing a malicious transaction than it is to break an immutable smart contract.

According to recent data from Nominis, the bulk of February’s losses were driven by authorization abuse. This involves victims unknowingly granting "infinite spend" permissions to malicious smart contracts, effectively handing over the keys to their wallet contents.

What was the biggest exploit in February?

The vast majority of February's losses were concentrated in a single event. The Step Finance breach on the Solana blockchain accounted for roughly $30 million of the $49 million total. This highlights a critical reality in crypto security: even when industry-wide losses appear to be trending downward, a single point of failure can still result in catastrophic losses for a specific ecosystem.

Is the industry actually getting safer?

It depends on how you measure it. While Nominis tracked $49 million in losses, other security firms like PeckShield estimated the damage to be as low as $26.5 million, potentially the lowest monthly loss since early 2025. This discrepancy suggests that while "on-chain" exploits are becoming harder to execute, the "human factor" remains the industry's largest vulnerability.

Comparison of Reported February Losses

SourceEstimated LossesPrimary Driver
Nominis$49 MillionAuthorization Abuse
PeckShield$26.5 MillionImproved Risk Controls

Major players are fighting back. Bybit recently reported blocking over $300 million in unauthorized withdrawals in Q4, signaling that centralized exchanges are becoming more adept at flagging high-risk addresses. However, as macro conditions shift, some analysts suggest that liquidity constraints—similar to those discussed in broader market shifts—can lead to increased desperation and higher rates of social engineering attempts.

FAQ

1. Why did crypto hacks decrease in February? Attackers are shifting away from complex protocol exploits, which are increasingly difficult due to better security audits, and moving toward easier social engineering and phishing campaigns.

2. What is "authorization abuse" in crypto? It is a scam where a user is tricked into signing a transaction that grants an attacker permission to access or move funds from their wallet, often under the guise of a "connection" or "approval."

3. Are centralized exchanges safer than DeFi protocols? Generally, yes. Exchanges have invested heavily in fraud-prevention systems that flag suspicious activity, whereas self-custody users are solely responsible for verifying the permissions they sign.

Market Signal

While the drop in total hack volume is a bullish signal for protocol maturity, the rise in phishing suggests that retail capital remains highly vulnerable to social engineering. Investors should audit their wallet permissions on platforms like Revoke.cash immediately to ensure no malicious approvals remain active.