The narrative around crypto security is shifting in ways the industry didn’t anticipate. While 2025 set a grim record as the worst year for crypto hacks on record, the troubling revelation lies not in sophisticated smart contract exploits or elegant code vulnerabilities. Instead, 19 billion compromised passwords and Web2-style operational failures—stolen credentials, manipulated employees, fake support channels—account for the vast majority of losses. This reframing matters profoundly because it suggests something counterintuitive: as onchain security hardens, attackers are adapting by targeting the easiest vulnerability in any system: human beings.
Mitchell Amador, CEO of onchain security platform Immunefi, crystallized this shift in an exclusive conversation: “Despite 2025 being the worst year for hacks on record, those hacks stem from Web2 operational failures, not onchain code.” The distinction cuts to the heart of crypto’s evolving threat landscape. While losses mounted throughout 2025, onchain security paradoxically improved—a divergence that will likely define the next era of digital asset protection.
The Human Factor Becomes Crypto’s Weakest Link
The evidence is stark. Roughly $17 billion in cryptocurrency was siphoned through scams and frauds in 2025, with impersonation tactics and AI-enabled schemes emerging as devastatingly effective vectors. Chainalysis’ 2026 Crypto Crime Report documents a seismic shift in attacker behavior: impersonation scams exploded 1,400% year-over-year, while AI-augmented schemes proved 450% more profitable than traditional fraud methods.
This isn’t abstract—the damage is concrete. Just last month, blockchain researcher ZachXBT exposed a $282 million social engineering heist where attackers manipulated a target into surrendering 2.05 million LTC and 1,459 BTC. The loot was immediately laundered through privacy-focused instant exchanges into Monero, illustrating how operational security failures cascade across the entire ecosystem.
What makes these attacks particularly insidious is their low technical barrier. A convincing phishing email, a fake support agent, or compromised credentials bypass every firewall and sophisticated contract audit money can buy. The 19 billion compromised passwords circulating in various dark corners of the internet represent an ever-expanding attack surface—one that automated defenses struggle to contain.
Impersonation and AI Scams Overtake Traditional Infrastructure Attacks
The criminal calculus has changed. Where attackers once focused on finding obscure bugs in token contracts or layer-2 implementations, they now prioritize social psychology and at-scale manipulation. Chainalysis’ data reveals this tectonic shift: scams and frauds now outpace direct infrastructure breaches as the primary vector for extracting value from the crypto ecosystem.
Amador elaborates on why code exploitability is declining: “With the code becoming less exploitable, the main attack surface in 2026 will be people.” DeFi protocols have dramatically improved their security posture through audits, bug bounty programs, and defensive architecture. Yet this progress creates a perverse incentive structure—attackers simply move downstream to softer targets: individual users, corporate employees, and operational processes.
The scale is remarkable. Impersonation scams alone represent not just a category within fraud, but now a dominant threat vector. Combined with AI-enabled social engineering, which can synthesize convincing synthetic identities and personalized manipulation at machine speed, the targeting of individuals has become more efficient and profitable than ever.
Why Smart Contract Security Can’t Stop Social Engineering
A sobering statistic underscores the paradox: over 90% of crypto projects still harbor critical, exploitable vulnerabilities in their code. Yet even this grim reality obscures a deeper truth. The vulnerability isn’t the unpatched contract—it’s the wallet password written on a sticky note, the USB key left in a taxi, the employee who clicks a malicious link.
Chainalysis and Immunefi’s respective findings converge on an uncomfortable reality. Defensive tools that could dramatically reduce risk remain dramatically underutilized. Less than 1% of the industry deploys firewalls. Fewer than 10% have implemented AI-driven detection systems. These gaps aren’t technical failures; they’re organizational ones. The infrastructure exists to prevent most of the operational disasters that defined 2025, yet adoption remains abysmal.
Amador’s perspective frames this challenge in human terms: “The human factor is now the weak link that onchain security experts and Web3 players must prioritize.” This isn’t hyperbole. A compromised password, unlike a smart contract bug, requires no sophisticated vulnerability research to exploit. It’s distribution at scale, manipulation made trivial by AI, and the eternal malleability of human psychology.
The AI Arms Race: Defenders vs. Attackers at Machine Speed
If 2025 belonged to criminals learning how to exploit people at scale, 2026 will belong to the technology that enables and counters such exploitation at machine velocity. “AI will change the tempo of security on both sides,” Amador explains. Defenders will deploy AI-driven monitoring and response systems that operate at machine speed, detecting anomalies and blocking attacks in milliseconds. Simultaneously, attackers will use identical tools for vulnerability research, exploit engineering, and mass social engineering campaigns.
