

by GetBlock
🔐 Social Engineering in Web3: How Attackers Exploit You, Not Your Code
Most Web3 attacks don't break smart contracts. They break people.
This session is a hands-on deep dive into the human side of crypto security, the manipulation tactics that bypass technical defenses entirely. Whether you're a developer, trader, NFT collector, or just getting started in Web3, this talk is built for you.
What we'll cover:
We'll open with a simple but uncomfortable truth: the majority of on-chain losses don't come from code exploits. They come from users approving malicious actions, wallets drained after signing a "harmless" message, assets lost to a fake mint, funds gone after a support DM.
Then we break down the mechanics. Using a structured framework of attack mechanisms - from urgency and authority to information asymmetry and delayed consequences — we'll map exactly how these attacks work on a psychological level.
The core of the session is four interactive showcases, each based on real incidents:
🎨 Fake NFT mint: urgency, familiarity, and the BAYC Discord compromise✍️ Signature request scams: habit loops, control illusion, and Angel/Monkey Drainer⏳ Approval with delayed drain: default bias and the 2022 OpenSea phishing wave💬 Fake support messages: authority, identity spoofing, and Ledger phishing campaigns
For each scenario, you'll have a chance to identify the mechanisms at play before we reveal them - then we'll discuss real mitigation strategies you can apply immediately.
You'll leave with:
✅ A mental model for recognizing manipulation before you sign ✅ An understanding of how attacks chain multiple mechanisms together ✅ Practical tools and habits to protect yourself on-chain
Who this is for: Anyone active in Web3 - no prior security background needed. The goal is pattern recognition, not technical expertise.Speaker & Host
Speaker: Masha Vaverova - Smart Contract Security Researcher, FullStack Blockchain DeveloperHost: GetBlock - Web3 node infrastructure for building dApps across 130+ blockchains.
Sign in to view full event details
Create a free account to see descriptions, save events, and more
Social Engineering: How Users Get Exploited is a free independent taking place on Wednesday, April 29, 2026 at a venue to be announced. This independent is organised by GetBlock. Attendance is free — register to secure your spot. Currently 33 people have registered out of 33 spots. The event runs for approximately 1 hour.
Join this independent over 1 hour for an engaging session of learning, discussion, and networking with fellow attendees.
This independent is ideal for:
Social Engineering: How Users Get Exploited covers topics including Crypto, Consensus Miami 2026, #HKWeb3 Events Calendar. Find similar events by browsing these topics on Rifio.