Navigating the Storm: Lessons From 2025 Crypto Attacks 2025 was a turbulent year for crypto security. According to blockchain analytics firm Chainalysis, oNavigating the Storm: Lessons From 2025 Crypto Attacks 2025 was a turbulent year for crypto security. According to blockchain analytics firm Chainalysis, o

Navigating the Storm: Lessons From 2025 Crypto Attacks in

2026/01/24 19:30
7 min read

2025 was a turbulent year for crypto security. According to blockchain analytics firm Chainalysis, over $3.4 billion was stolen through hacks and thefts, and about $17 billion was stolen in crypto scams and fraud in 2025 (with at least $14 billion identified onchain so far). PeckShield reported ~$4.04 billion in combined losses in 2025, split between ~$2.67 billion (up ~24.2% YoY) from hacks and ~$1.37 billion from scams and phishing. CertiK reported $3.35 billion lost in 2025 across hacks, scams, and exploits (about +37% vs. 2024), while stressing the theme of fewer but larger attacks.

According to Chainalysis, total value stolen from centralized services hit $2.5 billion across fewer incidents in 2025: the top three hacks accounted for 69% of all service losses. The number of personal wallet compromises is rising and DeFi hack losses stayed comparatively muted even as TVL recovered. PeckShield reported that attackers shifted from DeFi to CEXs and large organizations, using supply-chain attacks and private-key compromises, driving these targets’ share of total losses to 75%, up 46% from 2024.

In this blog post, we focus on software-related attacks, excluding phishing and scam. We rely on major reports for metrics like total value stolen (TVS), incident counts, and year-over-year changes, and include hands-on technical examples from forensic investigations showing how vulnerabilities were exploited. One pattern stands out: While DeFi hack losses stayed comparatively muted even as TVL recovered, attackers shifted attention to personal wallets and centralized services.

Source: Peckshield

Supply Chain and Software Distribution Compromises

Certik called the Supply Chain (exploits of blockchain-based dependencies, CI/CD, and wallet integrations) “the most costly attack vector”, totaling $1.4 billion losses across 2 incidents.

Technical Details and Attack Examples

Centralized platforms breaches often blend social engineering with operational access. A common method involves “embedded IT worker” infiltration and related recruiter impersonation, which can yield privileged access to systems, source code, and signing workflows. Once inside, attackers exploit private key infrastructure by bypassing cold wallet controls — e.g., tricking multisig signers into approving malicious transactions via altered interfaces.

  • Bybit / Safe{Wallet} UI Compromise (February 2025): Bybit suffered the largest cryptocurrency theft ever. Attackers induced signer to sign a malicious transaction during what appeared to be a routine cold-to-hot transfer, stealing ~401,000 ETH (~$1.5 billion). Post-incident analyses revealed that attackers injected malicious JavaScript code into the Safe{Wallet} UI on a compromised developer machine, altering transaction displays to deceive signers into authorizing fund transfers. Chainalysis reported that an experienced group of hackers was behind the attack.
  • Trust Wallet Extension Exploit (December 2025): Trust Wallet posted about a malicious Chrome Web Store browser extension (v2.68) published outside its normal release process. The malware could access sensitive wallet data, transmit recovery phrases to phishing domains like metrics-trustwallet.com and trigger unauthorized transactions. Trust Wallet reported 2,520 affected wallet addresses, with ~$8.5M in impacted assets tied to 17 attacker-controlled addresses.
  • AI-generated npm Drainer (Jul 2025): Malware showed up as “developer tooling,” like the AI-generated npm package @kodane/patch-manager, reported to have 1,500+ downloads before takedown and designed to drain Solana wallets.
  • BigONE Exchange Back-End Logic Tampering (Jul 2025): BigONE reported abnormal movements of some platform’s assets. Halborn explained that the attackers exploited their access to alter BigONE’s backend account and risk-control logic to auto-approve withdrawals. A back-end logic tampering allowed them to submit unauthorized withdrawal requests to steal about $27 million in total across multiple chains.
  • SwissBorg / Kiln Endpoint Compromise (Sep 2025): Swissborg reported a third-party endpoint compromise, a malicious transaction path leading the loss of funds from SOL Earn. Blockchain investigator ZachXBT reported that Swissborg lost approximately $40 million worth of SOL.

Protocol Exploits

DeFi hacks declined relatively to 2024, with losses suppressed despite Total Value Locked (TVL) growth. Chainalysis attributes this to improved security and “target substitution” toward wallets and centralized services. CertiK reported DeFi total value stolen around $500–700 million across 344 incidents in 2025.

Technical Details and Attack Examples

Common DeFi smart contract flaws include: reentrancy (recursive calls draining funds), faulty input validation (34.6% of cases), oracle manipulation, access-control mistakes, and governance logic weaknesses. Flash loans, borrowing uncollateralized funds to manipulate markets, remain a frequent accelerator for attacks.

