The crypto space is one of the most targeted environments for cybercrime in the world. The combination of irreversible transactions, pseudonymous addresses, and self-custody creates an environment where a successful attack can result in permanent, unrecoverable loss. There is no fraud department to call. No charge-back process. No insurance payout. Once funds leave your wallet to an attacker’s address, they are gone.
Basic security hygiene, strong passwords, two-factor authentication, and a reputable hardware wallet, is the baseline. This resource goes further. It covers the specific attack vectors that sophisticated actors use to target crypto holders, and the advanced measures that meaningfully reduce your exposure to each of them.
Before getting into specific defences, it helps to understand the categories of threat you’re defending against. Crypto attacks broadly fall into three categories: attacks on your devices, attacks on your accounts, and attacks on your behaviour.
Device attacks involve malicious software installed on your computer or phone that steals credentials, intercepts clipboard data, monitors keystrokes, or directly targets wallet files and private keys.
Account attacks target your exchange accounts, email accounts, and any other service that holds or provides access to your crypto assets, through credential theft, SIM swapping, phishing, and brute force methods.
Behavioural attacks exploit human psychology rather than technical vulnerabilities. Social engineering, phishing, impersonation, and fake investment opportunities fall into this category. These are covered in depth in our resource on how to avoid crypto scams. This resource focuses primarily on the technical attack vectors.
Malware targeting crypto holders is more sophisticated, more targeted, and more prevalent than most investors realise. Understanding the specific types that operate in this space is the first step to defending against them.
Clipboard hijacking malware sits silently on an infected device and monitors the clipboard for wallet addresses. When it detects that a wallet address has been copied, it replaces it with the attacker’s address before you paste it. The address looks similar in length and format, and without a careful character-by-character comparison, the substitution is invisible.
The defence is simple but must become an unbreakable habit: after pasting any wallet address, visually verify the first six and last six characters against the source. Always. No exceptions. As covered in our how to send and receive cryptocurrency safely resource, this single habit prevents one of the most common and effective attack vectors in crypto.
Keyloggers record every keystroke made on an infected device and transmit that data to an attacker. Passwords, seed phrases typed manually, exchange login credentials, and any other sensitive information entered via keyboard is captured and exfiltrated.
The primary defence against keyloggers is to never type your seed phrase on any internet-connected device, under any circumstances. Your seed phrase should only ever exist on paper or metal, entered physically into a hardware wallet during a recovery process. Using a password manager with autofill rather than typing passwords also significantly reduces keylogger exposure for account credentials.
A Remote Access Trojans (RATs) gives an attacker full remote control of an infected device. They can browse files, access wallet software, take screenshots, record the screen, and execute transactions. RATs are typically delivered through malicious email attachments, compromised software downloads, or infected USB drives.
The defence against RATs involves several layers: never downloading software from unverified sources, keeping operating systems and applications fully updated, using reputable antivirus and anti-malware software, and critically, keeping your primary crypto activity on a dedicated device that is used for nothing else.
Wallet drainer scripts are malicious smart contracts or browser scripts that are embedded in fake or compromised websites, fake NFT mints, phishing links, and fraudulent DeFi protocols. When you connect your wallet and sign a transaction, the script executes permissions that allow it to transfer assets out of your wallet without further approval.
The defences here are: never connecting your primary wallet to unfamiliar or unverified websites, using a separate burner wallet with minimal funds for interacting with new or unverified protocols, carefully reading every transaction approval request before signing, and using browser extensions like Pocket Universe or Revoke.cash to identify and revoke suspicious token approvals.
Your devices are the frontline of your crypto security. Treating them accordingly is non-negotiable for serious investors.
Dedicated Crypto Device: The single most effective device security measure is separating your crypto activity from your everyday computing. A dedicated device used exclusively for crypto, whether a laptop or desktop, that is never used for general browsing, email, social media, or software downloads, dramatically reduces the attack surface available to malicious actors.
This device should have a clean operating system installation, minimal software beyond what is required for crypto activity, full disk encryption enabled, and no connection to accounts or services used on your everyday devices. It doesn’t need to be expensive; a mid-range refurbished laptop configured correctly is sufficient.
Operating System and Software Updates: Unpatched vulnerabilities in operating systems and applications are one of the most common entry points for malware. Keeping your operating system, browser, and all installed software fully updated closes known vulnerabilities before attackers can exploit them. Enable automatic updates where possible and act on update notifications promptly.
Antivirus and Anti-Malware Software: Reputable antivirus software provides meaningful protection against known malware signatures and suspicious behaviour patterns. On Windows, Windows Defender provides a solid baseline. Supplementing with a dedicated anti-malware tool like Malwarebytes adds an additional detection layer. On macOS, the built-in security architecture provides strong baseline protection, though it is not immune to targeted attacks.
Run regular full system scans, particularly after any period of unusual device behaviour, unexpected slowdowns, or interactions with unknown files or links.
Browser Security: Your browser is one of the highest-risk surfaces for crypto attacks. Several measures significantly reduce browser-based risk:
Use a dedicated browser profile exclusively for crypto activity, separate from your everyday browsing. Install only essential, well-reviewed extensions and audit your installed extensions regularly. Malicious browser extensions that target crypto users are a documented and active threat vector. Disable extensions you don’t actively use. Use a reputable ad blocker, as malicious advertisements are a known delivery mechanism for crypto-targeting malware. And be acutely cautious about any website that asks you to connect your wallet.
Your exchange accounts and the email address associated with them are high-value targets. Compromising either provides a pathway to your funds.
Two-factor authentication is the single most important account security measure available. But not all 2FA is equal. SMS-based 2FA, where a code is sent to your phone via text message, is vulnerable to SIM swapping attacks and should be avoided for any account holding or providing access to crypto assets.
