Crypto Wrench Attacks Surge 41% in 2026, Targeting Family Members

CryptoFrontier

Crypto security firm CertiK estimates that cryptocurrency holders have lost approximately $101 million from wrench attacks in the first four months of 2026, according to the firm’s analysis. If the trend continues at this rate, that equates to hundreds of millions of dollars lost for the full year 2026.

Wrench attacks—a term used in cybersecurity for physical assaults and extortion attempts that overcome software security systems—have become an “established threat vector for cryptocurrency holders,” CertiK wrote. Experts identified 2025 as the most active year on record for crypto-related wrench attacks, with approximately 70 physical assaults reported, though many likely go unreported due to the nature of these crimes.

2026 Attack Surge and Geographic Concentration

CertiK reported 34 verified wrench attack incidents globally in the first months of 2026, representing a 41% increase from the same period in 2025. Extrapolated across the full year, this equates to an estimated 130 incidents and several hundred million in projected losses.

Geographically, 28 out of 34 attacks (82%) occurred in Europe. Meanwhile, reported threats in the U.S. during the first quarter fell to three, compared to nine in 2025, and in Asia declined to two from 25, according to CertiK.

France as Primary Target

France remains the focal point for wrench attacks, with 24 assaults recorded in 2025—an increase from 20 throughout the previous year, which already “dominated the country-by-country breakdown by a wide margin,” according to the source.

The French Ministry of the Interior met with crypto industry leaders in the country to discuss safety concerns following the high-profile kidnapping and torture of Ledger co-founder David Balland and his wife.

CertiK identified several factors influencing the rate of attacks in France: the presence of flagship industry companies like Ledger and Binance, a high number of data leaks targeting the country, and the “culture of flexing and voluntary doxxing that remains deeply embedded in the community.”

Attack Methodology and Perpetrator Profiles

CertiK documented an emerging pattern in wrench attack operations. Small teams of 3 to 5 people, often young, are frequently recruited via Telegram or Snapchat to operate as ground crews. Orchestrators, meanwhile, are often based abroad in locations such as Morocco, Dubai, and Eastern Europe.

A significant shift has emerged toward “data-driven targeting,” which minimizes the need for physical surveillance by purchasing victim information—including full names, home addresses, and financial profiles—from online brokers. “They purchase data lists, commission coordinators, and receive funds before laundering them,” CertiK noted.

Targeting Family Members and Access Techniques

Attackers are increasingly targeting “proxies,” with more than half of incidents this year involving a “member of the primary target’s family (spouse, child, elderly parent), either as a direct victim or as a pressure lever,” according to CertiK.

Despite the shift to online tools for victim profiling, on-the-ground access techniques remain largely unchanged from 2025. “Access techniques remain broadly the same as in 2025, with a strong persistence of the Doorbell Vector (delivery personnel, fake police officers, etc.) and the Honeypot (fictitious business meetings, fake OTC deals, etc.),” CertiK wrote.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Renegade V1 Arbitrum Deployment Attacked, Loses $209K; White Hat Hacker Returns $190K

According to Renegade's official statement on X, the protocol's legacy V1 Arbitrum deployment was attacked early this morning (May 11), resulting in losses of approximately $209,000. A white hat hacker has returned approximately $190,000, and the team confirmed all affected users will receive full c

GateNews16m ago

USDT0 Announces 3/3 Validation Mechanism and $6M Bug Bounty Program Following Kelp Incident

According to Foresight News, USDT0, Tether's asset interoperability protocol, announced security architecture details following the Kelp incident. The protocol employs a proprietary Decentralized Verifier Network (DVN) with message veto rights and requires three independent validators based on

GateNews1h ago

Microsoft Discovers macOS Phishing Campaign Targeting Exodus, Ledger, and Trezor Wallets Since Late 2025

According to Microsoft's security research team, since late 2025, attackers have been distributing fake macOS troubleshooting guides on platforms including Medium, Craft, and Squarespace to trick users into running malicious terminal commands. The commands download and execute malware designed to st

GateNews1h ago

LayerZero Issues Public Apology for Kelp DAO Exploit Response, Admits DVN Single-Verifier Fault

According to LayerZero, the protocol issued a public apology on Friday for its handling of the April 18 exploit that drained $292 million in rsETH from Kelp DAO's cross-chain bridge, marking a significant tonal shift from its earlier post-mortem. LayerZero acknowledged that its Decentralized

GateNews1h ago

LayerZero Issues Public Apology for Kelp DAO Exploit, Admits Single-Verifier Setup Was Mistake

According to LayerZero's official blog post on Friday, the protocol issued a public apology for its handling of the April 18 exploit that drained $292 million in rsETH from Kelp DAO's cross-chain bridge. LayerZero admitted it made a mistake by allowing its Decentralized Verifier Network to serve

GateNews7h ago

LayerZero Issues Public Apology on May 8, Admits Fault in Single-Verifier Setup for Kelp DAO Exploit

According to The Block, LayerZero issued a public apology on Friday for its handling of the April 18 exploit that drained roughly $292 million in rsETH from Kelp DAO's cross-chain bridge. The protocol acknowledged it made a mistake by allowing its Decentralized Verifier Network (DVN) to serve as the

GateNews14h ago
Comment
0/400
No comments