  • Cetus DEX Exploit (May 2025): Cetus, a leading DEX on the Sui blockchain, was exploited via a flaw in its math logic, allowing the attacker to drain liquidity across 46 liquidity pairs. Reported estimates put the stolen amount at ~$230 million.
  • Balancer v2 Pools Exploit (November 2025): About $128 million was drained from Balancer v2 Composable Stable Pools after attackers exploited the incorrect rounding behavior in the protocol. Using carefully crafted batchSwap sequences, the attackers manipulated pool balances and extracted value repeatedly across multiple chains. Some believe that the attack was vibe-coded.
Source: Slowmist
  • UPCX Malicious Smart Contract Upgrade (Apr 2025): The attackers, according to Halborn’s analysis, compromised private key of a privileged admin account, probably via social engineering or malware. They exploited this access to perform an unauthorized upgrade of the ProxyAdmin contract to steal 18.4 million UPC tokens (~$70 million) from multiple management accounts.
  • Shibarium Bridge Exploit (September 2025): Attackers combined a flash loan with compromised validator keys to steal $2.4 — 4.1 million in assets. They used the flash loan to acquire a large amount of BONE, then delegated it to gain over two-thirds of voting power and push a fake network update. With validator key access, they were able to sign the malicious update and execute unauthorized withdrawals from the bridge.

Key and Signing Infrastructure Compromises

Key and signing infrastructure compromises happen when attackers gain or abuse the ability to sign transactions, rather than exploiting smart contract code. These incidents look like attackers stealing keys, extracting signing shares, or subverting approval workflows so legitimate-looking signatures authorize malicious withdrawals across one or many chains.

Technical Details and Attack Examples

These attacks target hot wallets, signing servers, MPC/HSM systems, validator keys, or approval workflows, so malicious withdrawals look legitimate onchain. Once signing authority is compromised, funds can be moved quickly across multiple networks with little chance of reversal.

  • Wemix Auth Keys Compromise (detected Feb 2025, disclosed later): Halborn’s analysis reports that attackers allegedly stole authentication keys used to access a service monitoring system (NILE). The keys may have been exposed via a shared repository. The attacker then executed withdrawals of 8.6 million WEMIX tokens, with the incident resulting in over $6 million in losses per Halborn, and disclosure lagged by weeks.
  • ModStealer (reported in Sep 2025): MetaMask’s security report described ModStealer as cross-platform infostealer (Windows, Linux, macOS) that hunts for browser wallet extensions and credentials. Campaigns were distributed through fake job postings aimed at developers, trying to lure targets into running an installer. MetaMask warned that stolen private keys and seed phrases can provide direct access to funds.
  • Upbit Hot Wallet Breach (Nov 27, 2025): Upbit exchange disclosed abnormal withdrawals from a Solana-based hot wallet, revising loss estimate to KRW 44.5 billion (~$33 million). Halborn’s analysis supposed that the incident was potentially related to weaknesses in Upbit’s digital signature algorithm.
  • Phemex Hot Wallet Hack (Jan 2025): Phemex exchange disclosed that they detected unusual activity in their hot wallet. About $73 million were stolen across 16 blockchains. Halborn frames the likely root cause as compromised private keys. TheBlock reported that the hack was likely perpetrated by an experienced group of hackers.

Conclusion

2025 made one thing obvious: strong cryptography and audited contracts don’t stop losses when attackers compromise the software and workflows that sit around them. The biggest incidents weren’t “blockchain bugs” as much as failures in distribution and signing: tampered wallet interfaces, poisoned dependencies, back-end logic changes, and stolen credentials that turned invalid withdrawals into valid ones. DeFi exploits stayed comparatively muted even as TVL recovered, but centralized services and personal-wallet infrastructure became the easiest way to capture outsized value.

Going into 2026, the priority should be hardening the full signing path: We need better digital asset management tools, which are built on multi-factor authentication but without introducing centralization risks, as we notice that attacks target every bit of supply chain. We need to tighten operational controls, secret handling, and transaction verification, because attackers are increasingly targeting wallet infrastructure and signature flow.

Note: OKcontract is building Chainwall, a fully decentralized asset management suite for yield products.


