Cryptopolitan
2025-11-18 10:51:11

Kerberus Report Warns Real-Time Protection Lags as Human-Targeted Scams Surge

A new industry report released this week shows that human-targeted attacks – rather than technical vulnerabilities – are responsible for the majority of Web3 losses, despite record levels of security spending across the sector. The report, The Human Factor: Why Real-Time Protection Is the Missing Layer in Web3 Security , published by security firm Kerberus , estimates that more than $3.1 billion was stolen through hacks and scams between January and June 2025. Of that, over $600 million came from phishing, wallet compromise and social engineering incidents that targeted users directly rather than exploiting blockchain code. The figures include the $1.46 billion Bybit exchange breach, the largest crypto heist to date. Kerberus notes that even when excluding the Bybit incident as an outlier, human-targeted attacks remain a significant source of losses across the ecosystem. The report highlights what Kerberus describes as a fundamental resource-allocation failure across the Web3 security sector. According to the company’s analysis, most security spending still flows into tools that operate either before an attack occurs – such as audits and vulnerability testing – or after funds have already been stolen, including forensics and incident response. Kerberus argues that this leaves a critical gap during the short window in which users approve transactions, a moment attackers increasingly exploit because it remains largely undefended. Despite rising losses tied to phishing, wallet drainers, and social engineering, real-time protection still accounts for only a small share of available solutions. Key findings from the report According to the research: 44% of crypto thefts stem from private key mismanagement. 60% of wider cybersecurity breaches involve human error. 90% of exploited smart contracts had passed security audits before being attacked. Phishing click-through rates remain between 7–15% , even after security training. The report suggests that these patterns continue because most Web3 security spending is directed toward code auditing and post-incident analysis, while attackers increasingly focus on manipulating users during wallet interactions. Kerberus’ leadership team notes that the majority of existing tools function entirely outside the transaction window. These systems play an important role in keeping code safe and analysing breaches, but they don’t interpret user intent or scan live transactions at the wallet level. Kerberus points out that delivering this type of protection requires sophisticated real-time detection infrastructure capable of running deep scans in under a second without disrupting the user experience — a technically demanding challenge that explains why only a small minority of providers currently offer true real-time defences. Real-time protection remains limited Kerberus reviewed 61 active Web3 security providers and found that: 87% operate preventatively focusing on audits or post-incident forensics Only 13% provide real-time, transaction-level defences that can block malicious actions before approval. The report states that this distribution helps explain why losses remain high even as the number of “real-time” solutions increases: many providers market real-time features, but few deliver transaction blocking at the wallet level. Examples cited in the report One case highlighted involves an American investor who lost $330 million in Bitcoin after being manipulated in a phone-based social engineering attack, despite keeping funds secure for years. Another section points to compromised websites, hacked social media accounts, and manipulated Discord servers as growing channels for wallet-draining schemes. Implications for the sector The authors argue that the current model – where users are expected to independently evaluate risks, verify links, and recognise phishing attempts- creates predictable failure points. Frequent security prompts, they note, can lead to “alert fatigue,” making users more likely to approve malicious transactions. The report concludes that wider adoption of real-time, automated transaction screening is crucial to reduce losses and support mainstream use of Web3 platforms.

Crypto 뉴스 레터 받기
면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.