• bitcoinBitcoin (BTC) $ 118,701.00
  • ethereumEthereum (ETH) $ 4,256.75
  • xrpXRP (XRP) $ 3.21
  • tetherTether (USDT) $ 1.00
  • bnbBNB (BNB) $ 803.67
  • solanaSolana (SOL) $ 182.95
  • usd-coinUSDC (USDC) $ 0.999706
  • staked-etherLido Staked Ether (STETH) $ 4,248.25
  • dogecoinDogecoin (DOGE) $ 0.235408
  • tronTRON (TRX) $ 0.338805
  • cardanoCardano (ADA) $ 0.806957
  • wrapped-stethWrapped stETH (WSTETH) $ 5,135.02
  • hyperliquidHyperliquid (HYPE) $ 45.34
  • wrapped-bitcoinWrapped Bitcoin (WBTC) $ 118,573.00
  • chainlinkChainlink (LINK) $ 22.15
  • stellarStellar (XLM) $ 0.445579
  • suiSui (SUI) $ 3.89
  • wrapped-beacon-ethWrapped Beacon ETH (WBETH) $ 4,575.48
  • wrapped-eethWrapped eETH (WEETH) $ 4,563.36
  • bitcoin-cashBitcoin Cash (BCH) $ 571.38
  • hedera-hashgraphHedera (HBAR) $ 0.260460
  • ethena-usdeEthena USDe (USDE) $ 1.00
  • avalanche-2Avalanche (AVAX) $ 23.92
  • wethWETH (WETH) $ 4,257.31
  • litecoinLitecoin (LTC) $ 124.66
  • the-open-networkToncoin (TON) $ 3.34
  • leo-tokenLEO Token (LEO) $ 9.03
  • shiba-inuShiba Inu (SHIB) $ 0.000014
  • usdsUSDS (USDS) $ 0.999284
  • binance-bridged-usdt-bnb-smart-chainBinance Bridged USDT (BNB Smart Chain) (BSC-USD) $ 1.00
  • uniswapUniswap (UNI) $ 11.01
  • whitebitWhiteBIT Coin (WBT) $ 45.08
  • coinbase-wrapped-btcCoinbase Wrapped BTC (CBBTC) $ 118,647.00
  • polkadotPolkadot (DOT) $ 4.08
  • crypto-com-chainCronos (CRO) $ 0.163494
  • ethenaEthena (ENA) $ 0.781199
  • ethena-staked-usdeEthena Staked USDe (SUSDE) $ 1.19
  • pepePepe (PEPE) $ 0.000012
  • bitget-tokenBitget Token (BGB) $ 4.46
  • moneroMonero (XMR) $ 268.52
  • aaveAave (AAVE) $ 306.16
  • daiDai (DAI) $ 1.00
  • bittensorBittensor (TAO) $ 394.12
  • ethereum-classicEthereum Classic (ETC) $ 23.33
  • mantleMantle (MNT) $ 1.03
  • nearNEAR Protocol (NEAR) $ 2.74
  • ondo-financeOndo (ONDO) $ 1.03
  • aptosAptos (APT) $ 4.71
  • pi-networkPi Network (PI) $ 0.403020
  • internet-computerInternet Computer (ICP) $ 5.67
  • okbOKB (OKB) $ 46.43
  • jito-staked-solJito Staked SOL (JITOSOL) $ 223.51
  • binance-peg-wethBinance-Peg WETH (WETH) $ 4,257.25
  • pudgy-penguinsPudgy Penguins (PENGU) $ 0.039909
  • kaspaKaspa (KAS) $ 0.094261
  • arbitrumArbitrum (ARB) $ 0.465530
  • algorandAlgorand (ALGO) $ 0.267103
  • blackrock-usd-institutional-digital-liquidity-fundBlackRock USD Institutional Digital Liquidity Fund (BUIDL) $ 1.00
  • usd1-wlfiUSD1 (USD1) $ 1.00
  • polygon-ecosystem-tokenPOL (ex-MATIC) (POL) $ 0.242588
  • vechainVeChain (VET) $ 0.025266
  • cosmosCosmos Hub (ATOM) $ 4.69
  • bonkBonk (BONK) $ 0.000028
  • render-tokenRender (RENDER) $ 3.97
  • story-2Story (IP) $ 6.83
  • worldcoin-wldWorldcoin (WLD) $ 1.09
  • gatechain-tokenGate (GT) $ 16.81
  • rocket-pool-ethRocket Pool ETH (RETH) $ 4,839.54
  • fasttokenFasttoken (FTN) $ 4.57
  • susdssUSDS (SUSDS) $ 1.06
  • kelp-dao-restaked-ethKelp DAO Restaked ETH (RSETH) $ 4,466.08