Navigating the Storm: Lessons From 2025 Crypto Attacks in was originally published in Coinmonks on Medium, where people are continuing the conversation by highlighting and responding to this story.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Shocking OpenVPP Partnership Claim Draws Urgent Scrutiny

Shocking OpenVPP Partnership Claim Draws Urgent Scrutiny

The post Shocking OpenVPP Partnership Claim Draws Urgent Scrutiny appeared on BitcoinEthereumNews.com. The cryptocurrency world is buzzing with a recent controversy surrounding a bold OpenVPP partnership claim. This week, OpenVPP (OVPP) announced what it presented as a significant collaboration with the U.S. government in the innovative field of energy tokenization. However, this claim quickly drew the sharp eye of on-chain analyst ZachXBT, who highlighted a swift and official rebuttal that has sent ripples through the digital asset community. What Sparked the OpenVPP Partnership Claim Controversy? The core of the issue revolves around OpenVPP’s assertion of a U.S. government partnership. This kind of collaboration would typically be a monumental endorsement for any private cryptocurrency project, especially given the current regulatory climate. Such a partnership could signify a new era of mainstream adoption and legitimacy for energy tokenization initiatives. OpenVPP initially claimed cooperation with the U.S. government. This alleged partnership was said to be in the domain of energy tokenization. The announcement generated considerable interest and discussion online. ZachXBT, known for his diligent on-chain investigations, was quick to flag the development. He brought attention to the fact that U.S. Securities and Exchange Commission (SEC) Commissioner Hester Peirce had directly addressed the OpenVPP partnership claim. Her response, delivered within hours, was unequivocal and starkly contradicted OpenVPP’s narrative. How Did Regulatory Authorities Respond to the OpenVPP Partnership Claim? Commissioner Hester Peirce’s statement was a crucial turning point in this unfolding story. She clearly stated that the SEC, as an agency, does not engage in partnerships with private cryptocurrency projects. This response effectively dismantled the credibility of OpenVPP’s initial announcement regarding their supposed government collaboration. Peirce’s swift clarification underscores a fundamental principle of regulatory bodies: maintaining impartiality and avoiding endorsements of private entities. Her statement serves as a vital reminder to the crypto community about the official stance of government agencies concerning private ventures. Moreover, ZachXBT’s analysis…
Share
BitcoinEthereumNews2025/09/18 02:13
United States Building Permits Change dipped from previous -2.8% to -3.7% in August

United States Building Permits Change dipped from previous -2.8% to -3.7% in August

The post United States Building Permits Change dipped from previous -2.8% to -3.7% in August appeared on BitcoinEthereumNews.com. Information on these pages contains forward-looking statements that involve risks and uncertainties. Markets and instruments profiled on this page are for informational purposes only and should not in any way come across as a recommendation to buy or sell in these assets. You should do your own thorough research before making any investment decisions. FXStreet does not in any way guarantee that this information is free from mistakes, errors, or material misstatements. It also does not guarantee that this information is of a timely nature. Investing in Open Markets involves a great deal of risk, including the loss of all or a portion of your investment, as well as emotional distress. All risks, losses and costs associated with investing, including total loss of principal, are your responsibility. The views and opinions expressed in this article are those of the authors and do not necessarily reflect the official policy or position of FXStreet nor its advertisers. The author will not be held responsible for information that is found at the end of links posted on this page. If not otherwise explicitly mentioned in the body of the article, at the time of writing, the author has no position in any stock mentioned in this article and no business relationship with any company mentioned. The author has not received compensation for writing this article, other than from FXStreet. FXStreet and the author do not provide personalized recommendations. The author makes no representations as to the accuracy, completeness, or suitability of this information. FXStreet and the author will not be liable for any errors, omissions or any losses, injuries or damages arising from this information and its display or use. Errors and omissions excepted. The author and FXStreet are not registered investment advisors and nothing in this article is intended…
Share
BitcoinEthereumNews2025/09/18 02:20
CME Group to launch Solana and XRP futures options in October

CME Group to launch Solana and XRP futures options in October

The post CME Group to launch Solana and XRP futures options in October appeared on BitcoinEthereumNews.com. CME Group is preparing to launch options on SOL and XRP futures next month, giving traders new ways to manage exposure to the two assets.  The contracts are set to go live on October 13, pending regulatory approval, and will come in both standard and micro sizes with expiries offered daily, monthly and quarterly. The new listings mark a major step for CME, which first brought bitcoin futures to market in 2017 and added ether contracts in 2021. Solana and XRP futures have quickly gained traction since their debut earlier this year. CME says more than 540,000 Solana contracts (worth about $22.3 billion), and 370,000 XRP contracts (worth $16.2 billion), have already been traded. Both products hit record trading activity and open interest in August. Market makers including Cumberland and FalconX plan to support the new contracts, arguing that institutional investors want hedging tools beyond bitcoin and ether. CME’s move also highlights the growing demand for regulated ways to access a broader set of digital assets. The launch, which still needs the green light from regulators, follows the end of XRP’s years-long legal fight with the US Securities and Exchange Commission. A federal court ruling in 2023 found that institutional sales of XRP violated securities laws, but programmatic exchange sales did not. The case officially closed in August 2025 after Ripple agreed to pay a $125 million fine, removing one of the biggest uncertainties hanging over the token. This is a developing story. This article was generated with the assistance of AI and reviewed by editor Jeffrey Albus before publication. Get the news in your inbox. Explore Blockworks newsletters: Source: https://blockworks.co/news/cme-group-solana-xrp-futures
Share
BitcoinEthereumNews2025/09/17 23:55