CEXs Account for 54.26% of $3.01 Billion in H1 2025 Crypto Hacks as Laundering Accelerates to Minutes

Generated by AI AgentCoin World
Friday, Jul 25, 2025 4:53 pm ET2min read
Aime RobotAime Summary

- Global Ledger report reveals $3.01B in crypto stolen via 119 hacks in H1 2025, with laundering now occurring in minutes—22.7% completed before breach disclosure.

- Centralized exchanges (CEXs) account for 54.26% of losses, exposing critical vulnerabilities as attackers exploit rapid fund movement and weak AML systems.

- U.S. Genius Act and Tornado Cash case signal stricter liability for platforms, with prosecutors demanding accountability for uncontrolled illicit use.

- Real-time monitoring and AI-driven defenses are urgently needed, as 95.8% of stolen funds remain unrecovered and attack vectors evolve faster than current frameworks.

A new report from Swiss blockchain analytics firm Global Ledger has uncovered alarming trends in the speed and scale of cryptocurrency laundering, highlighting critical vulnerabilities in centralized exchanges (CEXs) and broader crypto infrastructure [1]. The report reveals that over $3.01 billion was stolen across 119 crypto hacks in the first half of 2025, exceeding the total losses recorded in all of 2024. What sets this period apart is not just the volume but the unprecedented velocity at which attackers move and obscure illicit funds.

Researchers analyzed onchain data from each exploit and mapped the time between the initial breach and the final laundering stage. The findings indicate that laundering now occurs within minutes—often before a hack is even publicly disclosed. In 22.7% of cases, the laundering process was fully completed before any internal or public announcement of the breach. In another 68.1% of incidents, funds were already in motion by the time victims became aware of the attack. For context, CEX compliance teams often have just 10–15 minutes to act on suspicious transactions before funds are lost [1].

The report underscores the inadequacy of current Anti-Money Laundering (AML) systems and Virtual Asset Service Providers (VASPs). Traditional ticket-based compliance processes are ill-suited to counter attacks that move funds at such a rapid pace. In the fastest incident documented, stolen assets were laundered within three minutes, with the initial transfer occurring just four seconds after the exploit. On average, hackers have a 20-hour head start—15 hours after the breach to move funds before public disclosure—leaving regulators and platforms scrambling to respond [1].

CEXs are emerging as the most vulnerable entry points for attackers. They accounted for 54.26% of total losses in H1 2025, far exceeding losses from token contract exploits (17.2%) and personal wallet breaches (11.67%). The report attributes 15.1% of all laundered crypto to centralized exchanges, emphasizing their role as both a target and a conduit for illicit activity. This has intensified scrutiny on CEXs to adopt real-time, automated monitoring systems capable of detecting and halting suspicious transactions before they can be laundered [1].

Regulatory pressure is mounting, exemplified by the Genius Act, signed into U.S. law on July 18 by President Donald Trump. The legislation mandates stricter AML requirements and faster response timelines for exchanges and other VASPs. These changes come as the ongoing trial of Tornado Cash developer Roman Storm illustrates a shifting legal landscape. Prosecutors argue that developers and platforms must be held accountable for not implementing controls to prevent illicit use. Storm faces conspiracy charges related to laundering $1 billion in stolen funds, including those linked to North Korea’s Lazarus Group. If convicted, he could receive a 45-year prison sentence, marking a potential watershed moment for liability in crypto [1].

The report’s findings highlight a critical arms race between attackers and defenders. As hackers refine their tactics to exploit speed and automation, the industry must respond with equally sophisticated tools. Global Ledger’s analysis suggests that real-time monitoring and rapid response systems are essential to counter laundering that occurs in under three minutes. However, compliance teams remain stretched, with only 4.2% of stolen funds recovered in H1 2025 [1].

The implications extend beyond individual breaches. The report warns that existing security frameworks are lagging behind the evolution of attack vectors. As AI-driven threats and AI inference-layer vulnerabilities become more prevalent, the need for proactive, real-time defenses is urgent. Stakeholders must balance innovation with resilience, ensuring that infrastructure can withstand both emerging and established threats.

Source: [1] [Real-time crypto laundering exposes CEX vulnerabilities — Report] [https://cointelegraph.com/news/real-time-crypto-laundering-cex-vulnerabilities-report?utm_source=rss_feed&utm_medium=rss&utm_campaign=rss_partner_inbound]

Comments



Add a public comment...
No comments

No comments yet