Logo

Crypto Theft Surges in 2025 as Criminals Target Digital Wallets and Families

Cryptocurrency crime is escalating sharply in 2025, propelled by record-setting hacks and violent assaults targeting individual holders. With $2.17 billion stolen from platforms so far and physical kidnappings increasing, experts warn the evolving tactics signal a new frontier in crypto risk that blends digital vulnerabilities with real-world danger.

Crypto Theft Surges in 2025 as Criminals Target Digital Wallets and Families

Crypto Crime on the Rise: A New Wave of Heists and Physical Attacks

In the rapidly evolving landscape of digital currencies, a troubling trend is emerging: cryptocurrency theft is surging to alarming new heights. According to the latest report from blockchain intelligence firm Chainalysis, criminals have stolen more than $2.17 billion from crypto services in just the first half of 2025 — already surpassing last year's total of $1.87 billion. Industry experts anticipate this figure could double to nearly $4 billion by year-end.

Record-Breaking Hack and Escalating Physical Threats

The increase in stolen assets is partly fueled by an unprecedented hack linked to North Korean cybercriminals, who allegedly absconded with an estimated $1.5 billion from a single crypto platform — marking one of the largest digital heists in history. But the threat landscape is more complex and worrying than cyberattacks alone.

While digital platforms remain prime targets, a growing number of thefts are now happening through brazen physical assaults. Chainalysis data indicates that thefts involving personal crypto wallets now represent over 23% of total crypto thefts, underscoring an alarming shift toward offline coercion and violence.

The Human Toll Behind Crypto Crime

These aren’t abstract figures — they are stories of trauma. In January, David Balland, co-founder of crypto wallet provider Ledger, and his wife were kidnapped from their home in central France. His captors severed one of Balland’s fingers and sent the gruesome footage to a co-founder, demanding ransom. Similarly, in May, the father of another crypto entrepreneur was kidnapped and brutalized, with assailants again resorting to finger amputation to pressure payment of millions in ransom.

These harrowing attacks highlight a darker side of the crypto boom: as digital fortunes grow, so do the stakes and vulnerabilities of those holding them.

Expert Insight: What’s Driving the Surge?

Eric Jardine, research lead for cybercrimes at Chainalysis, offers critical context: the rise in crypto theft is a byproduct of more users and increased value within the crypto ecosystem. "More adoption means more targets," Jardine explains, "and price appreciation means the value at risk is higher — turning crypto holders into lucrative marks for criminals."

Jardine further notes a strategic pivot by criminals: as firms enhance platform security measures, attackers shift focus towards individuals and their wallets. This tactic favors many smaller thefts over fewer massive hacks, reflecting a more insidious modus operandi that is harder to detect and prevent.

Social Media’s Role in Heightened Risk

The explosion of crypto wealth has also empowered a new class of influencers flaunting extravagant lifestyles online. While such displays can inspire community and growth, Jardine cautions they inadvertently increase risks. "Showy displays of wealth can draw malicious attention," he says, emphasizing that victims should never be blamed for being targeted.

Broader Implications for Crypto & Security Policy

This surge in crime raises pressing questions for regulators, platforms, and users alike:

  • How can security protocols be innovated to protect individual wallet holders from physical coercion?
  • What legal frameworks are needed to address the cross-border complexities of crypto-related kidnappings and extortion?
  • How might community education on personal security and privacy online evolve in response?

As cryptocurrencies integrate deeper into global finance, the interface between virtual wealth and real-world security becomes increasingly critical. Without adaptive policies and stronger preventive measures, the human cost of crypto crime could escalate alongside its financial toll.

Editor’s Note

The skyrocketing value of stolen cryptocurrency in 2025 is more than just a statistic — it reveals a shifting battleground where digital innovation meets physical danger. As hackers grow more sophisticated and violent, both platforms and individuals must recalibrate their defenses. Equally, policymakers and law enforcement agencies in the U.S. and worldwide must grapple with how to address these multifaceted threats effectively. For investors and everyday users, this means staying informed, cautious, and vigilant in an increasingly perilous crypto landscape.

Sam Altman’s World to Launch Iris-Scanning Orb Identity in UK from June 12
Sam Altman’s World to Launch Iris-Scanning Orb Identity in UK from June 12

World, the startup led by Sam Altman, is launching its iris-scanning Orb device in the UK beginning June 12. This biometric system creates a unique World ID to verify human users and prevent AI and bot fraud. Already popular in the US with over 13 million users, World’s tech is gaining traction with governments and enterprises focused on identity security amid rising AI threats.

Tech Giants Unite to Standardize Hacker Group Nicknames in Cybersecurity
Tech Giants Unite to Standardize Hacker Group Nicknames in Cybersecurity

Microsoft, CrowdStrike, Palo Alto Networks, and Alphabet have partnered to create a public glossary standardizing nicknames for state-sponsored hacker groups and cybercriminals. This initiative addresses confusion caused by overlapping and inconsistent names across the cybersecurity industry, aiming to enhance collective response efforts. Early successes suggest improved communication, but experts caution that transparency and collaboration remain vital.

