Understanding Hacks' Impact on Crypto Exchanges

Explore top LinkedIn content from expert professionals.

  • View profile for Marc Vanlerberghe

    Chief Strategy & Marketing Officer Algorand Foundation | Board Director | Advisor

    3,966 followers

    This wasn't your garden variety hack. It was a highly sophisticated, potentially nation state directed, attack on a very reputable exchange. With laser precision the attackers hacked into the devices of multi sig signers to present a false UI, which caused the signers to sign what they thought was a routine transaction on their hardware Ledger device. Three key lessons emerge from this: 1. Complexity breeds risk. Ethereum's approach of making everything a smart contract (token, multisig, atomic swap, etc.) creates a lot of complexity that can lead to security vulnerabilities like this. The transaction that was executed changed the account ownership in the smart contract, but that information was not communicated in human readable form on the Ledger device. The Ledger app can't possible explain everything every Ethereum smart contract tries to do. On #Algorand, key features such as ownership re-keying or multisig or tokens, are not implemented as smart contracts but available as part of the Algorand Virtual Machine. As a result Ledger will recognize them and provide proper human readable context to the signer, hereby reducing the risk of mistakes. 2. Poor UX has major financial implications. The crypto industry continues to suffer from poor UX. Transaction sign requests very often fail to explain in clear terms what the user is signing off on. This has to change if we want to have any hope of mainstream users adopting blockchain technology. Blockchain networks, protocols, and hardware wallets will need to work together to come up with new standards to tackle this issue. 3. Operational excellence is even more important than in TradFi. Everyone makes mistakes. Even in traditional banking people make mistakes and send the wrong wires. But most often, these mistakes can be undone and wires reversed. Not so in crypto. So operational excellence is key. This means making sure that signers verify hashes before signing off on a transaction. But it also means safeguards are put in place to prevent large sums from being transferred instantly without extra (centralized) check. Always great reporting from Andy Greenberg and Lily Hay Newman at WIRED: https://lnkd.in/gKApvEew

  • View profile for Ari Redbord

    Global Head of Policy and Government Affairs at TRM Labs

    30,358 followers

    🚨 New TRM Labs Data Drop: Spoiler - 2025 is already a record setting year for hacks. In just the first half of 2025, over $2.1 billion has been stolen in 75+ hacks, marking the largest H1 total ever — up 10% from 2022’s record and nearly matching all of 2024. The average hack now tops $30 million, double last year’s. That surge was led by the Bybit hack in February — a $1.5 billion theft we assess was carried out by North Korea, the largest crypto hack in history. It alone accounts for nearly 70% of total losses, and helps explain why North Korea-linked groups stole $1.6 billion in H1 — more than any other actor by far. This is no longer just cybercrime — it's statecraft. Our data shows DPRK continues to exploit crypto theft to evade sanctions and fund weapons development. Meanwhile, other state-linked actors are entering the fray: in June 2025, alleged Israeli group Gonjeshke Darande (Predatory Sparrow) hacked Iran’s Nobitex exchange, stealing $90 million and sending funds to unspendable vanity addresses — a clear political statement, not a financial one. 👨💻How the hacks are happening: 🔨 Infrastructure attacks — including private key theft and front-end compromises — made up 80% of losses, and were 10x larger than other attacks. ✨ DeFi protocol exploits — like flash loans and reentrancy — accounted for 12%, underscoring persistent smart contract vulnerabilities. 🙋♀️ What it means: H1 2025 marks a turning point. Crypto hacks are now part of geopolitical conflict, with state actors using theft as a tool of foreign policy. Defenses must go beyond audits and MFA — we need industry-wide insider threat detection, advanced social engineering defenses, and state-level response coordination. 🛣️ The way forward: Only a global, coordinated effort—across law enforcement, regulators, and blockchain intelligence—can keep pace. As crypto intersects more deeply with national security, the threats are no longer theoretical. They're operational. Read the full report in the comments ⬇️

  • Bybit, one of the world's biggest crypto exchanges, just lost a staggering $1.5 billion in Ethereum. Not because of some complex software bug. Not because cryptography failed. But because actual humans got tricked. What happened? Hackers sent convincing phishing emails to employees who controlled Bybit's cold wallets. When these folks went to approve what looked like a routine transaction, they had no idea what they were actually seeing had been manipulated. Instead of sending funds to legitimate destinations, they unknowingly transferred $1.5 billion straight to the attackers. This is the reality of most successful cyberattacks today, they don't break through security systems, they simply work around them by exploiting human trust. And it's not just crypto. These tactics work everywhere. A cleverly designed phishing email, a convincing deepfake voice call, or a subtly altered invoice is sometimes all it takes. Once someone's trust is compromised, even the best security measures become useless. When technology can't stop human deception, comprehensive cybersecurity training becomes the critical shield protecting your entire organization.

  • View profile for Swapnil Deshmukh

    Cybersecurity Leader | AppSec & Threat Modeling Expert | Driving SSDLC & Developer Enablement

    3,072 followers

    Research about Bybit Hack: A Wake-Up Call for Crypto Security The recent Bybit hack, resulting in a loss of over $1.5 billion, has sent shockwaves through the crypto community. This sophisticated attack, attributed to the Lazarus Group, exploited vulnerabilities in smart contracts and multi-sig wallets. This incident serves as a stark reminder that even the most secure platforms can be compromised. As crypto users, we must remain vigilant and take proactive steps to protect our assets. Key Takeaways: 1. Smart Contract Risks: Smart contracts, while innovative, can contain hidden vulnerabilities. Always exercise caution and only interact with audited contracts. 2. Multi-Sig Security: Multi-sig wallets offer enhanced security but aren't foolproof. Ensure robust key management practices and be wary of social engineering attacks. 3. Stay Informed: The crypto landscape is constantly evolving. Stay updated on the latest security threats and best practices. Remember: Security is a shared responsibility. By staying informed and taking proactive measures, we can collectively strengthen the crypto ecosystem and safeguard our digital assets.

Explore categories