Crypto Hacks Halve, But a Bigger Financial Threat Emerges

Phucthinh

Crypto Hacks Halve, But a Bigger Financial Threat Emerges

The cryptocurrency landscape in 2025 witnessed a significant shift in security threats. While the frequency of hacks decreased, the severity of attacks skyrocketed, culminating in the staggering $1.46 billion theft from Bybit, a leading centralized exchange. This single event, attributed to sophisticated, state-sponsored actors, fundamentally altered the narrative surrounding crypto security, proving that the industry now faces systemic risks far exceeding previous concerns. The year underscored a critical evolution: attackers are prioritizing high-value targets and demonstrating increasingly advanced tactics.

ByBit suffers $1.5 billion Ethereum heist in cold wallet breach

The Declining Frequency, Escalating Cost of Crypto Hacks

Data from blockchain security firm SlowMist reveals a paradoxical trend. In 2025, approximately 200 security incidents occurred across the crypto ecosystem, roughly half the 410 recorded in 2024. However, total losses surged to approximately $2.935 billion, a substantial increase from the $2.013 billion reported the previous year. This stark contrast highlights a crucial point: the average loss per event more than doubled, rising from roughly $5 million to nearly $15 million. This indicates a deliberate shift by attackers away from low-value targets towards deep liquidity pools and high-value centralized platforms.

Key Statistic: The average loss per crypto security incident more than doubled from 2024 to 2025, reaching nearly $15 million.

The Rise of State-Sponsored Actors and Organized Crime

The escalating financial impact of crypto hacks is directly linked to the changing profile of the perpetrators. The “lone wolf” hacker is increasingly being replaced by organized crime syndicates and, most notably, nation-state actors, particularly groups linked to the Democratic People's Republic of Korea (DPRK). These actors have moved beyond opportunistic, single-point exploits, adopting organized, multi-stage operations targeting centralized services and relying on structured money laundering processes.

Sector Breakdown: Centralized Exchanges Under Siege

The shift in attacker focus is clearly reflected in the breakdown of losses by sector. While DeFi protocols still experienced a significant number of attacks – 126 incidents resulting in approximately $649 million in losses – centralized exchanges bore the brunt of the financial damage. Just 22 incidents involving centralized platforms accounted for roughly $1.809 billion in losses. This demonstrates the vulnerability of these centralized chokepoints and their attractiveness to sophisticated attackers.

Crypto Loss by Sector

The Industrialization of Cybercrime: MaaS and RaaS

Supporting these high-level operators is a thriving underground supply chain operating with the efficiency of a commercial software ecosystem. Models like Malware-as-a-Service (MaaS) and Ransomware-as-a-Service (RaaS) have lowered the barrier to entry, enabling less skilled criminals to access sophisticated infrastructure. This industrialization extends to the “drainer” market, with toolkits designed to empty wallets via phishing attacks becoming increasingly sophisticated.

While total drainer losses fell to about $83.85 million across 106,106 victims – an 83% decrease from 2024 – the tools themselves have become more advanced. Supply chain attacks also represent a growing threat, with malicious code inserted into software libraries, plugins, and development tools creating backdoors and compromising thousands of downstream users simultaneously. High-privilege browser extensions have become a favored vector for these attacks.

Crypto hacker falls victim to own scam losing $50 million to phishing attack

The Pivot to Social Engineering and AI-Powered Attacks

As protocol security improves, attackers are increasingly focusing on the human element. A private key leak, an intercepted signature, or a poisoned software update can be as devastating as a complex on-chain exploit. In 2025, there were 56 smart contract exploits and 50 account compromises, demonstrating the closing gap between technical risk and identity risk.

Criminals are now weaponizing artificial intelligence to breach these human defenses. The surge in synthetic text, voice, images, and video provides attackers with a cheap and scalable way to mimic customer support agents, project founders, recruiters, and journalists. Deepfake calls and voice clones render traditional verification methods obsolete, increasing the success rate of social engineering campaigns. Phishing campaigns have evolved into multi-stage operations, and Ponzi schemes are adopting the veneer of institutional finance.

Crypto Phishing Scams

Enforcement and the Regulatory Response

The scale of losses in 2025 prompted a decisive shift in regulatory behavior. Authorities moved from theoretical debates about jurisdiction to direct, on-chain intervention, expanding their focus beyond the entities themselves to the infrastructure facilitating crime, including malware networks, dark web markets, and laundering hubs.

Pressure was applied to the Huione Group, a conglomerate targeted for its role in facilitating laundering flows. Platforms like Garantex faced continued enforcement actions, signaling a willingness to dismantle the financial plumbing used by cybercriminals. Stablecoin issuers emerged as critical components of this enforcement strategy, freezing stolen capital. Tether froze USDT on 576 Ethereum addresses, while Circle froze USDC on 214 addresses throughout the year. Approximately $387 million of the $1.957 billion in stolen funds was frozen or recovered, representing a 13.2% recovery rate.

Frozen Tether's USDT Addresses

The Future Landscape: Security and Compliance as Thresholds

The contrast between the Bybit hack and the FTX collapse offers a crucial lesson. Bybit’s ability to absorb a $1.46 billion hit suggests that top-tier platforms have accumulated sufficient capital depth to treat massive security failures as survivable operational costs. However, this resilience comes with the caveat that the concentration of risk has never been higher. Attackers are now targeting centralized chokepoints, and state actors are dedicating immense resources to breaching them.

The era of “move fast and break things” is definitively over. Security and compliance are now thresholds for market access. Projects lacking strong key management, permission design, and credible AML frameworks will be cut off from banking partners and users. For investors and users, passive trust is a liability. Capital preservation requires active, continuous vigilance. 2025 proved that while the crypto industry has built stronger walls, the enemies outside the gate have brought bigger battering rams.

Keywords: Crypto Hacks, Security Threats, DeFi, Centralized Exchanges, State-Sponsored Actors, AI, Social Engineering, AML, Compliance

Mentioned in this article: Ethereum Bybit

Read more: