2025 was a turbulent year for crypto security. According to blockchain analytics firm Chainalysis, over $3.4 billion was stolen through hacks and thefts, and about $17 billion was stolen in crypto scams and fraud in 2025 (with at least $14 billion identified onchain so far). PeckShield reported ~$4.04 billion in combined losses in 2025, split between ~$2.67 billion (up ~24.2% YoY) from hacks and ~$1.37 billion from scams and phishing. CertiK reported $3.35 billion lost in 2025 across hacks, scams, and exploits (about +37% vs. 2024), while stressing the theme of fewer but larger attacks.
According to Chainalysis, total value stolen from centralized services hit $2.5 billion across fewer incidents in 2025: the top three hacks accounted for 69% of all service losses. The number of personal wallet compromises is rising and DeFi hack losses stayed comparatively muted even as TVL recovered. PeckShield reported that attackers shifted from DeFi to CEXs and large organizations, using supply-chain attacks and private-key compromises, driving these targets’ share of total losses to 75%, up 46% from 2024.
In this blog post, we focus on software-related attacks, excluding phishing and scam. We rely on major reports for metrics like total value stolen (TVS), incident counts, and year-over-year changes, and include hands-on technical examples from forensic investigations showing how vulnerabilities were exploited. One pattern stands out: While DeFi hack losses stayed comparatively muted even as TVL recovered, attackers shifted attention to personal wallets and centralized services.
Source: PeckshieldCertik called the Supply Chain (exploits of blockchain-based dependencies, CI/CD, and wallet integrations) “the most costly attack vector”, totaling $1.4 billion losses across 2 incidents.
Centralized platforms breaches often blend social engineering with operational access. A common method involves “embedded IT worker” infiltration and related recruiter impersonation, which can yield privileged access to systems, source code, and signing workflows. Once inside, attackers exploit private key infrastructure by bypassing cold wallet controls — e.g., tricking multisig signers into approving malicious transactions via altered interfaces.
DeFi hacks declined relatively to 2024, with losses suppressed despite Total Value Locked (TVL) growth. Chainalysis attributes this to improved security and “target substitution” toward wallets and centralized services. CertiK reported DeFi total value stolen around $500–700 million across 344 incidents in 2025.
Common DeFi smart contract flaws include: reentrancy (recursive calls draining funds), faulty input validation (34.6% of cases), oracle manipulation, access-control mistakes, and governance logic weaknesses. Flash loans, borrowing uncollateralized funds to manipulate markets, remain a frequent accelerator for attacks.
Key and signing infrastructure compromises happen when attackers gain or abuse the ability to sign transactions, rather than exploiting smart contract code. These incidents look like attackers stealing keys, extracting signing shares, or subverting approval workflows so legitimate-looking signatures authorize malicious withdrawals across one or many chains.
These attacks target hot wallets, signing servers, MPC/HSM systems, validator keys, or approval workflows, so malicious withdrawals look legitimate onchain. Once signing authority is compromised, funds can be moved quickly across multiple networks with little chance of reversal.
2025 made one thing obvious: strong cryptography and audited contracts don’t stop losses when attackers compromise the software and workflows that sit around them. The biggest incidents weren’t “blockchain bugs” as much as failures in distribution and signing: tampered wallet interfaces, poisoned dependencies, back-end logic changes, and stolen credentials that turned invalid withdrawals into valid ones. DeFi exploits stayed comparatively muted even as TVL recovered, but centralized services and personal-wallet infrastructure became the easiest way to capture outsized value.
Going into 2026, the priority should be hardening the full signing path: We need better digital asset management tools, which are built on multi-factor authentication but without introducing centralization risks, as we notice that attacks target every bit of supply chain. We need to tighten operational controls, secret handling, and transaction verification, because attackers are increasingly targeting wallet infrastructure and signature flow.
Note: OKcontract is building Chainwall, a fully decentralized asset management suite for yield products.
Navigating the Storm: Lessons From 2025 Crypto Attacks in was originally published in Coinmonks on Medium, where people are continuing the conversation by highlighting and responding to this story.



Wormhole’s native token has had a tough time since launch, debuting at $1.66 before dropping significantly despite the general crypto market’s bull cycle. Wormhole, an interoperability protocol facilitating asset transfers between blockchains, announced updated tokenomics to its native Wormhole (W) token, including a token reserve and more yield for stakers. The changes could affect the protocol’s governance, as staked Wormhole tokens allocate voting power to delegates.According to a Wednesday announcement, three main changes are coming to the Wormhole token: a W reserve funded with protocol fees and revenue, a 4% base yield for staking with higher rewards for active ecosystem participants, and a change from bulk unlocks to biweekly unlocks.“The goal of Wormhole Contributors is to significantly expand the asset transfer and messaging volume that Wormhole facilitates over the next 1-2 years,” the protocol said. According to Wormhole, more tokens will be locked as adoption takes place and revenue filters back to the company.Read more