  • binance-staked-solBinance Staked SOL (BNSOL) $ 195.27
  • sei-networkSei (SEI) $ 0.325370
  • fetch-aiArtificial Superintelligence Alliance (FET) $ 0.717366
  • official-trumpOfficial Trump (TRUMP) $ 9.31
  • skySky (SKY) $ 0.087166
  • spx6900SPX6900 (SPX) $ 1.95
  • jupiter-perpetuals-liquidity-provider-tokenJupiter Perpetuals Liquidity Provider Token (JLP) $ 5.16
  • filecoinFilecoin (FIL) $ 2.63
  • jupiter-exchange-solanaJupiter (JUP) $ 0.533810
  • flare-networksFlare (FLR) $ 0.022785
  • lombard-staked-btcLombard Staked BTC (LBTC) $ 118,738.00
  • stakewise-v3-osethStakeWise Staked ETH (OSETH) $ 4,479.76
  • mantle-staked-etherMantle Staked Ether (METH) $ 4,535.54
  • liquid-staked-ethereumLiquid Staked ETH (LSETH) $ 4,561.44
  • kucoin-sharesKuCoin (KCS) $ 11.87
  • usdtbUSDtb (USDTB) $ 0.999808
  • xdce-crowd-saleXDC Network (XDC) $ 0.088954
  • hash-2Provenance Blockchain (HASH) $ 0.031401
  • injective-protocolInjective (INJ) $ 14.40
  • optimismOptimism (OP) $ 0.784630
  • usdt0USDT0 (USDT0) $ 0.999701
  • nexoNEXO (NEXO) $ 1.36
  • blockstackStacks (STX) $ 0.757519
  • curve-dao-tokenCurve DAO (CRV) $ 0.976919
  • celestiaCelestia (TIA) $ 1.83
  • first-digital-usdFirst Digital USD (FDUSD) $ 1.00
  • renzo-restaked-ethRenzo Restaked ETH (EZETH) $ 4,489.14
  • lido-daoLido DAO (LDO) $ 1.43
  • falcon-financeFalcon USD (USDF) $ 0.999899
  • tether-goldTether Gold (XAUT) $ 3,390.42
  • polygon-bridged-usdt-polygonPolygon Bridged USDT (Polygon) (USDT) $ 0.999910
  • solv-btcSolv Protocol BTC (SOLVBTC) $ 117,917.00
  • kinetic-staked-hypeKinetiq Staked HYPE (KHYPE) $ 45.41
  • flokiFLOKI (FLOKI) $ 0.000119
  • immutable-xImmutable (IMX) $ 0.600485
  • pump-funPump.fun (PUMP) $ 0.003114
  • jupiter-staked-solJupiter Staked SOL (JUPSOL) $ 206.74
  • fartcoinFartcoin (FARTCOIN) $ 1.10
  • wbnbWrapped BNB (WBNB) $ 803.27
  • aerodrome-financeAerodrome Finance (AERO) $ 1.23
  • conflux-tokenConflux (CFX) $ 0.208756
  • the-graphThe Graph (GRT) $ 0.099554
  • paypal-usdPayPal USD (PYUSD) $ 0.999485
  • saros-financeSaros (SAROS) $ 0.389995
  • dogwifcoindogwifhat (WIF) $ 1.02
  • sonic-3Sonic (S) $ 0.313097
  • binance-bridged-usdc-bnb-smart-chainBinance Bridged USDC (BNB Smart Chain) (USDC) $ 1.00
  • ethereum-name-serviceEthereum Name Service (ENS) $ 29.57
  • pancakeswap-tokenPancakeSwap (CAKE) $ 2.82
  • arbitrum-bridged-wbtc-arbitrum-oneArbitrum Bridged WBTC (Arbitrum One) (WBTC) $ 118,558.00
  • pax-goldPAX Gold (PAXG) $ 3,390.38
  • virtual-protocolVirtuals Protocol (VIRTUAL) $ 1.47
  • super-oethSuper OETH (SUPEROETH) $ 4,254.72
  • syrupusdcSyrupUSDC (SYRUPUSDC) $ 1.12
  • tezosTezos (XTZ) $ 0.884493
  • clbtcclBTC (CLBTC) $ 119,804.00
  • pendlePendle (PENDLE) $ 5.49
  • raydiumRaydium (RAY) $ 3.37
  • kaiaKaia (KAIA) $ 0.150259
  • theta-tokenTheta Network (THETA) $ 0.879557
  • cgeth-hashkey-cloudcgETH Hashkey Cloud (CGETH.HASH) $ 4,371.36
  • vaultaVaulta (A) $ 0.539251
  • msolMarinade Staked SOL (MSOL) $ 240.34
