GlobeNewswire

2026-02-03 22:00

CertiK Releases Skynet Wrench Attacks Report: “Wrench Attacks” Surged 75% in 2025; Physical Violence is a Major Threat to the Crypto Space

NEW YORK, Feb. 03, 2026 (GLOBE NEWSWIRE) -- CertiK, the world’s largest Web3 security services provider, released its Skynet Wrench Attacks Report, revealing a sharp rise in physical coercion attacks targeting digital asset holders. The report documents 72 verified wrench attacks globally in 2025, representing a 75% increase compared to 2024.

Wrench Attackers are Becoming More Sophisticated, Often Leveraging OSINT

In the context of digital asset security, “wrench attacks” refer to incidents in which attackers use physical violence, intimidation, or confinement to force victims to surrender private keys or passwords, enabling direct access to cryptocurrency holdings. According to the report, these attacks are becoming more sophisticated, with organized, transnational groups leveraging open-source intelligence (OSINT), social engineering techniques, and escalating levels of physical violence to identify and target victims.

Crypto-related Physical Assaults Increased by 250% YoY

The report states that kidnapping was the most common attack vector in 2025 in the context of wrench attacks, while physical assaults increased by 250% year-over-year. CertiK’s data further indicates that Europe was the most affected region, accounting for more than 40% of all reported incidents. France recorded the highest number of wrench attacks globally, surpassing even the United States.

What are the Consequences of Wrench Attacks?

Beyond financial impact, the report notes growing psychological and reputational consequences across the Web3 ecosystem. In response to rising physical threats, many founders, executives, and high-net-worth individuals are increasingly choosing to operate anonymously or relocate to mitigate personal risk.

Topics Covered in CertiK’s Report

The Skynet Wrench Attacks Report categorizes a wide range of physical coercion tactics, including armed robbery, blackmail, extortion, home invasion, kidnapping, murder, physical assault, ransom, and torture. The report also outlines key mitigation strategies, emphasizing the importance of separating personal identity from asset control, implementing advanced key-management solutions, and adopting layered security practices to reduce exposure to physical threats.

Full report link (EN): https://indd.adobe.com/view/6d3da0d7-c0a0-4b26-baf8-e2f2383c0d32


Media contact

Elisa Yiting Xu
yiting.xu@certik.com

Primary Logo

source: CertiK

人氣文章
財經新聞
評論
專題
專業版
HV2
精裝版
SV2
串流版
IQ 登入
強化版
TQ
強化版
MQ

大國博弈

關稅戰

貨幣攻略

說說心理話

理財秘笈

Wonder in Art

北上食買玩

香港周圍遊

山今養生智慧

輕鬆護老

照顧者 情緒健康