Crypto security firms report that 2025 has already eclipsed previous years in losses. Hacken’s mid-year report indicates over US $3.1 billion lost in the first half alone, surpassing 2024’s total of $2.85 billion. The lion’s share, almost 59 percent of these losses, stems from access-control vulnerabilities, while smart-contract bugs account for another $263 million.
Certik’s data corroborates this trend, showing investors lost nearly $2.47 billion in the first six months of 2025. The most damaging incidents, the Bybit breach and the Cetus Protocol exploit, together accounted for $1.78 billion. Wallet compromisation was identified as the dominant attack vector, resulting in $1.7 billion of damage, while phishing accounted for another $410 million.
SlowMist reported similar figures, estimating $2.373 billion lost across 121 incidents in the first half of the year. DeFi protocols made up three-quarters of the cases, and exchanges bore the largest single losses at $1.883 billion.
The scale of the danger crystallised earlier this year with one of the largest hacks in crypto history. In February, hackers exploited vulnerabilities in Bybit’s cold wallet system and stole around $1.5 billion. The attack triggered a liquidity crunch as panicked users rushed to withdraw funds.
Bybit activated its emergency plan and secured loans from Bitget and Antalpha to cover redemptions, but the reputational blow was significant. The exchange survived, yet its market share and credibility suffered. This case underscored the fragility of even the largest players when core operational safeguards fail.
Another recurring problem in the sector is the gap between freezing stolen funds and actually recovering them. Law enforcement and industry collaborations have improved in tracing assets, with operations such as T3 FCU and Chainalysis’ Project Atlas managing to freeze more than $300 million tied to scams.
Still, the process rarely ends in restitution for victims. In one RICO fraud case in the United States, investigators linked $263 million to cyber-enabled thefts, yet only a fraction of stolen assets ever finds its way back to the original owners. The overwhelming majority remain unrecovered, underscoring the structural limitations of cross-border law enforcement and the absence of clear legal frameworks for crypto asset recovery.
The unrelenting wave of attacks has made clear that the industry must rethink its approach to risk management. The Bybit hack demonstrated how over-reliance on blind transaction signing and inadequate operational checks can create catastrophic points of failure.
As the industry scales, stakeholders increasingly demand institutional-grade security: rigorous internal audits, stronger access controls, and compliance systems mirroring those of traditional financial institutions. Regulators are beginning to reinforce this shift. Europe’s Markets in Crypto-Assets (MiCA) framework is pushing firms to adopt more comprehensive risk governance, not only to safeguard consumers but also to open the path for greater institutional adoption.
Yet regulation alone cannot close the gap. Legal infrastructures remain ill-equipped to deal with global, borderless crimes. Freezing assets demonstrates progress, but returning them requires legal certainty, international cooperation, and forensic proof, all of which remain patchy and slow. Until these barriers are addressed, the overwhelming majority of victims will remain uncompensated.
The crisis has shown that exchanges and projects cannot rely solely on regulators or police investigations; they must create proactive, self-reliant defences. Industry experts argue that combating this challenge requires global coordination, not only among governments but also between exchanges, auditors, blockchain analytics firms, and cybersecurity providers. Information sharing and joint incident response are crucial to staying ahead of attackers who increasingly operate with nation-state backing.
For developers and investors, the lessons are sobering but clear. Comprehensive security audits should be mandatory before any major deployment, supplemented by red-team exercises and continuous penetration testing.
Multi-layered access controls, including multi-signature systems and zero-trust verification, should be default standards rather than add-ons. Firms also need robust incident-response planning: liquidity buffers, clear communication strategies, and contingency reserves can be the difference between survival and collapse in the aftermath of an attack.
Finally, post-incident transparency is essential. Attempts to downplay or obscure hacks only erode confidence, whereas detailed disclosure helps build trust and elevates industry standards.
The stakes could not be higher. With more than $3 billion already lost in 2025 and the scale of hacks growing ever larger, security is no longer an issue that can be deferred in the pursuit of growth. Without credible defences, the crypto ecosystem risks alienating institutional capital and undermining its own promise of decentralised finance.
The current wave of hacks should be treated not as isolated setbacks but as a systemic crisis. If the industry can respond by embedding security as a foundational principle, this painful chapter may yet become an inflection point. Only then can crypto transcend its vulnerabilities and build the resilience needed to fulfil its transformative potential.
CBDCs vs. stablecoins: the battle for digital money
2026 midterms: crypto’s impact on voters
DTX Exchange surpassed the Cardano in 2024
Ethereum is planning its Pectra hard fork