Crypto under Seige:
$2.3bn lost in 2025 and counting

By Palesa Tau

19 June 2025

In just six months, over $2.3 billion has been stolen from the crypto ecosystem in 2025. Not through mysterious code or sophisticated smart contract logic, but increasingly via human error, social engineering, and security blind spots in even the most trusted platforms. These incidents highlight a fundamental truth: in the decentralized world of Web3, trust is still under construction.

The Crypto Heists of 2025: A Timeline of Failures

January - June 2025:

  • Cetus Protocol Hack ($220M): A major exploit on the Sui-based DeFi platform rocked the ecosystem. The protocol’s oracle system was manipulated, allowing attackers to drain funds. The exploit highlighted the dangers of insufficient audits and protocol overconfidence.
  • Coinbase Data Breach ($20M ransom): One of the most secure centralized exchanges suffered a massive data breach in May. Hackers used phishing and social engineering to extract sensitive customer data, prompting concerns over institutional security.
  • Ongoing Wallet & DEX Phishing Attacks: Dozens of attacks have exploited wallet users and DEX traders through fake websites, malicious browser extensions, and Discord/Twitter impersonators. Chainalysis reports a 45% rise in phishing-based crypto losses year-over-year.

These events underscore that crypto security is no longer just about robust code or smart contract audits. It now includes protecting the human layer—the people, platforms, and practices that surround crypto usage.

Smart Contracts Are Safer – People Are Not

While blockchain codebases and smart contracts have matured, hackers are shifting their focus to easier targets: users and platforms that overlook operational security. The narrative has changed from "code is law" to "UX is vulnerability."

Even Coinbase, with its robust security architecture, fell victim to a breach that had nothing to do with code. It was human error—a trusted employee clicking a malicious link—that opened the door. This breach reveals a painful irony: as Web3 platforms scale and attract more users, they also become more vulnerable to the same old traps that plague Web2.

This shift marks a new era of exploit strategy. Cybercriminals are realizing they don’t need to crack the code if they can compromise the people. Phishing emails, fake customer support chats, and malicious browser extensions have all become tools of choice.

DeFi’s Risk Blind Spot

The Cetus hack underscores a broader DeFi issue: protocols are launching at lightning speed without prioritizing comprehensive auditing or real-time monitoring tools. Many projects still rely on outdated oracle systems or skip formal verification of contracts in their rush to market.

DeFi has long celebrated its open, permissionless nature, but with freedom comes risk. When high-stakes capital is paired with low-stakes code review, vulnerabilities become inevitable. In the case of Cetus, a single weakness allowed attackers to walk away with hundreds of millions. The incident isn’t an anomaly—it’s a symptom.

The problem isn't just technical; it's cultural. Many DeFi teams are still incentivized to ship fast rather than build secure. Security audits are seen as a checkbox, not a continuous process. Until this mindset shifts, exploits will remain part of the landscape.

Why This Should Worry Everyone

  1. Loss of Trust: Users and institutional investors are already wary. Every breach erodes credibility across the entire space.
  2. Regulatory Backlash: Incidents like these hand regulators more ammunition to tighten controls and increase compliance demands. Lawmakers watching from the sidelines will take each breach as justification to impose stricter rules.
  3. Mass Adoption at Risk: If users feel unsafe, onboarding the next billion into Web3 will stall. Adoption requires confidence, and confidence demands safety.
  4. Insurance Limitations: The decentralized insurance sector is still in its infancy. When users lose funds, there's often no recourse.
  5. Reputation Damage: High-profile attacks tarnish not only the affected protocols but the credibility of the broader ecosystem.

What Comes Next: A Security Rethink

At Galahad, security is not an afterthought—it is foundational. The platform incorporates multiple layers of protection to ensure that user data, models, and digital assets remain safe. Key measures include:

  • Zero-knowledge architecture: Galahad does not store private data unnecessarily and allows users to control how and where their information is used.
  • End-to-end encryption: Communication and storage are protected with military-grade encryption protocols.
  • Multi-factor authentication (MFA): Users must verify identity through multiple secure layers to access critical systems.
  • Decentralized access control: Permissions and access roles are handled using blockchain-based verification, minimizing the risk of centralized breaches.
  • Continuous audits and penetration testing: Regular assessments by white-hat hackers and external firms ensure potential vulnerabilities are identified early.

Galahad also supports the broader Web3 community in mitigating security risks through:

  • Educational content: Publishing thought leadership articles (like this one) to raise awareness about phishing, social engineering, and best practices.
  • Tooling integrations: Recommending or integrating with secure wallet providers, anti-phishing plugins, and blockchain analytics tools.

As the Web3 world matures, security will not be optional—it will be the ultimate competitive edge. Galahad is committed to setting the standard.

To restore confidence, Web3 must evolve beyond reactive patching and into proactive, user-centric security design. This includes:

  • Mandatory third-party audits before launch
  • Ongoing bug bounties and white-hat incentives to continuously test code
  • Decentralized insurance protocols that provide users with compensation in case of breaches
  • Phishing-resistant wallet tools, like multi-factor authentication or transaction previews
  • AI-enhanced threat detection that monitors for suspicious wallet and network activity
  • Education initiatives that teach users how to avoid scams and verify safe resources

Some platforms are already embracing this change. Trust Wallet has rolled out real-time phishing protection alerts. Immunefi has paid out millions in bounties to ethical hackers. But these measures need to become standard, not optional.

Conclusion: Trust, Rebuilt

Web3 is meant to be trustless, but users still trust the tools they use. If those tools remain vulnerable, the dream collapses. The $2.3 billion stolen this year isn’t just a number—it’s a wake-up call.

The future of crypto isn’t just about innovation; it’s about securing the foundations we’re building on. Developers, founders, investors, and users must recognize that security is not a post-launch feature—it’s a precondition for everything that follows.

Because in Web3, code may be law, but trust is everything.

©Copyright. All rights reserved.

We need your consent to load the translations

We use a third-party service to translate the website content that may collect data about your activity. Please review the details in the privacy policy and accept the service to view the translations.