Solutions

Company

Resources

Blog

Contact

Login

    • Assurance

      Smart Contract Assessment

      Securing code integrity, protecting digital assets

      Blockchain Layer 1 Assessment

      Assessing protocols, securing blockchain foundations

      Code Security Audit

      Uncovering flaws, strengthening software integrity

      Web Application Penetration Testing

      Exposing weaknesses, fortifying digital defenses

      Cloud Infrastructure Penetration Testing

      Securing configurations, protecting critical environments

      Red Team Exercise

      Simulating real-world attacks, strengthening defenses

      AI Red Teaming

      Testing AI systems against real threats

      AI Security Assessment

      Securing AI models, data, and pipelines

    • Advisory

      AI Advisory

      Guiding secure, strategic AI adoption forward

      Risk Assessment

      From unknown threats to actionable insights

      Blockchain Architecture Assessment

      Optimizing architecture for tomorrow’s networks

      Compliance Readiness

      Stay ready as regulations evolve

      Custody and Key Management Assessment

      Securing the heart of digital custody

      Technical Due Diligence

      See the risks before you invest

      Technical Training

      Empower your teams to secure what matters

    • Who We Are

      The best security engineers in the world

      Careers

      Work with the elite

      Who Trusts Us

      The trusted security advisor for blockchain and financial services industries

      Brand

      Access official logos, fonts, and guidelines

      Service Commitments

      Committed to Protecting Your Data

    • Audits

      In-depth evaluations of smart contracts and blockchain infrastructures

      BVSS

      Blockchain Vulnerability Scoring System

      Disclosures

      All the latest vulnerabilities discovered by Halborn

      Case Studies

      How Halborn’s solutions have empowered clients to overcome security issues

      Reports

      Comprehensive reports and data

  • Blog

  • Contact

  • Login

STAY CURRENT WITH HALBORN

Subscribe to the monthly Halborn Digest for our top blogs and videos, major company announcements, new whitepapers, webinar and event invites, and one exclusive interview.

ADVISORY SERVICES

AI AdvisoryRisk AssessmentBlockchain Architecture AssessmentCompliance ReadinessCustody and Key Management AssessmentTechnical Due DiligenceTechnical Training

ASSURANCE SERVICES

AI Security AssessmentAI Red TeamingSmart Contract AssessmentBlockchain Layer 1 AssessmentCode Security AuditWeb Application Penetration TestingCloud Infrastructure Penetration TestingRed Team Exercise

COMPANY

Who We AreWho Trusts UsService CommitmentsCareersBrandBlogContact

RESOURCES

AuditsDisclosuresReportsBVSSCase Studies
Halborn Logo
Privacy PolicyTerms of UseVulnerability Disclosure Policy

© Halborn 2026. All rights reserved.

Smart Contract Assessment

Securing code integrity, protecting digital assets

Blockchain Layer 1 Assessment

Assessing protocols, securing blockchain foundations

Code Security Audit

Uncovering flaws, strengthening software integrity

Web Application Penetration Testing

Exposing weaknesses, fortifying digital defenses

Cloud Infrastructure Penetration Testing

Securing configurations, protecting critical environments

Red Team Exercise

Simulating real-world attacks, strengthening defenses

AI Red Teaming

Testing AI systems against real threats

AI Security Assessment

Securing AI models, data, and pipelines

AI Advisory

Guiding secure, strategic AI adoption forward

Risk Assessment

From unknown threats to actionable insights

Blockchain Architecture Assessment

Optimizing architecture for tomorrow’s networks

Compliance Readiness

Stay ready as regulations evolve

Custody and Key Management Assessment

Securing the heart of digital custody

Technical Due Diligence

See the risks before you invest

Technical Training

Empower your teams to secure what matters

Who We Are

The best security engineers in the world

Careers

Work with the elite

Who Trusts Us

The trusted security advisor for blockchain and financial services industries

Brand

Access official logos, fonts, and guidelines

Service Commitments

Committed to Protecting Your Data

Audits

In-depth evaluations of smart contracts and blockchain infrastructures

BVSS

Blockchain Vulnerability Scoring System

Disclosures

All the latest vulnerabilities discovered by Halborn

Case Studies

How Halborn’s solutions have empowered clients to overcome security issues

Reports

Comprehensive reports and data

THIS WEBSITE USES COOKIES

We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners who may combine it with other information that you've provided to them or that they've collected from your use of their services. You consent to our cookies if you continue to use our website. Learn More.