  • iotaIOTA (IOTA) $ 0.208904
  • galaGALA (GALA) $ 0.017933
  • jasmycoinJasmyCoin (JASMY) $ 0.016535
  • ether-fi-staked-ethether.fi Staked ETH (EETH) $ 4,246.05
  • pyth-networkPyth Network (PYTH) $ 0.129138
  • l2-standard-bridged-weth-baseL2 Standard Bridged WETH (Base) (WETH) $ 4,256.32
  • memecoreMemeCore (M) $ 0.440084
  • the-sandboxThe Sandbox (SAND) $ 0.296877
  • mantle-restaked-ethMantle Restaked ETH (CMETH) $ 4,531.87
  • ousgOUSG (OUSG) $ 112.12
  • jito-governance-tokenJito (JTO) $ 1.92
  • morphoMorpho (MORPHO) $ 2.14
  • tbtctBTC (TBTC) $ 118,659.00
  • bittorrentBitTorrent (BTT) $ 0.00000069
  • usdx-money-usdxStables Labs USDX (USDX) $ 0.998335
  • ondo-us-dollar-yieldOndo US Dollar Yield (USDY) $ 1.07
  • stader-ethxStader ETHx (ETHX) $ 4,530.53
  • ripple-usdRipple USD (RLUSD) $ 0.999851
  • build-onBUILDon (B) $ 0.637582
  • zcashZcash (ZEC) $ 39.42
  • flowFlow (FLOW) $ 0.390867
  • keetaKeeta (KTA) $ 1.52
  • arbitrum-bridged-weth-arbitrum-oneArbitrum Bridged WETH (Arbitrum One) (WETH) $ 4,257.06
  • coinbase-wrapped-staked-ethCoinbase Wrapped Staked ETH (CBETH) $ 4,691.00
  • binance-peg-dogecoinBinance-Peg Dogecoin (DOGE) $ 0.235380
  • based-brettBrett (BRETT) $ 0.060975
  • vision-3Vision (VSN) $ 0.200768
  • mog-coinMog Coin (MOG) $ 0.000002
  • decentralandDecentraland (MANA) $ 0.310090
  • walrus-2Walrus (WAL) $ 0.418967
  • newton-projectAB (AB) $ 0.008187
  • bitcoin-avalanche-bridged-btc-bAvalanche Bridged BTC (Avalanche) (BTC.B) $ 118,598.00
  • usual-usdUsual USD (USD0) $ 0.997550
  • telcoinTelcoin (TEL) $ 0.006158
  • heliumHelium (HNT) $ 3.07
  • syrupMaple Finance (SYRUP) $ 0.509558
  • bitcoin-svBitcoin SV (BSV) $ 28.68
  • swethSwell Ethereum (SWETH) $ 4,611.98
  • solv-protocol-solvbtc-bbnSolv Protocol Staked BTC (XSOLVBTC) $ 116,248.00
  • reserve-rights-tokenReserve Rights (RSR) $ 0.009215
  • coredaoorgCore (CORE) $ 0.523999
  • starknetStarknet (STRK) $ 0.137247
  • arweaveArweave (AR) $ 7.94
  • ether-fiEther.fi (ETHFI) $ 1.23
  • compound-governance-tokenCompound (COMP) $ 54.59
  • beldexBeldex (BDX) $ 0.071578
  • apecoinApeCoin (APE) $ 0.636316
  • dydx-chaindYdX (DYDX) $ 0.656383
  • usddUSDD (USDD) $ 0.999782
  • frax-etherFrax Ether (FRXETH) $ 4,236.34
  • thorchainTHORChain (RUNE) $ 1.42
  • chain-2Onyxcoin (XCN) $ 0.014360
  • true-usdTrueUSD (TUSD) $ 0.998572
  • polygon-pos-bridged-weth-polygon-posPolygon PoS Bridged WETH (Polygon POS) (WETH) $ 4,254.95
  • superfarmSuperVerse (SUPER) $ 0.795605
  • rekt-4Rekt (REKT) $ 0.000001
  • aioz-networkAIOZ Network (AIOZ) $ 0.397612
  • apenftAPENFT (NFT) $ 0.00000047
  • instadappFluid (FLUID) $ 6.98
  • neoNEO (NEO) $ 6.56
  • elrond-erd-2MultiversX (EGLD) $ 16.06
  • eigenlayerEigenCloud (prev. EigenLayer) (EIGEN) $ 1.41
  • dexeDeXe (DEXE) $ 7.88
  • zebec-networkZebec Network (ZBCN) $ 0.005213
  • savings-daiSavings Dai (SDAI) $ 1.16
  • beam-2Beam (BEAM) $ 0.008801

