Key Takeaways: Web3 platforms lost $3.1 billion in H1 2025, already surpassing full-year 2024 losses. Access control failures were the leading cause, followed by phishing and smart contract bugs. AI-related attack vectors rose by 1,025%, showing risks in inference layers and APIs. Web3 projects lost $3.1 billion to exploits and scams in the first half of 2025, according to the Hacken 2025 Half-Year Web3 Security Report published July 24 . 🚨 2025 is already the most expensive year in Web3 security, and we’re only halfway through. $3.1B lost. Social engineering. AI-driven exploits. Protocol design flaws. Our Half-Year Report breaks it all down and shows how to defend against what’s next: https://t.co/6x8JDjkmJT pic.twitter.com/hQjxTvpjlN — Hacken🇺🇦 (@hackenclub) July 24, 2025 The report states that the amount lost in H1 this year has already exceeded the total losses recorded across all of 2024. It attributes $1.83 billion of this amount to access control exploits, the majority of which occurred in Q1. AI-Related Exploits Explode by 10x in Web3 Phishing and social engineering attacks accounted for $600 million, a sharp increase from the previous year. Another $263 million was lost due to smart contract vulnerabilities, marking DeFi’s most damaging quarter since early 2023. Hacken identified a surge in AI-related exploits, with incident volume rising by 1,025% compared to H2 2024. These cases stemmed from issues such as insecure API design, improper model access restrictions, and weak user input filtering in AI inference layers. The single largest incident in the period was the $290 million Munchables breach, followed by $136 million lost in the Pike Finance series of attacks. The Uniswap V4 ecosystem also recorded its first major hook-related exploit, resulting in a $12 million loss. According to the report, Ethereum accounted for 61.4% of total losses, while BNB Chain and Arbitrum represented 20.2% and 11.4%, respectively. Exploits on Ethereum L2s and alt-L1s made up the remainder. Security Enhancements in Exigent Need “2025 has been a wake-up call,” said Hacken Co-Founder and CBDO Yevheniia Broshevan. “As blockchain reaches enterprise scale and regulations advance, cybersecurity becomes a core business function.” The report recommends continuous monitoring and automated defense systems to address rising threats. It also warns that standard auditing remains insufficient given the increased complexity of integrated systems and AI models in Web3 environments. DeFi protocols made up nearly 69% of all incidents tracked in H1 2025. CeFi incidents were fewer but tended to result in higher individual losses. The report also noted a growing overlap between financial and infrastructure attack vectors. The rise in AI-driven exploits exposes the challenge facing the crypto industry: the rapid adoption of complex technologies outpacing the development of security frameworks. At the same time, geopolitical actors and financially motivated groups have begun to treat blockchain infrastructure as high-value targets. The convergence of traditional cybersecurity threats with on-chain vulnerabilities may require new regulatory coordination between Web3-native firms, national agencies, and cybersecurity vendors. Frequently Asked Questions (FAQs) How might regulations like MiCA or the EU AI Act influence future Web3 security practices? These frameworks may impose formal governance, model validation requirements, and real-time monitoring standards that force protocols to integrate cybersecurity by design rather than after deployment. Are smaller protocols more vulnerable to these complex attacks? Yes. The report implies that limited technical resources and overreliance on third-party tooling leave smaller teams exposed, especially as AI integrations expand without clear defensive standards. Is there any indication of coordination between threat actors? While not explicitly detailed, the increase in sophisticated, cross-layer attacks suggests potential collaboration or tooling exchanges between financially motivated hackers and more organized adversarial groups.Key Takeaways: Web3 platforms lost $3.1 billion in H1 2025, already surpassing full-year 2024 losses. Access control failures were the leading cause, followed by phishing and smart contract bugs. AI-related attack vectors rose by 1,025%, showing risks in inference layers and APIs. Web3 projects lost $3.1 billion to exploits and scams in the first half of 2025, according to the Hacken 2025 Half-Year Web3 Security Report published July 24 . 🚨 2025 is already the most expensive year in Web3 security, and we’re only halfway through. $3.1B lost. Social engineering. AI-driven exploits. Protocol design flaws. Our Half-Year Report breaks it all down and shows how to defend against what’s next: https://t.co/6x8JDjkmJT pic.twitter.com/hQjxTvpjlN — Hacken🇺🇦 (@hackenclub) July 24, 2025 The report states that the amount lost in H1 this year has already exceeded the total losses recorded across all of 2024. It attributes $1.83 billion of this amount to access control exploits, the majority of which occurred in Q1. AI-Related Exploits Explode by 10x in Web3 Phishing and social engineering attacks accounted for $600 million, a sharp increase from the previous year. Another $263 million was lost due to smart contract vulnerabilities, marking DeFi’s most damaging quarter since early 2023. Hacken identified a surge in AI-related exploits, with incident volume rising by 1,025% compared to H2 2024. These cases stemmed from issues such as insecure API design, improper model access restrictions, and weak user input filtering in AI inference layers. The single largest incident in the period was the $290 million Munchables breach, followed by $136 million lost in the Pike Finance series of attacks. The Uniswap V4 ecosystem also recorded its first major hook-related exploit, resulting in a $12 million loss. According to the report, Ethereum accounted for 61.4% of total losses, while BNB Chain and Arbitrum represented 20.2% and 11.4%, respectively. Exploits on Ethereum L2s and alt-L1s made up the remainder. Security Enhancements in Exigent Need “2025 has been a wake-up call,” said Hacken Co-Founder and CBDO Yevheniia Broshevan. “As blockchain reaches enterprise scale and regulations advance, cybersecurity becomes a core business function.” The report recommends continuous monitoring and automated defense systems to address rising threats. It also warns that standard auditing remains insufficient given the increased complexity of integrated systems and AI models in Web3 environments. DeFi protocols made up nearly 69% of all incidents tracked in H1 2025. CeFi incidents were fewer but tended to result in higher individual losses. The report also noted a growing overlap between financial and infrastructure attack vectors. The rise in AI-driven exploits exposes the challenge facing the crypto industry: the rapid adoption of complex technologies outpacing the development of security frameworks. At the same time, geopolitical actors and financially motivated groups have begun to treat blockchain infrastructure as high-value targets. The convergence of traditional cybersecurity threats with on-chain vulnerabilities may require new regulatory coordination between Web3-native firms, national agencies, and cybersecurity vendors. Frequently Asked Questions (FAQs) How might regulations like MiCA or the EU AI Act influence future Web3 security practices? These frameworks may impose formal governance, model validation requirements, and real-time monitoring standards that force protocols to integrate cybersecurity by design rather than after deployment. Are smaller protocols more vulnerable to these complex attacks? Yes. The report implies that limited technical resources and overreliance on third-party tooling leave smaller teams exposed, especially as AI integrations expand without clear defensive standards. Is there any indication of coordination between threat actors? While not explicitly detailed, the increase in sophisticated, cross-layer attacks suggests potential collaboration or tooling exchanges between financially motivated hackers and more organized adversarial groups.