  • STATS & FINDINGS
  • DEFI HACKS
  • ETHEREUM AND BINANCE SMART CHAIN
  • AUDITING IN DEFI
  • THE ACHILLES HEEL OF DEFI
  • STAY AHEAD OF HACKERS

// 2025 UPDATE

Breaking Down the Top 100 DeFi Hacks

2014-2024 COMPREHENSIVE REPORT

scroll down to find out the surprising trends and data we uncovered

// STATS & FINDINGS

5 KEY FINDINGS

TOTAL LOSSES FROM TOP 100

$10.77 billion

total
losses
total losses

  • $10.77 billion

most attacked
chains
most attacked chains

  • Ethereum, BSC, Bitcoin, Polygon, and Arbitrum

common
exploits
common exploits

  • Off-chain: 44% of total attacks

  • Compromised accounts: 47% of total losses

audited vs
unaudited
audited vs unaudited

  • Only 20% of hacked protocols were audited

  • Audited protocols accounted for 10.8% of the total value lost

Multi-sig and
Cold Wallets
Multi-sig and Cold Wallets

  • 19% of protocols used multi-sig wallets

  • 2.4% relied on cold wallets

  • This underutilization highlights critical gaps in private key security

// DeFi Hacks

RISE OF OFF-CHAIN ATTACKS

Off-chain incidents now account for 56.5% of attacks and 80.5% of funds lost in 2024, with compromised accounts being the most frequent and costly. Robust user credential protection is essential to curb these growing threats.

Number of Attacks Per Year

AMOUNT OF MONEY LOST PER YEAR

// Ethereum and Binance Smart Chain

THE MOST TARGETED CHAINS

Distribution of Attacks Per Chain

ORDER BY TVL AND NUMBER OF ATTACKS IN 2024

  1. The chains are ranked from largest to smallest based on Total Value Locked (TVL) and the number of hacks experienced in 2024.
  2. If a chain's marker is located below the blue line, it indicates that the chain is ranked higher (i.e., it has experienced more attacks) compared to its rank based on TVL.
  3. Chains with higher numbers of attacks than expected, relative to their TVL, might be perceived as more attractive targets due to factors beyond just the amount of value they secure.

Download the full report to learn more about the top 100 DeFi hacks and how to protect yourself from future attacks.

// AUDITING IN DEFI

A CRITICAL COMPONENT OF SECURITY AND RISK MITIGATION

The most common vulnerability leading to direct contract exploitation is a lack of or faulty input verification/validation, which accounts for 34.6% of the cases

ROOT CAUSES OF DIRECT CONTRACT EXPLOITATION

"While the overall number of hacks has seen a slight rise from last year, the total financial damage continues to decline over time—yet these incidents remain a critical concern for the blockchain ecosystem. Our latest findings underscore the importance of safeguarding both on-chain and off-chain components, as off-chain vulnerabilities account for growing share losses each year.

We also observed that attackers are expanding their focus to emerging targets like gaming protocols and Layer 2 chains. By identifying the most likely attack vectors for each protocol type and blockchain platform, developers and auditors can proactively strengthen their defenses and reduce risk. In today's evolving threat landscape, a robust approach to security is critical for any organization looking to thrive in the blockchain space."

Mar Gimenez-Aguilar

Lead Security Architect and Researcher,
Author of the Top 100 DeFi Hacks Report

Download the full report to learn more about the top 100 DeFi hacks and how to protect yourself from future attacks.

// THE ACHILLES HEEL OF DEFI

SMART CONTRACT VULNERABILITIES

These findings emphasize the need for improving smart contract security, implementing robust key management practices, and mitigating risks in the DeFi ecosystem

TYPES OF ATTACKS

  1. In the last two years, compromised accounts have accounted for more than 50% of all attacks.
  2. Market manipulation was the leading cause of hacks in 2021, accounting for 32.1% of incidents.
  3. Governance attacks in 2022 and 2024, make up 5% and 5.6%

A BREAKDOWN OF SMART CONTRACT VULNERABILITY TYPES

  1. Reentrancy: Peaked initially, decreased in 2022, surged in 2023, and seems less prevalent in 2024.
  2. Faulty Input Verification/Validation: Primary cause of hacks in 2021, 2022, and 2024, and shares the first spot by occurrence in 2020.

// STAY AHEAD OF HACKERS

5 BEST PRACTICES FOR PREVENTING DEFI BREACHES

01

Go beyond Smart Contract

Audits – Secure the Full

Ecosystem:

Traditional audits aren't enough. Assess interactions with oracles, APIs, and market conditions to catch vulnerabilities in governance, price feeds, and external dependencies before attackers exploit them.

02

Strengthen Account

Security Against

Off-Chain Threats:

Off-chain attacks accounted for 80.5% of stolen funds in 2024, and compromised accounts made up 55.6% of all incidents for that year. Robust authentication measures—such as hardware security modules (HSMs), multi-factor authentication (MFA), and privileged access controls—are essential to protecting user credentials.

03

Adopt Multi-Sig/MPC

Wallets and Cold

Storage for Key

Assets:

Only 19% of hacked protocols used multi-sig wallets, and just 2.4% employed cold storage. Secure private keys with multi-party computation (MPC) solutions and cold wallets to prevent single points of failure.

04

Mitigate Flash Loan

Exploits with Adaptive

Safeguards:

Flash loan attacks surged in 2024, making up 83.3% of eligible exploits. Implement borrowing caps, require time delays on governance actions, and introduce circuit breakers to limit manipulation risks.

05

Enhance Transparency and

Real-Time Monitoring:

Over 54% of off-chain attacks lack clear origins. Increasing transparency in security disclosures, maintaining real-time monitoring for anomalies, and deploying AI-driven threat detection can help detect and mitigate breaches before they escalate.