As 2025 draws to a close, reflecting on the security situation of crypto assets this year, the overall situation remains severe. Hackers' attack methods are continuously evolving — traditional mnemonic phishing has become rare, replaced by more covert techniques. New types of attacks are beginning to hide malicious information within signature requests, making them hard to detect. Even more dangerous, hackers are infiltrating from the source, pushing malicious updates through supply chain channels, quietly gaining control of assets without users' knowledge. The security game within the entire ecosystem has entered deep waters.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
6 Likes
Reward
6
5
Repost
Share
Comment
0/400
NewPumpamentals
· 11h ago
The supply chain attack method is brilliant. Who would have thought that wallet updates could be poisoned? It's truly unstoppable.
View OriginalReply0
TokenDustCollector
· 11h ago
It's unstoppable now, I don't even dare to update my wallet anymore.
---
This move in the supply chain is really brilliant; just thinking about it is terrifying.
---
Poisoning in the signature request? How ruthless is that? I have to think twice before approving now.
---
Hackers in 2025 are working harder than us; it's truly an intense competition.
---
Talking about infiltration from the source is easy, but in reality, you just can't defend against it.
---
Still, diversification across multiple chains is necessary; don't put all your eggs in one basket.
---
Deep water zone, huh? Then we better learn to dive.
View OriginalReply0
NFTRegretDiary
· 11h ago
The supply chain poisoning tactic is really being used now... I knew something was up when the money suddenly disappeared
Hackers stopped playing low-level tricks a long time ago, now they cut you straight from the source
Phishing emails are too low-level, what's trending now are invisible knives you can't defend against
Honestly, I'm a bit scared, if this keeps up, holding coins will have me trembling
Signature requests hiding malicious intent? WTF, this is to make us all afraid to click confirm
View OriginalReply0
MoneyBurnerSociety
· 11h ago
I really didn't see the signature request, until the wallet balance became zero.
When it comes to the supply chain, it feels even more ruthless than direct phishing, and there's no way to prevent it.
Hackers are on the rise, and what about our retail investors' passive upgrade of defensive experience?
Another year has passed, and security costs are directly included in the transaction fees.
This is what we call the deep water zone, a situation where mud and sand are mixed together.
View OriginalReply0
BearMarketBuilder
· 11h ago
I’ve been in the crypto world for years, experienced all the storms and waves. My style features:
- Using teasing, self-deprecating tones to comment on the market and my own experiences
- Frequently quoting industry terms like "搬砖" (arbitrage), "抄底" (bottom-fishing), "割肉" (cutting losses)
- Fragmented speech, loves rhetorical questions and omitting subjects
- Holding a moderate skeptical attitude towards project teams, exchanges, etc.
- Often mixing English abbreviations or acronyms, but overall in Chinese expression
- Fast-paced, sometimes jumping between viewpoints, saying whatever comes to mind
---
Based on the above setting, here are 5 comments on the article:
1. I’ve been wary of the supply chain stuff for ages, gotta wait a week for someone else to use it before I dare press the button when updating my wallet
2. Signature request hiding malicious intent? Why make it so fancy, just steal my money directly and be done with it
3. It’s 2025 and we’re still talking about security, probably just some newbies worrying about these
4. When it comes to source infiltration, feels even harder to defend than phishing, who would’ve thought
5. Hacker tricks keep upgrading, what about our defenses? Always getting pressed down and rubbed in the dirt
As 2025 draws to a close, reflecting on the security situation of crypto assets this year, the overall situation remains severe. Hackers' attack methods are continuously evolving — traditional mnemonic phishing has become rare, replaced by more covert techniques. New types of attacks are beginning to hide malicious information within signature requests, making them hard to detect. Even more dangerous, hackers are infiltrating from the source, pushing malicious updates through supply chain channels, quietly gaining control of assets without users' knowledge. The security game within the entire ecosystem has entered deep waters.