The rise of real-world cyber threats: When digital becomes physical | Opinion

0 2

The rise of real-world cyber threats: When digital becomes physical | Opinion

Disclosure: The views and opinions expressed here belong solely to the author and do not represent the views and opinions of crypto.news’ editorial.

The recent surge in cryptocurrency kidnappings in France has exposed a chilling trend: digital threats are no longer confined to cyberspace. Criminals are now leveraging online information to observe this shift, with several abduction attempts reported across the sector this year alone. This merging of cyber and real-world security challenges demands a fundamental change in how we think about security.

Summary

  • Digital exposure creates physical risk. Every day, sharing on social media, fitness apps, or professional platforms can unintentionally give attackers the insights they need to target individuals in the digital asset space.
  • Threats are becoming hybrid and personal. Attacks now often blend cyber tactics like phishing and malware with real-world reconnaissance and intimidation, as seen in cases involving deepfakes, fake recruiters, and wallet-targeting exploits.
  • AI is a double-edged sword. While it helps automate threat detection and incident response, it also enables more convincing impersonation and manipulation, making social engineering harder to spot.
  • Security must be integrated and proactive. Separating physical and cyber threats is no longer viable. Individuals and organisations must coordinate defences, limit information exposure, and foster a culture of skepticism and vigilance.

Digital exposure: The gateway to physical risk

The digital footprints we leave behind in our daily lives, whether through social media, wearable devices, or fitness apps, can inadvertently create significant vulnerabilities. For professionals in the digital asset space, the risks are especially pronounced. Publicly sharing information such as travel plans, attendance at industry events, or even regular exercise routes can provide malicious actors with valuable insights into personal routines and locations.

You might also like: Evolving threats in cryptocurrency: The outdated wallet dilemma | Opinion

A recent case involved a convincing fake job offer on LinkedIn targeting a staff member. The attacker claimed to be a recruiter from a reputable exchange, complete with a plausible profile, mutual connections, and authentic-looking content. After requesting a CV, the attacker followed up with a timed “assessment,” which then led to a video task requiring the victim to install updated drivers, an obvious malware delivery mechanism in hindsight. This technique mimics a known campaign linked to the DPRK-aligned threat group Lazarus Group (APT38) under what is commonly known as Operation Dream Job.