This arms race introduces a category of risk that few in the industry are adequately prepared for. As code security hardens, the frontier of vulnerability shifts from static contracts to dynamic human-machine interfaces. The interface between user, wallet, exchange, and protocol becomes the new battleground—one where AI enables both unprecedented defense and unprecedented deception.
Onchain Agents Introduce New Vulnerabilities
Perhaps the most forward-looking risk Amador identified extends beyond conventional cybersecurity paradigms altogether. As autonomous onchain agents and AI systems gain the ability to execute decisions and transfer assets without human intermediation, a novel attack surface emerges. “Onchain AI agents can be faster and more powerful than human operators, and they’re uniquely vulnerable to manipulation if their access paths or control layers are compromised,” he cautioned.
This represents a qualitative shift in risk. Previous security failures required an attacker to compromise a wallet or exchange account—discrete, identifiable assets. AI agents, by contrast, operate with delegated authority across protocols and liquidity pools. Compromise a single agent’s control layer and the attacker gains algorithmic access to capital flows at machine speed. “We’re still early in learning how to secure agents properly,” Amador acknowledges, “and that’s going to be one of the defining security challenges of the next cycle.”
The Road Ahead: Security Beyond Code
The emerging consensus among security experts is striking. Onchain security is demonstrably improving, yet total losses continue to mount. This apparent contradiction dissolves when the lens shifts from code to operations. The adversary isn’t a clever programmer finding a reentrancy bug—it’s a sophisticated criminal using 19 billion compromised passwords, synthesized identities, and psychological manipulation to extract value from individuals.
The crypto industry’s response will determine whether 2026 reverses the damage of 2025. It requires investment in defensive AI systems, enterprise-grade password management, multi-signature controls, and education. It requires closing the adoption gap that leaves 99% of projects unprotected by basic security infrastructure. Most fundamentally, it requires recognizing that the strongest cryptography in the world means nothing if the weakest link remains human judgment, compromise, and deception.
The security battle is no longer fought onchain. It’s fought in user interfaces, corporate access controls, monitoring dashboards, and the spaces between human intention and automated execution. And in that arena, the side that combines technological sophistication with operational discipline will ultimately prevail.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
19 Billion Compromised Passwords Reveal Why Crypto's Real Security Problem Isn't Code—It's People
The narrative around crypto security is shifting in ways the industry didn’t anticipate. While 2025 set a grim record as the worst year for crypto hacks on record, the troubling revelation lies not in sophisticated smart contract exploits or elegant code vulnerabilities. Instead, 19 billion compromised passwords and Web2-style operational failures—stolen credentials, manipulated employees, fake support channels—account for the vast majority of losses. This reframing matters profoundly because it suggests something counterintuitive: as onchain security hardens, attackers are adapting by targeting the easiest vulnerability in any system: human beings.
Mitchell Amador, CEO of onchain security platform Immunefi, crystallized this shift in an exclusive conversation: “Despite 2025 being the worst year for hacks on record, those hacks stem from Web2 operational failures, not onchain code.” The distinction cuts to the heart of crypto’s evolving threat landscape. While losses mounted throughout 2025, onchain security paradoxically improved—a divergence that will likely define the next era of digital asset protection.
The Human Factor Becomes Crypto’s Weakest Link
The evidence is stark. Roughly $17 billion in cryptocurrency was siphoned through scams and frauds in 2025, with impersonation tactics and AI-enabled schemes emerging as devastatingly effective vectors. Chainalysis’ 2026 Crypto Crime Report documents a seismic shift in attacker behavior: impersonation scams exploded 1,400% year-over-year, while AI-augmented schemes proved 450% more profitable than traditional fraud methods.
This isn’t abstract—the damage is concrete. Just last month, blockchain researcher ZachXBT exposed a $282 million social engineering heist where attackers manipulated a target into surrendering 2.05 million LTC and 1,459 BTC. The loot was immediately laundered through privacy-focused instant exchanges into Monero, illustrating how operational security failures cascade across the entire ecosystem.
What makes these attacks particularly insidious is their low technical barrier. A convincing phishing email, a fake support agent, or compromised credentials bypass every firewall and sophisticated contract audit money can buy. The 19 billion compromised passwords circulating in various dark corners of the internet represent an ever-expanding attack surface—one that automated defenses struggle to contain.
Impersonation and AI Scams Overtake Traditional Infrastructure Attacks
The criminal calculus has changed. Where attackers once focused on finding obscure bugs in token contracts or layer-2 implementations, they now prioritize social psychology and at-scale manipulation. Chainalysis’ data reveals this tectonic shift: scams and frauds now outpace direct infrastructure breaches as the primary vector for extracting value from the crypto ecosystem.