Use an authenticator app, such as Google Authenticator, Authy, or a hardware security key like a YubiKey, for all exchange and email accounts. These methods are not vulnerable to SIM swapping and provide meaningfully stronger protection than SMS codes.
SIM Swapping is an attack where a malicious actor convinces your mobile carrier to transfer your phone number to a SIM card they control. Once they have your number, they can receive SMS verification codes and reset passwords on accounts linked to that number.
To protect against SIM swapping: contact your mobile carrier and request a SIM lock or port freeze, which requires in-person verification before any number transfer can occur. Remove your phone number from all crypto exchange accounts where possible and replace SMS 2FA with an authenticator app. Use an email address dedicated exclusively to crypto accounts that is not linked to your phone number or publicly associated with your identity.
Email Security: Your email account is the recovery pathway for most online accounts. If an attacker controls your email, they can reset passwords and bypass 2FA on every account linked to it.
Use a dedicated email address for all crypto-related accounts. Enable the strongest available 2FA on that email account. Use a provider with strong security credentials. Never use this email address for anything other than crypto account registrations. Don’t share it publicly or link it to social media profiles.
Password Hygiene: Use a unique, randomly generated password for every account. A reputable password manager makes this practical without requiring you to memorise dozens of complex strings. Never reuse passwords across accounts. A compromised password on one platform should never provide access to another.
A hardware wallet is the gold standard for securing significant crypto holdings, but it is not immune to all attack vectors. Several advanced considerations apply to hardware wallet use.
Supply Chain Attacks: Always purchase hardware wallets directly from the manufacturer or an authorised reseller. Never buy from third-party marketplaces like eBay or Amazon listings from unknown sellers. A tampered device can be pre-configured to steal your seed phrase during setup. Verify the device’s authenticity using the manufacturer’s verification process before use. Our setup guides for Ledger, Trezor, Coldcard, SafePal, Bitbox, and Tangem each cover authenticity verification for the respective device.
Firmware Updates: Keep your hardware wallet’s firmware updated. Manufacturers regularly release updates that patch security vulnerabilities. Always update firmware directly through the official manufacturer application, never through a third-party tool or a link received via email or social media.
Physical Security: A hardware wallet in the wrong hands cannot be accessed without the PIN, and multiple incorrect PIN entries will typically wipe the device. However, physical possession of your device combined with knowledge of your PIN is a complete compromise. Store your hardware wallet securely when not in use, use a strong non-obvious PIN, and never enter your PIN where it can be observed.
Blind Signing: Blind signing refers to approving a transaction on your hardware wallet without being able to fully read what you’re signing on the device screen. This is a real risk when interacting with complex smart contracts through DeFi protocols. Where possible, use wallets and interfaces that display full transaction details on the device screen before signing. If you cannot read what you’re signing, treat it as a red flag and do not proceed.
The network you use to access crypto accounts and conduct transactions is an often-overlooked attack surface.
Avoid Public Wi-Fi: Never access exchange accounts, wallets, or conduct crypto transactions on public Wi-Fi networks. Public networks are trivially easy to monitor and are a known hunting ground for credential theft. If you must use a public connection, a reputable VPN adds a meaningful layer of encryption to your traffic.
Home Network Security: Secure your home router with a strong unique password and ensure its firmware is updated. Disable remote management features if not required. Consider creating a dedicated network segment or VLAN for your crypto activity, isolating it from other devices on your home network including smart home devices, which are frequently under-secured and represent a potential entry point.
For investors holding significant amounts, multi-signature wallets provide a security architecture that is fundamentally more resilient than single-key custody. Because a multi-signature wallet requires multiple independent approvals to authorise any transaction, compromising a single device or key is insufficient to drain the wallet. An attacker must compromise multiple independent keys simultaneously, which is an exponentially harder task.
Multi-signature wallets are covered in their own dedicated Cryptopedia resource for investors ready to implement this level of security architecture.
Knowing the signs of a compromised device or account allows you to act quickly before the damage becomes irreversible.
Signs of a compromised device include: unexplained slowdowns or unusual processor activity, unfamiliar applications or browser extensions appearing without your installation, unexpected outbound network traffic, and account login notifications you didn’t initiate.
Signs of a compromised account include: login notifications from unfamiliar locations or devices, unexpected password reset emails, and changes to account settings you didn’t make.
If you suspect compromise, act immediately: disconnect the device from the internet, transfer assets from any wallets that were accessed on that device to a fresh wallet generated on a clean device, change passwords and regenerate 2FA on all crypto-related accounts from a separate clean device, and contact your exchange’s security team if an exchange account is involved.
Speed is everything in a compromise scenario. The window between detecting a breach and an attacker moving funds can be very short.
Advanced crypto security is a layered discipline. No single measure makes you immune, but each layer you add meaningfully increases the cost and complexity of a successful attack. A dedicated device for crypto activity, strict clipboard verification habits, authenticator app 2FA across all accounts, a SIM lock with your carrier, hardware wallet purchases from official sources only, and a clean browser environment configured for crypto use collectively create a security posture that puts you well ahead of the majority of targets in this space.
The goal is not perfection. The goal is to make attacking you significantly harder than attacking someone else, because attackers follow the path of least resistance. Remove easy paths, and you remove most of the risk.
For investors who want a complete, personalised security framework built around their specific holdings and risk profile, our Black Emerald and Obsidian Tier Members receive direct specialist support covering every dimension of crypto security in detail. For everyday investors building strong security foundations from the ground up, our Runite Tier Membership provides the education and step-by-step guidance to do it right.
Find out more at shepleycapital.com/membership.
WRITTEN & REVIEWED BY Chris Shepley
UPDATED: MARCH 2026