Crypto theft reached $3.4B in 2025 with actors linked to North Korea driving record losses and evolving attack patterns, says Chainalysis.A Big Year for Crypto Crypto theft reached $3.4B in 2025 with actors linked to North Korea driving record losses and evolving attack patterns, says Chainalysis.A Big Year for Crypto

Crypto Hacks, Theft Hit $3.4B in 2025, North Korea is Top Threat

2025/12/19 17:02
6 min read

Crypto theft reached $3.4B in 2025 with actors linked to North Korea driving record losses and evolving attack patterns, says Chainalysis.

A Big Year for Crypto Theft

The blockchain Blockchain Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned). In this sense, blockchain is immune to the manipulation of data, making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tamp Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned). In this sense, blockchain is immune to the manipulation of data, making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tamp Read this Term intelligence firm Chainalysis’s 2026 Crypto Crime Report, a preview of which you can see here, reveals a stark picture of cryptocurrency theft in 2025. According to the report, more than $3.4 billion worth of digital assets were stolen from January through early December 2025, continuing an alarming trend of high-value thefts in the crypto space.

This figure incorporates an unusual pattern: a few extraordinarily large breaches account for the majority of losses, rather than countless small hacks. The top three hacks alone made up 69 percent of total stolen funds.

North Korea: Dominant Threat Actor

The Democratic People’s Republic of Korea (DPRK) stands out as the most significant state-linked threat in the report. North Korean hackers stole at least $2.02 billion in cryptocurrency in 2025, a 51 percent year-over-year increase from 2024, despite carrying out fewer overall attacks than in previous years.

That massive haul has pushed the lower-bound estimate of total DPRK-linked stolen crypto to an astonishing $6.75 billion over time.

The report suggests that these actors are focusing on high-impact, high-value targets and using sophisticated methods to access privileged systems inside exchanges and custodial services. Techniques have evolved beyond traditional breaches to include social engineering and impersonation of recruiters at major web3 and AI firms, giving attackers ways to harvest critical credentials.

  • UK Moves to Regulate Crypto by 2027 After FCA Sought Public Feedback on Oversight
  • Ondo’s SEC Clearance Comes as European Tokenized Stocks Advance via Bitget
  • Prosecutors Seek Twelve Years for Do Kwon in Terraform Collapse; Defense Seeks Five

Not Just Big Services, But Personal Wallet Targets Too

While institutional and exchange Exchange An exchange is known as a marketplace that supports the trading of derivatives, commodities, securities, and other financial instruments.Generally, an exchange is accessible through a digital platform or sometimes at a tangible address where investors organize to perform trading. Among the chief responsibilities of an exchange would be to uphold honest and fair-trading practices. These are instrumental in making sure that the distribution of supported security rates on that exchange are effectiv An exchange is known as a marketplace that supports the trading of derivatives, commodities, securities, and other financial instruments.Generally, an exchange is accessible through a digital platform or sometimes at a tangible address where investors organize to perform trading. Among the chief responsibilities of an exchange would be to uphold honest and fair-trading practices. These are instrumental in making sure that the distribution of supported security rates on that exchange are effectiv Read this Term hacks account for most of the dollar value stolen, there is a notable rise in personal wallet compromises. Chainalysis estimates more than 158,000 theft incidents involving individual wallets in 2025, impacting roughly 80,000 unique victims.

Interestingly, even though the number of compromised personal accounts has spiked, the total value stolen from these individual incidents is lower than in previous years, suggesting attackers are targeting many users for smaller amounts rather than a few for big scores.

This shift could reflect broader adoption of crypto wallets, meaning more potential victims, but also possibly better security practices at major platforms that deter large-scale exploitation.

Large Hacks Are Still the Main Drivers

Despite more incidents overall, a small number of catastrophic hacks drive the lion’s share of losses. For example, early in 2025, a major breach at Bybit, now attributed to North Korean actors, resulted in a haul of around $1.5 billion, making it one of the largest single thefts in crypto history. Officials also dismantled a EUR 700 million fraud ring operating across Europe just this month.

Such high-value thefts skew the industry’s crime landscape. The report notes that the ratio between the largest hack and the median stolen amount has now exceeded 1,000 to 1, underlining how a handful of outliers can dictate annual totals.

These massive breaches also shape broader trends. Centralized platforms, despite their professional security teams, remain vulnerable to private key compromises, and when these attacks succeed, they generate disproportionate losses compared with smaller, decentralized finance (DeFi) hacks.

What This Means for Crypto Security

Evolving Attack Strategies

The 2026 Crypto Crime Report highlights how threat actors are adapting and innovating. Instead of merely exploiting technical bugs, attackers are increasingly leveraging human-targeted tactics, such as impersonation and social engineering to gain privileged access.

Particularly concerning is the possibility that hackers may embed themselves within organizations or pose as potential partners to gain deeper entry into infrastructure systems, a trend that could outpace traditional defensive measures.

Bigger Targets, Bigger Impact

The concentration of losses in a few breaches suggests that platform security remains a weak link. Large exchanges and custodians, where vast sums of assets are aggregated, present attractive targets. Their compromise can ripple across markets and shake investor confidence.

That said, the divergence in DeFi, where hack losses have remained comparatively lower even as total value locked rises, may indicate improved defensive practices in some parts of the ecosystem.

