Subscribe to Our Newsletter

Success! Now Check Your Email

To complete Subscribe, click the confirmation link in your inbox. If it doesn’t arrive within 3 minutes, check your spam folder.

Ok, Thanks
Feature image
CBIA thanks Crypto Crow for the photo

Crypto hacks dropped by half in 2025, but the data reveals a much deadlier financial threat

CBIA Team profile image
by CBIA Team

The cryptocurrency industry experienced a paradoxical shift in security threats during 2025. While the frequency of attacks plummeted by nearly 50% compared to the previous year, the financial devastation reached unprecedented levels. Data from blockchain security firm SlowMist reveals that approximately 200 security incidents resulted in $2.935 billion in losses—a dramatic increase from $2.013 billion in 2024 despite fewer attacks. The average loss per incident more than doubled from roughly $5 million to nearly $15 million, indicating a fundamental transformation in cybercriminal strategies.

The defining security event of the year was not a sophisticated DeFi exploit but rather the $1.46 billion theft from Bybit, a top-tier centralized exchange. This single incident, attributed to sophisticated state-sponsored actors, rewrote the industry's threat narrative and demonstrated that while attackers have abandoned low-value targets, they now focus on deep liquidity pools and high-value centralized infrastructure.

Background and Context

The cryptocurrency security landscape has evolved dramatically from its early days of opportunistic attacks. What began as largely individual hacking attempts has transformed into an industrialized, professionalized ecosystem of cybercrime. The data from 2025 shows attackers have systematically abandoned the spray-and-pray approach of previous years, instead focusing resources on centralized exchanges and other high-value targets where successful breaches yield exponentially greater returns.

This shift reflects broader trends in cybercrime, where organized crime syndicates and nation-state actors have displaced lone wolf hackers. The security industry has observed how these sophisticated operators treat Web3 as a reliable, repeatable revenue stream rather than a speculative playground. Their methods have become increasingly complex, involving multi-stage operations that can simultaneously target multiple weak points across the cryptocurrency ecosystem.

Key Figures and Entities

The escalation in attack sophistication correlates directly with the emergence of state-sponsored cybercriminal operations. Groups linked to the Democratic People's Republic of Korea (DPRK) have become particularly prominent, accounting for a disproportionate share of high-value thefts. These actors have demonstrated capabilities far beyond typical criminal enterprises, combining advanced technical expertise with substantial resources and strategic patience.

The breakdown of losses by sector reveals the strategic precision of these attacks. While DeFi protocols absorbed the highest volume of incidents—126 attacks resulting in approximately $649 million in losses—centralized exchanges suffered disproportionately larger financial damage. Just 22 incidents involving centralized platforms accounted for roughly $1.809 billion in losses, with the Bybit hack alone representing nearly half of this total.

Supporting these high-level operators is an underground supply chain that functions with the efficiency of a commercial software ecosystem. The Malware-as-a-Service (MaaS) and Ransomware-as-a-Service (RaaS) models have dramatically lowered barriers to entry, enabling less technically sophisticated criminals to rent advanced attack infrastructure. This industrialization has extended to the "drainer" market—toolkits designed to empty wallets through phishing—which saw losses of $83.85 million across 106,106 victims, representing an 83% drop in value from 2024 despite increased tool sophistication.

The technical sophistication of modern attacks has been matched by increasingly complex laundering mechanisms. State-sponsored groups have developed structured, multi-stage processes designed to obscure the origins of stolen funds and integrate them into the legitimate financial system. Supply chain attacks have emerged as a particularly dangerous vector, with malicious code inserted into software libraries, plugins, and development tools, creating backdoors upstream from final applications.

High-privilege browser extensions have become favored targets for compromise. Once infected, these tools convert user machines into silent collection points for seeds and private keys, enabling attackers to harvest credentials on an industrial scale. The technical precision of these attacks reflects a professionalization of cybercrime that rivals legitimate software development practices.

As protocol security has tightened, attackers have increasingly focused on the human element. In 2025, there were 56 smart contract exploits and 50 account compromises—a narrowing gap that demonstrates how technical vulnerabilities have become matched by identity-based attacks. Private key leaks, intercepted signatures, and poisoned software updates now pose threats equivalent to complex on-chain arbitrage exploits.

The weaponization of artificial intelligence has accelerated this human-targeting approach. Synthetic text, voice, images, and video provided attackers with cheap, scalable ways to impersonate customer support agents, project founders, recruiters, and journalists. Deepfake calls and voice clones rendered traditional verification methods obsolete, dramatically increasing the success rate of social engineering campaigns.

International Implications and Policy Response

The scale of 2025's losses forced a decisive shift in regulatory behavior, with authorities moving from theoretical jurisdictional debates to direct on-chain intervention. Regulatory focus expanded beyond targeted entities to encompass the broader infrastructure facilitating crime—including malware networks, dark web markets, and laundering hubs.

The pressure applied to the Huione Group, a conglomerate investigated for its role in facilitating money laundering flows, exemplifies this broadened regulatory scope. Similarly, continued enforcement actions against platforms like Garantex signal that regulators are prepared to dismantle the financial plumbing used by cybercriminals, regardless of jurisdictional complexities.

Stablecoin issuers have emerged as critical components of enforcement strategies, effectively acting as deputies in efforts to freeze stolen capital. Tether froze USDT on 576 Ethereum addresses, while Circle froze USDC on 214 addresses throughout 2025. These actions yielded tangible results—across 18 major incidents, approximately $387 million of the $1.957 billion in stolen funds was frozen or recovered, representing a recovery rate of 13.2%. While modest, this capability marks a significant shift: the industry can now pause or reverse portions of criminal flows when compliant intermediaries exist within transaction paths.

Regulatory expectations have hardened accordingly. Robust Anti-Money Laundering (AML) and Know Your Customer (KYC) frameworks, tax transparency, and custody controls have transformed from competitive advantages to baseline survival requirements. Infrastructure providers, wallet developers, and bridge operators now find themselves within the same regulatory blast radius as exchanges, reflecting a comprehensive approach to crypto security.

The divergence between the Bybit hack and the FTX collapse offers the year's most critical lesson. In 2022, the loss of customer funds exposed a hollow balance sheet and fraud, leading to immediate insolvency. In 2025, Bybit's ability to absorb a $1.46 billion hit suggests that top-tier platforms have accumulated sufficient capital depth to treat massive security failures as survivable operational costs rather than existential threats.

However, this resilience comes with significant caveats. Risk concentration has never been higher, with attackers focusing on centralized chokepoints and state actors dedicating immense resources to breaching them. For builders and businesses, the era of "move fast and break things" has definitively ended. Security and compliance are now thresholds for market access, and projects unable to demonstrate strong key management, permission design, and credible AML frameworks will find themselves cut off from banking partners and users alike.

Sources

This report draws on data and analysis from blockchain security firm SlowMist regarding cryptocurrency security incidents in 2025, including detailed breakdowns of attack vectors, financial losses, and emerging threat patterns. Information regarding regulatory enforcement actions against entities such as Huione Group and Garantex comes from official regulatory statements and public court documents. Data on stablecoin freezing actions by Tether and Circle was obtained from public blockchain records and company transparency reports.

CBIA Team profile image
by CBIA Team

Subscribe to New Posts

Lorem ultrices malesuada sapien amet pulvinar quis. Feugiat etiam ullamcorper pharetra vitae nibh enim vel.

Success! Now Check Your Email

To complete Subscribe, click the confirmation link in your inbox. If it doesn’t arrive within 3 minutes, check your spam folder.

Ok, Thanks

Read More