This is just one example from a growing list. We’ve also seen cases of deepfake video calls where attackers impersonate executives to authorise wire transfers, or phishing attempts that trick users into installing fake browser extensions designed to hijack wallets. In the ByBit/Safe attack earlier this year, attackers injected malicious code into the WalletConnect integration. The compromise led to the theft of over $3 million — showcasing how technical compromise often begins with human manipulation.

It is a stark reminder that what we share online, even unintentionally, can have very real-world consequences. Oversharing (even unintentionally) can open the door to stalking, intimidation, or even abduction attempts. For those working in or around digital assets, maintaining a low profile online and being mindful of the information shared publicly is now a critical aspect of personal and organisational security.

The changing nature of threats

The threat landscape facing the digital asset industry is both complex and fast-changing. Traditional cyber threats, such as phishing, deep fakes, and social engineering, are now being combined with physical tactics. Notable examples across the industry include:

  • Sophisticated phishing campaigns: Attackers use deep fake technology or impersonate trusted contacts to trick individuals into granting access or revealing sensitive information.
  • Physical reconnaissance: Criminals monitor social media and fitness apps to map out routines and identify vulnerable moments.
  • Direct intimidation: There have been multiple high-profile abduction attempts targeting industry leaders, with criminals seeking access to digital wallets and private keys.

The rise in these hybrid attacks means that security can no longer be viewed in silos; the risks are interconnected and require a unified response and integrated security practices.

AI, machine learning, and the evolving security landscape

The rapid advancement of artificial intelligence and machine learning further complicates this new reality. These technologies are fundamentally transforming both the nature of threats and the tools available to defend against them. On the one hand, AI and machine learning empower security teams to analyse vast amounts of data, automate routine checks, and respond to incidents more swiftly and effectively. On the other hand, these same technologies are being weaponised by attackers, enabling more convincing impersonations, sophisticated phishing attempts, and making social engineering harder to detect.

To address these challenges, organisations are implementing additional verification steps for sensitive actions, particularly when requests come via digital channels. It is also crucial to encourage employees to be sceptical of unexpected communications, even if they appear authentic. The dual-edged nature of AI and machine learning means that vigilance and adaptability must be at the heart of any modern security strategy.

Protecting yourself and your organization

In light of these evolving risks, it is essential for both individuals and organisations to adopt practical measures that address the increasingly blurred line between digital and physical security. Here are some practical steps.

For individuals:

  • Limit online sharing: Avoid posting real-time locations, travel plans, or daily routines on social media or fitness apps.
  • Review privacy settings: Regularly audit your online profiles and restrict access to personal information.
  • Be wary of unsolicited contact: Always verify the identity of anyone requesting sensitive information, especially via phone or video call.
  • Vary your routines: Don’t make it easy for someone to predict your movements.

For organizations:

  • Foster a culture of security: Regular training and awareness campaigns help staff recognise and resist social engineering.
  • Integrate cyber and physical security teams: Treat all threats as part of a single risk landscape, not as isolated issues.
  • Implement layered defences: Use a combination of technical, procedural, and physical controls to protect both digital and real-world assets.
  • Engage with industry peers: Share intelligence and best practices to stay ahead of emerging threats.

The need for integrated, proactive security

The threats facing the digital asset industry are evolving rapidly, and attackers are growing ever more creative in how they exploit both technology and human behaviour. As recent events have shown, even the most sophisticated defences can be undermined if we overlook the simple ways our digital lives intersect with the real world.

Looking ahead, it’s vital for organizations to foster a culture of vigilance and shared responsibility, whether that means thinking twice before sharing travel plans online or ensuring our teams are trained to spot the latest phishing tactics. There’s no silver bullet, but by combining robust technology, ongoing education, and open collaboration across the industry, we can raise the bar for everyone’s safety.

Ultimately, the challenge is not just technical; it’s personal. Security is about protecting people as much as assets. By staying alert, questioning what we share, and working together, we can help ensure that the highest standards of protection match innovation in digital finance.

Source

Leave A Reply

Your email address will not be published.

Verified by MonsterInsights