// 2025 UPDATE
2014-2024 COMPREHENSIVE REPORT
scroll down to find out the surprising trends and data we uncovered
// STATS & FINDINGS
TOTAL LOSSES FROM TOP 100
$10.77 billion
The $1.5 billion Bybit hack in February 2025
Ethereum, BSC, Bitcoin, Polygon, and Arbitrum
Off-chain: 44% of total attacks
Compromised accounts: 47% of total losses
Only 20% of hacked protocols were audited
Audited protocols accounted for 10.8% of the total value lost
// DeFi Hacks
The cost of DeFi hacks is on the rise, as high-loss attacks become more common in the crypto space
Number of Attacks Per Year
AMOUNT OF MONEY LOST PER YEAR
// Ethereum and Binance Smart Chain
Distribution of Attacks Per Chain
ORDER BY TVL AND NUMBER OF ATTACKS
Download the full report to learn more about the top 100 DeFi hacks and how to protect yourself from future attacks.
// AUDITING IN DEFI
The most common vulnerability leading to direct contract exploitation is a lack of or faulty input verification/validation, which accounts for 34.6% of the cases
TYPES OF CONTRACT EXPLOITATION
"While the overall number of hacks has seen a slight rise from last year, the total financial damage continues to decline over time—yet these incidents remain a critical concern for the Web3 ecosystem. Our latest findings underscore the importance of safeguarding both on-chain and off-chain components, as off-chain vulnerabilities account for growing share losses each year.
We also observed that attackers are expanding their focus to emerging targets like gaming protocols and Layer 2 chains. By identifying the most likely attack vectors for each protocol type and blockchain platform, developers and auditors can proactively strengthen their defenses and reduce risk. In today’s evolving threat landscape, a robust approach to security is critical for any organization looking to thrive in the Web3 space."
Mar Aguilar
Lead Security Architect and Researcher,
Author of the Top 100 DeFi Hacks Report
Download the full report to learn more about the top 100 DeFi hacks and how to protect yourself from future attacks.
// THE ACHILLES HEEL OF DEFI
These findings emphasize the need for improving smart contract security, implementing robust key management practices, and mitigating risks in the DeFi ecosystem
CONTRACT EXPLOITATION
A BREAKDOWN OF SMART CONTRACT VULNERABILITY TYPES
// STAY AHEAD OF HACKERS
Get your smart
contracts audited
Smart Contract vulnerabilities are the leading cause of DeFi hacks. It's crucial to have your smart contracts audited by reputable auditing firms.
Use multi-sig
wallets:
Multi-signature wallets require multiple parties to sign off on a transaction, which adds an extra layer of security. This can help prevent private key theft and unauthorized access to your assets.
Avoid
hot wallets:
Hot wallets are connected to the internet and are more susceptible to hacking attempts. Consider using cold storage wallets, which are not connected to the internet, for long-term storage of your assets.
Be cautious with publicly
callable functions:
Publicly callable functions in smart contracts can be accessed by anyone on the blockchain, including hackers. It's important to limit access to these functions and ensure they are properly validated to prevent attacks.
Stay informed &
up to date:
DeFi is an ever-evolving space, and new vulnerabilities may arise. Stay informed by following reputable sources and consider implementing additional security measures as needed.