Hacken Report Flags $3.1B Web3 Meltdown, 1,025% Spike in AI Attacks

3 min read

Key Takeaways:

  • Web3 platforms lost $3.1 billion in H1 2025, already surpassing full-year 2024 losses.
  • Access control failures were the leading cause, followed by phishing and smart contract bugs.
  • AI-related attack vectors rose by 1,025%, showing risks in inference layers and APIs.

Web3 projects lost $3.1 billion to exploits and scams in the first half of 2025, according to the Hacken 2025 Half-Year Web3 Security Report published July 24.

The report states that the amount lost in H1 this year has already exceeded the total losses recorded across all of 2024. It attributes $1.83 billion of this amount to access control exploits, the majority of which occurred in Q1.

Phishing and social engineering attacks accounted for $600 million, a sharp increase from the previous year. Another $263 million was lost due to smart contract vulnerabilities, marking DeFi’s most damaging quarter since early 2023.

Hacken identified a surge in AI-related exploits, with incident volume rising by 1,025% compared to H2 2024. These cases stemmed from issues such as insecure API design, improper model access restrictions, and weak user input filtering in AI inference layers.

The single largest incident in the period was the $290 million Munchables breach, followed by $136 million lost in the Pike Finance series of attacks. The Uniswap V4 ecosystem also recorded its first major hook-related exploit, resulting in a $12 million loss.

According to the report, Ethereum accounted for 61.4% of total losses, while BNB Chain and Arbitrum represented 20.2% and 11.4%, respectively. Exploits on Ethereum L2s and alt-L1s made up the remainder.

Security Enhancements in Exigent Need

“2025 has been a wake-up call,” said Hacken Co-Founder and CBDO Yevheniia Broshevan. “As blockchain reaches enterprise scale and regulations advance, cybersecurity becomes a core business function.”