Cartier Confirms Data Breach Exposes Customer Information in Cyberattack
Cartier Confirms Data Breach Exposes Customer Information in Cyberattack

Luxury jeweller Cartier recently confirmed a cyberattack that temporarily breached its systems, compromising limited customer details such as names, email addresses, and countries. No sensitive information like passwords or financial data were affected. The incident reflects a wider trend of cyberattacks targeting premium retail brands, prompting Cartier to strengthen its cybersecurity measures and coordinate with experts and authorities to safeguard customer information.

Major Internet Outage Disrupts North Korea’s Online Services
Major Internet Outage Disrupts North Korea’s Online Services

A significant internet outage disrupted North Korea's online connectivity on Saturday, affecting government websites, official news portals, and email services. Experts attribute the disruption to internal network failures since connections through China and Russia were simultaneously affected. North Korea maintains strict control over its internet, allowing only select officials global access, while the general public is limited to a domestic intranet. The country has previously experienced outages linked to cyberattacks, and it operates elite hacker groups accused of international cybercrimes, which it denies.

Chinese Hackers Exploit Phantom Crashes to Target US Officials' Smartphones
Chinese Hackers Exploit Phantom Crashes to Target US Officials' Smartphones

A sophisticated cyberattack involving phantom software crashes has targeted smartphones of US government officials, political figures, and journalists. Linked to Chinese state-affiliated hackers, this breach exposes vulnerabilities in mobile security, with experts warning of the risks posed by connected devices and the need for stronger safeguards against espionage.

Paraguay President's X Account Targeted in Bitcoin Scam Hack
Paraguay President's X Account Targeted in Bitcoin Scam Hack

Paraguay’s government confirmed suspicious activity on President Santiago Pena's X account, suspected to be a hack promoting a fake Bitcoin legal tender announcement and reserve fund. Authorities are investigating alongside X’s cybersecurity team, urging citizens to disregard any posts until the issue is resolved.

Iran Orders Citizens to Delete WhatsApp Over Israel Data Claims; App Responds
Iran Orders Citizens to Delete WhatsApp Over Israel Data Claims; App Responds

Iranian state media has called for the removal of WhatsApp, accusing the app of sharing user data with Israel—claims the company denies. WhatsApp stresses its strong end-to-end encryption and no user data tracking or sharing policy. Experts highlight ongoing concerns regarding metadata and data sovereignty amid Iran’s history of social media restrictions.

Can Foreign Governments Hack WhatsApp? Unpacking The Truth Behind The Claims
Can Foreign Governments Hack WhatsApp? Unpacking The Truth Behind The Claims

Iran recently accused WhatsApp of spying without any evidence, while WhatsApp denied these claims. With a user base of 3 billion, WhatsApp uses strong end-to-end encryption. However, Israeli-linked spyware like Pegasus has previously exploited WhatsApp vulnerabilities. These attacks often involve spearphishing, a targeted approach to install spyware. Users can protect themselves by staying cautious with emails, enabling two-factor authentication, and updating software regularly.

Sri Lanka Deports 85 Chinese Nationals Over Alleged Bank Cybercrime
Sri Lanka Deports 85 Chinese Nationals Over Alleged Bank Cybercrime

In a determined move against cybercriminal activity, Sri Lanka deported 85 Chinese nationals accused of orchestrating scams targeting banks. This operation is part of ongoing efforts to address a growing cybercrime problem that also involved 230 arrests last year. Challenges include local vulnerabilities and international cooperation in transferring evidence, underscoring Sri Lanka's commitment to securing its financial landscape.

Experts Warn of Rising Infostealer Malware After 16 Billion Credentials Exposed
Experts Warn of Rising Infostealer Malware After 16 Billion Credentials Exposed

Cybersecurity experts reveal a massive exposure of 16 billion login credentials across top platforms, driven by infostealer malware. This surge in stolen data fuels underground markets and complex cybercrime operations. As attacks grow 58% in 2024, stronger personal and organizational defenses are urgently needed.

Former Student Charged for Multi-Year Hacking at Western Sydney University
Former Student Charged for Multi-Year Hacking at Western Sydney University

Birdie Kingston, 27, allegedly hacked Western Sydney University systems from 2021 onward, starting with unauthorized access for discounted parking. Her offenses escalated to altering grades and threatening to sell sensitive information on the dark web for $40,000. Following a police raid and data seizure in 2025, she was charged with 20 offenses. The university has since enhanced cybersecurity measures to protect its community.

US Ambassador’s Courtroom Visit Signals Strong Support for Netanyahu Amid Corruption Trial
US Ambassador’s Courtroom Visit Signals Strong Support for Netanyahu Amid Corruption Trial

In an unusual diplomatic move, US Ambassador Mike Huckabee attended Israeli Prime Minister Benjamin Netanyahu’s corruption trial, signaling strong support from the Trump administration. The trial, unfolding amidst Israel's ongoing regional conflicts, has polarized the nation and drawn rare public intervention from President Trump. This event highlights complex intersections of politics, law, and international diplomacy.

US Strike on Iran Nuclear Sites: Limited Damage Despite Bold Claims
US Strike on Iran Nuclear Sites: Limited Damage Despite Bold Claims

A recent report reveals that the US Operation Midnight Hammer in June 2025, which targeted Iran's nuclear facilities, significantly damaged only the Fordow site while Natanz and Isfahan remained largely unaffected. Despite Trump's public claims of total obliteration, internal assessments suggest a more limited impact, reshaping the narrative around US military efficacy and strategic decision-making in the region.