
The cryptocurrency industry witnessed more than $ 3.1 billion of losses during the first half of 2025, already exceeding the total of 2024.
According to a report published by Hackeen Blockchain Security, the number reflects the continuous weaknesses through both decentralized and central financing platforms, driven by outdated code doors, arrival control defects, and the increasing complexity of artificial intelligence.
The exploits of arrival control are still the main cause of financial damage, as it contributed about 59 % of the total losses, while smart contract errors constituted about $ 273 million.
Although the BIP incident worth $ 1.5 billion in February stands out as a major event, it does not obscure the fact that the industry still faces wide security palaces.
The Hacken Forensic Team noticed a frequent theme in 2025: Human and procedural errors are now a more frequent attack point than the encryption weaknesses.
Old infrastructure and operational weakness
The head of the forensic medical medicine, Yehor Rudytsia, indicated that the rules of the older code remained active goals for the attackers, with the GMX V1 platform as a major example.
Roditia said that the ancient structure of the protocol began facing exploitation in the third quarter of 2025.
The operating weaknesses also played a prominent role, representing about $ 1.83 billion of losses in DEFI and CEFI. The most prominent issue was a breach of $ 223 million on CETUS, the Defi platform, during the second quarter. The exploitation has been tracked to twice the surplus in liquidity accounts.
Using a flash loan, the attacker opened hundreds of small situations across 264 bathrooms. Hacken analysts suggested that TVL monitoring actual time with automatic stopping mechanisms may prevent up to 90 % of the money from drain.
AI and APIS are not safe to complicate to web3 safety
The integration of artificial intelligence tools into WeB3 projects added another layer of complexity into the security environment. According to the Hakin report, there was a 1025 % increase in the prosecution attacks compared to 2023.
Nearly 99 % of these accidents included unsafe application programming facades, making them one of the most used attack surfaces today. As of mid -2015, 34 % of web3 projects use artificial intelligence agents in living environments, which increases their risk such as typical hallucinations, immediate injection and data poisoning.
Hakin also highlighted that current safety standards such as ISO/IEC 27001 and the NIST Cyber Security Frame were not sufficiently equipped to deal with these AI’s threats. The report called for the governance and updated risk models that can be better explained by advanced weaknesses in smart systems.
With the emergence of the most advanced threat tankers and the increasingly dependent on the attackers on automation and social engineering, the demand for pre -emptive and adaptive security mechanisms in the encryption sector has grown significantly.
A distinctive image created with Dall-E, the tradingView chart

Editing process For Bitcoinist, it is focused on providing accurate, accurate and non -biased content. We support strict resource standards, and each page is subject to a diligent review by our team of senior technology experts and experienced editors. This process guarantees the integrity of our content, importance and value of our readers.