The report recommends continuous monitoring and automated defense systems to address rising threats. It also warns that standard auditing remains insufficient given the increased complexity of integrated systems and AI models in Web3 environments.

DeFi protocols made up nearly 69% of all incidents tracked in H1 2025. CeFi incidents were fewer but tended to result in higher individual losses. The report also noted a growing overlap between financial and infrastructure attack vectors.

The rise in AI-driven exploits exposes the challenge facing the crypto industry: the rapid adoption of complex technologies outpacing the development of security frameworks.

At the same time, geopolitical actors and financially motivated groups have begun to treat blockchain infrastructure as high-value targets. The convergence of traditional cybersecurity threats with on-chain vulnerabilities may require new regulatory coordination between Web3-native firms, national agencies, and cybersecurity vendors.

Frequently Asked Questions (FAQs)

How might regulations like MiCA or the EU AI Act influence future Web3 security practices?

These frameworks may impose formal governance, model validation requirements, and real-time monitoring standards that force protocols to integrate cybersecurity by design rather than after deployment.

Are smaller protocols more vulnerable to these complex attacks?

Yes. The report implies that limited technical resources and overreliance on third-party tooling leave smaller teams exposed, especially as AI integrations expand without clear defensive standards.

Is there any indication of coordination between threat actors?

While not explicitly detailed, the increase in sophisticated, cross-layer attacks suggests potential collaboration or tooling exchanges between financially motivated hackers and more organized adversarial groups.

Market Opportunity
Threshold Logo
Threshold Price(T)
$0.00775
$0.00775$0.00775
+0.53%
USD
Threshold (T) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Recovery extends to $88.20, momentum improves

Recovery extends to $88.20, momentum improves

The post Recovery extends to $88.20, momentum improves appeared on BitcoinEthereumNews.com. Silver price extended its recovery for the second straight day, up by
Share
BitcoinEthereumNews2026/02/05 07:34
Saudi Awwal Bank Adopts Chainlink Tools, LINK Near $23

Saudi Awwal Bank Adopts Chainlink Tools, LINK Near $23

The post Saudi Awwal Bank Adopts Chainlink Tools, LINK Near $23 appeared on BitcoinEthereumNews.com. SAB adopts Chainlink’s CCIP and CRE to expand tokenization and cross-border finance tools. SAB and Wamid target $2.32T Saudi capital markets with blockchain-based tokenization plans. LINK price falls 2.43% to $22.99 despite higher trading volume and steady liquidity ratios. Saudi Awwal Bank has added Chainlink’s Cross-Chain Interoperability Protocol (CCIP) and the Chainlink Runtime Environment (CRE) to its digital strategy. CCIP links assets and data across multiple blockchains, while CRE provides banks with a controlled framework to test and deploy new financial applications. The lender, with more than $100 billion in assets, is applying the tools to tokenized assets, cross-border settlement, and automated credit platforms. The move signals that Chainlink’s infrastructure is being adopted at scale inside regulated finance. Related: Chainlink’s Deal with SBI Is a Major Win, But Chart Shows LINK’s Battle at $27 Resistance Wamid Partnership Aims at $2.32 Trillion Markets In parallel, SAB signed an agreement with Wamid, a subsidiary of the Saudi Tadawul Group, to pilot tokenization of the Saudi Exchange’s $2.32 trillion capital markets. The focus is on equities and debt products, opening the door for blockchain-based issuance and settlement. SAB has already executed the world’s first Islamic repo on distributed ledger technology, in collaboration with Oumla earlier this year. That transaction gave regulators a template for compliant on-chain contracts. The Wamid deal builds directly on that precedent, shifting from single-instrument pilots toward broader capital markets integration. Saudi Blockchain Buildout Gains Pace Saudi institutions are building multiple layers of digital infrastructure. Oumla is working with Avalanche to develop the Kingdom’s first domestically hosted Layer 1 blockchain. SAB’s Chainlink adoption adds an interoperability and execution layer on top. Together, these projects are shaping a domestic framework for tokenization, with global connectivity added only where liquidity requires it. LINK Price and Liquidity Snapshot While institutional adoption progresses, Chainlink’s…
Share
BitcoinEthereumNews2025/09/18 08:49
U.S. regulator declares do-over on prediction markets, throwing out Biden era 'frolic'

U.S. regulator declares do-over on prediction markets, throwing out Biden era 'frolic'

Policy Share Share this article
Copy linkX (Twitter)LinkedInFacebookEmail
U.S. regulator declares do-over on prediction
Share
Coindesk2026/02/05 03:49