AInvest Newsletter
Daily stocks & crypto headlines, free to your inbox



CertiK data reveals that crypto hack losses in Q3 2025 fell by 37% to $509 million, a decline attributed to improved code security and a shift in attacker tactics from smart contract exploits to wallet compromises and operational breaches[1]. Despite the overall reduction, September saw a record 16 incidents exceeding $1 million, the highest monthly total on record. This surge pulled the year-to-date average for 2025 to nearly six million-dollar-plus incidents per month, though still below the averages of 2024 and 2023[2].
Centralized exchanges (CEXs) emerged as the primary targets, accounting for $182 million in losses. DeFi projects followed closely, with $86 million stolen, including the $40 million
v1 decentralized exchange (DEX) hack. Notably, the hacker returned the funds after a $5 million bounty was offered[1]. CertiK attributed the decline in code exploit losses-dropping from $272 million in Q2 to $78 million in Q3-to enhanced industry-wide code hardening efforts[3]. However, phishing-related losses also decreased despite a similar number of incidents, indicating improved user awareness or attacker focus on alternative vectors[1].The shift in tactics was highlighted by blockchain security firm Hacken, which noted that attackers increasingly targeted multisig and hot wallets through sophisticated phishing and social engineering[1]. Hacken CEO Yevheniia Broshevan emphasized that North Korean cyber units accounted for roughly half of the stolen funds in Q3, with the regime's operations evolving from phishing attacks to multi-layered operational compromises[1]. Broshevan urged platforms and users to enhance operational security, particularly on emerging chains like Hyperliquid, where incidents such as the HyperVault exploit and HyperDrive rug pull occurred[1].
New blockchain ecosystems faced heightened risks, with CertiK warning that immature security protocols on projects like Hyperliquid made them attractive to opportunistic attackers[3]. The data also underscored the growing threat of state-sponsored groups, with Broshevan noting that CEXs and DeFi projects remain lucrative targets due to their complex architectures[1]. Meanwhile, the FBI confirmed that the Lazarus Group, linked to North Korea, was responsible for the $1.5 billion Bybit hack-the largest in crypto history-underscoring the regime's reliance on digital theft to fund its nuclear programs[4].
Analysts observed that while no $100 million mega-hacks occurred in Q3, the focus on mid-sized exploits reflects a strategic adaptation by cybercriminals to bypass strengthened smart contract defenses. The 71% decline in code exploit incidents compared to Q1 2025 suggests that industry efforts to audit and patch vulnerabilities are yielding results[1]. However, the rise in operational breaches highlights the need for robust key management, multi-signature controls, and third-party audits to mitigate risks[3].
As the crypto landscape evolves, the interplay between improved code security and shifting attack vectors presents both challenges and opportunities. While the 37% reduction in Q3 losses offers a glimmer of optimism, the persistence of state-sponsored and politically motivated attacks, particularly from North Korea, underscores the necessity for continuous vigilance[4]. Platforms and users are advised to prioritize operational security, adopt cold storage solutions, and remain cautious with emerging projects to counteract the dynamic threat landscape[3].
Quickly understand the history and background of various well-known coins

Dec.02 2025

Dec.02 2025

Dec.02 2025

Dec.02 2025

Dec.02 2025
Daily stocks & crypto headlines, free to your inbox
Comments
No comments yet