Amador elaborates on why code exploitability is declining: “With the code becoming less exploitable, the main attack surface in 2026 will be people.” DeFi protocols have dramatically improved their security posture through audits, bug bounty programs, and defensive architecture. Yet this progress creates a perverse incentive structure—attackers simply move downstream to softer targets: individual users, corporate employees, and operational processes.
The scale is remarkable. Impersonation scams alone represent not just a category within fraud, but now a dominant threat vector. Combined with AI-enabled social engineering, which can synthesize convincing synthetic identities and personalized manipulation at machine speed, the targeting of individuals has become more efficient and profitable than ever.
Why Smart Contract Security Can’t Stop Social Engineering
A sobering statistic underscores the paradox: over 90% of crypto projects still harbor critical, exploitable vulnerabilities in their code. Yet even this grim reality obscures a deeper truth. The vulnerability isn’t the unpatched contract—it’s the wallet password written on a sticky note, the USB key left in a taxi, the employee who clicks a malicious link.
Chainalysis and Immunefi’s respective findings converge on an uncomfortable reality. Defensive tools that could dramatically reduce risk remain dramatically underutilized. Less than 1% of the industry deploys firewalls. Fewer than 10% have implemented AI-driven detection systems. These gaps aren’t technical failures; they’re organizational ones. The infrastructure exists to prevent most of the operational disasters that defined 2025, yet adoption remains abysmal.
Amador’s perspective frames this challenge in human terms: “The human factor is now the weak link that onchain security experts and Web3 players must prioritize.” This isn’t hyperbole. A compromised password, unlike a smart contract bug, requires no sophisticated vulnerability research to exploit. It’s distribution at scale, manipulation made trivial by AI, and the eternal malleability of human psychology.
The AI Arms Race: Defenders vs. Attackers at Machine Speed
If 2025 belonged to criminals learning how to exploit people at scale, 2026 will belong to the technology that enables and counters such exploitation at machine velocity. “AI will change the tempo of security on both sides,” Amador explains. Defenders will deploy AI-driven monitoring and response systems that operate at machine speed, detecting anomalies and blocking attacks in milliseconds. Simultaneously, attackers will use identical tools for vulnerability research, exploit engineering, and mass social engineering campaigns.
This arms race introduces a category of risk that few in the industry are adequately prepared for. As code security hardens, the frontier of vulnerability shifts from static contracts to dynamic human-machine interfaces. The interface between user, wallet, exchange, and protocol becomes the new battleground—one where AI enables both unprecedented defense and unprecedented deception.
Onchain Agents Introduce New Vulnerabilities
Perhaps the most forward-looking risk Amador identified extends beyond conventional cybersecurity paradigms altogether. As autonomous onchain agents and AI systems gain the ability to execute decisions and transfer assets without human intermediation, a novel attack surface emerges. “Onchain AI agents can be faster and more powerful than human operators, and they’re uniquely vulnerable to manipulation if their access paths or control layers are compromised,” he cautioned.
This represents a qualitative shift in risk. Previous security failures required an attacker to compromise a wallet or exchange account—discrete, identifiable assets. AI agents, by contrast, operate with delegated authority across protocols and liquidity pools. Compromise a single agent’s control layer and the attacker gains algorithmic access to capital flows at machine speed. “We’re still early in learning how to secure agents properly,” Amador acknowledges, “and that’s going to be one of the defining security challenges of the next cycle.”
The Road Ahead: Security Beyond Code
The emerging consensus among security experts is striking. Onchain security is demonstrably improving, yet total losses continue to mount. This apparent contradiction dissolves when the lens shifts from code to operations. The adversary isn’t a clever programmer finding a reentrancy bug—it’s a sophisticated criminal using 19 billion compromised passwords, synthesized identities, and psychological manipulation to extract value from individuals.
The crypto industry’s response will determine whether 2026 reverses the damage of 2025. It requires investment in defensive AI systems, enterprise-grade password management, multi-signature controls, and education. It requires closing the adoption gap that leaves 99% of projects unprotected by basic security infrastructure. Most fundamentally, it requires recognizing that the strongest cryptography in the world means nothing if the weakest link remains human judgment, compromise, and deception.
The security battle is no longer fought onchain. It’s fought in user interfaces, corporate access controls, monitoring dashboards, and the spaces between human intention and automated execution. And in that arena, the side that combines technological sophistication with operational discipline will ultimately prevail.