[ newsletter ]
Stay ahead of Web3 threats—subscribe to our newsletter for the latest in blockchain security insights and updates.
Thank you! Your submission has been received!
Oops! Something went wrong. Please try again.
In 2024, hackers drained $1.48 billion from the crypto industry, primarily through DeFi exploits, highlighting ongoing vulnerabilities despite improved security measures.
The cryptocurrency landscape has been rocked in 2024, with hackers draining an astonishing $1.48 billion from various platforms, primarily through decentralized finance (DeFi) exploits. This alarming trend highlights the ongoing vulnerabilities within the crypto ecosystem, despite some improvements in security measures.
The decentralized finance sector has emerged as a prime target for cybercriminals, who exploit vulnerabilities in smart contracts and governance models. In January alone, DeFi protocols suffered losses totaling $38.9 million due to various attack methods, including smart contract hacks and key compromises.
On February 21, 2025, the ByBit exchange was hit by a massive hack, resulting in the theft of approximately $1.46 billion. Investigators believe that malware tricked the platform into approving unauthorized transactions, marking this incident as the largest theft in crypto history, surpassing even the infamous Poly Network hack of 2021.
The attack has been linked to North Korea's Lazarus Group, known for its sophisticated cyber operations. The stolen funds were quickly laundered through various methods, including swapping tokens and dispersing them across multiple wallets to evade detection.
Despite the staggering losses, there are signs of improvement in the overall security landscape:
The cryptocurrency industry continues to face significant challenges as hackers adapt to evolving security measures. While the total losses in 2024 show a slight improvement, the dominance of DeFi exploits and the shift in attack patterns to networks like BNB Chain underscore the need for ongoing vigilance and robust cybersecurity strategies. As the landscape evolves, both users and platforms must prioritize security to protect their assets in this high-stakes environment.