Looking Ahead

Chainalysis’s findings paint a complex picture for 2026 and beyond. With attackers capable of inflicting enormous damage in a single incident, the industry will need to double down on robust security, compliance, and threat intelligence to stave off further losses.

At the same time, the rise in personal wallet compromises underscores the need for better education and individual security practices, as users increasingly manage their own keys and assets in a decentralized world.

In a space prized for innovation, the battle against theft and hacking remains a persistent and evolving challenge, one that demands coordinated defenses, smarter protocols, and industry-wide vigilance.

Market Opportunity
TOP Network Logo
TOP Network Price(TOP)
$0.000096
$0.000096$0.000096
0.00%
USD
TOP Network (TOP) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Perpetual DEX in testing with cross‑chain liquidity and ADL

Perpetual DEX in testing with cross‑chain liquidity and ADL

The post Perpetual DEX in testing with cross‑chain liquidity and ADL appeared on BitcoinEthereumNews.com. Sunperp, a new perpetual DEX being tested on the Tron blockchain, promises millisecond executions, cross-chain liquidity aggregation, and an integrated auto-deleveraging (ADL) system. Justin Sun reshared the announcement on X, inviting users to try it and highlighting dedicated incentives, while numerous economic details and operational metrics remain to be confirmed. According to the data collected by on-chain analysts and industry reports, in May 2025 TRON hosted over 75 billion USDT, with the network recording over 8.3 million daily transactions and approximately 306 million active accounts, a context that justifies the interest in USDT-collateralized derivatives. Market analysts following perpetual DEX also note that the massive availability of USDT on TRON facilitates cross-chain arbitrage operations and reduces costs for market makers. What is Sunperp and what it brings differently to Tron Sunperp is a platform perp DEX that uses USDT as collateral, with profits and losses calculated in USDT. The architecture separates matching, executed off-chain to maximize speed, from settlement, recorded on-chain to ensure transparency of trading results. In this context, the debut announcement was originally reported by Jamie Redman; the team also states that, while in the testing phase, the core contracts are non-upgradable. Main Technical Features Order types: market, limit (with FOK – Fill-or-Kill, GTC – Good-Till-Cancelled, and IOC – Immediate-or-Cancel modes), post-only orders, plan orders, trailing, and TWAP (Time-Weighted Average Price). Use of multi-source oracles to determine the mark price employed in the calculation of profits and liquidations. Primary collateral: USDT, with P&L calculated in the same currency. Core contracts declared non-upgradable in an environment still in testing. Cross-chain liquidity: less slippage and tighter spreads The protocol claims to aggregate liquidity flows from various networks in order to increase market depth and improve order execution, thereby reducing slippage and spreads in large-size trades. However, the actual effect will depend…
Share
BitcoinEthereumNews2025/09/22 17:20
Asia tackles wallet fraud; Egypt boosts digital finance

Asia tackles wallet fraud; Egypt boosts digital finance

The post Asia tackles wallet fraud; Egypt boosts digital finance appeared on BitcoinEthereumNews.com. Homepage > News > Finance > Asia tackles wallet fraud; Egypt boosts digital finance Three of Asia’s leading payment service providers have forged a partnership to improve the protection of digital wallets amid a surge of payment fraud by bad actors in the region. The alliance, dubbed Digital Wallet Guardian Partnership, comprises Singapore-based Ant International, AlipayHK, and Malaysia-based TNG eWallet. The collaboration between these three payment behemoths will leverage EasySafePay 360, an artificial intelligence (AI)-powered account protection solution. EasySafePay 360, the first phase of the partnership, will provide digital wallet service providers in the region with a plug-and-play solution to prevent account takeover by bad actors. The solution leans on an automated approval system for user verification that offers high accuracy without compromising efficiency. Furthermore, users of the EasySafePay 360 solution will have access to a money-back guarantee as an added layer of protection. Ant International disclosed that it will provide full compensation on all authorized transactions, demonstrating its faith in EasySafePay 360’s capabilities. Digital wallet service providers keen on integrating EasySafePay 360 into their operations can access customizable tools to smooth the process. After integrating the solution, consumers can make payments without being redirected to a separate browser or mobile application for payment confirmation. The trio disclosed that seamlessly eliminating the redirection requirement has the potential to improve merchant conversion rates by 10%. To achieve its objectives, the trio will also use emerging technologies, knowledge-sharing, collaboration, and stakeholder engagement. “We safeguard our 4.5 million active users with 24/ AI monitoring, customizable protections, and regular anti-fraud tips,” said AlipayHK CEO Venetia Lee. “By advancing our multi-layered security and working with partners on risk management, we’re committed to making digital payments in Hong Kong both secure and convenient.” Leading the way with digital payments Given Asia’s standing as the fastest-growing region…
Share
BitcoinEthereumNews2025/09/22 11:02
Over 260,000 Chrome users hit by 30 fake AI extensions stealing browsing & email data

Over 260,000 Chrome users hit by 30 fake AI extensions stealing browsing & email data

Tens of thousands of people have downloaded what they believed were useful AI tools for their browsers, only to give hackers a direct path into their most private
Share
Cryptopolitan2026/02/13 03:20