Challenges, innovations, and the path forward
Table of Content2. Security Evolution
3. The New Defense Playbook
4. Building Better
Read time: 15 minutes
IntroductionThe crypto industry has the power to change the world, but it also faces a paradox: its promise of being decentralized relies on trustless systems, but security breaches highlight how fragile trust can be in practice.
As more people use crypto, security can no longer be just an afterthought: it needs to be part of the infrastructure. We need to increase the credibility of our industry in the public eye, to do this, we need Credible Security. Security that is embedded and verifiable.
This article delves into the changing landscape of crypto security, examining vulnerabilities, trends, and the proactive measures required to protect the decentralized future.
Security LandscapeIn the first quarter of 2024, a total of $826,205,224 was lost across 67 attacks. The following quarter, hackers stole $512,928,000, and this quarter, $463,594,618. Notably, this quarter’s return of only 4.1% of stolen funds, compared to last quarter’s 14.4%, significantly increased the loss.
This makes almost $2 billion worth of assets stolen so far this year. This shift indicates that attacks were, on average, more substantial.
Fig. 1: Asset Stolen has steadily decreased throughout the yearHowever, this quarter represents the lowest amount of recovered or frozen funds in recent memory. Out of all the victims, only three projects were successful in recovering a total of $23.5 million in lost assets. Like in previous quarters, we had hoped that the practice of returning a portion of the stolen funds would continue, but alas!
This trajectory reveals two critical insights:
As shown in the chart above, in 2024, stolen funds grew by 21.07% YoY to $2.2 billion, with hacking incidents rising from 282 in 2023 to 303 in 2024.
Apart from that, the ecosystem was on pace to match the $3 billion+ records of 2021 and 2022 by the end of July. However, growth slowed significantly after July and has since leveled off.
Phishing was the most costly attack vector in Q3 of 2024, with $343,099,650 stolen across 65 incidents. Private key compromises were the second most costly attack vector in Q3 2024, with $324 million stolen across 10 incidents. In total, these top two attack vectors accounted for a total of $668 million stolen.
This quarter also saw code vulnerabilities, reentrancy events, and price manipulation attacks that stood out. In 44 incidents, code vulnerabilities led to the theft of $39,680,651, while reentrancy came in second with $30,353,579 stolen.
Ethereum has been the target of 86 hacks, totaling $387 million.
The Evolution of Crypto SecurityFixing Crypto security flaws has been challenging and has cost more than $14 billion in the last five years. The number of hacks that happen each year is going down, but the damage they do is still big and costs a lot of money. This trend shows that Crypto security is still very new compared to the more established Web2 security standards.
Pivotal incidents that shaped crypto securityThese incidents have pushed for stronger security measures like multi-signature wallets, bug bounty programs, and competitive auditing. However, as decentralized applications (dApps) grow more complex, new vulnerabilities arise, making preventive security measures essential.
Dominant Threats in the Crypto LandscapeCrypto has faced persistent threats since its inception, and many of the early attack vectors are still relevant today. Exploits like stolen private keys, broken access controls, flash loan attacks, price oracle manipulation, and misconfigurations still remain major vulnerabilities in the ecosystem.
These flaws are frequently caused by a combination of poor privilege management, flawed contract logic, and insufficient testing procedures.
Fig. 2: Division of methods that led to significant hackingModern threats of today include:These evolving attack vectors underscore the critical need for proactive and verifiable security measures across the Crypto ecosystem.
Comparing Internet and Crypto AdoptionThe number of Bitcoin users has surpassed 35 million in a decade, more than double the internet’s early growth. Between 2018 and 2023, the number of people using PayPal, Visa, Mastercard, and American Express grew at an annual rate of 8%. However, the number of people who owned cryptocurrencies grew at a compound annual rate (CAGR) of 98%. This means new users and new capital, and a quickly increasing need for security.
Fig. 3: Global crypto ownership growthThe parallels between the internet and crypto adoption are striking. While it took nearly 33 years for the internet to reach 5 billion users, that is 62.5% of the global population, cryptocurrency is on track to achieve a comparable level of adoption within the same period. Consider how the internet transformed the world, and imagine how crypto could similarly revolutionize our lives. Read here about how early tech and internet companies established their moats with security.
However, just as the internet’s growth brought with it phishing attacks, data breaches, and privacy concerns, the rapid expansion of cryptocurrency has also revealed new risks, which we are all too familiar with.
Fig. 5: DeFi adoption vs internet adoption curveWeb2 Security Adoption vs. CryptoWeb2 security frameworks were shaped by incidents such as the Silk Road marketplace and the MySpace worm. The Samy worm, which took advantage of cross-site scripting flaws, showed how easily malicious code could spread through social networks. This made people rethink how to keep websites safe in dynamic environments. Similarly, the Silk Road showed how important strong security frameworks are for stopping illegal activities on the internet, which led to better security features in Web 2.0 applications.
The DAO hack and the Ronin Network attack highlight the importance of proactive security in protecting decentralized ecosystems and their billions of users.
This is the trend that Crypto is following.
How security has changed in Web2 can help us understand how security will change in Crypto. Problems with the old internet led to the creation of the Payment Card Industry Data Security Standard (PCI DSS) and strong anti-malware protocols.
Now, Crypto is also defining its security standards, moving from isolated audits to code transparency, decentralized insurance, proactive security measures, and competitive audits.
Fig. 4: Trends in the Amount Lost Over the Past Ten YearsAs we can see from 2017 to 2021, during the crypto boom and the rise of numerous new projects, the crypto space faced significant challenges with security. The technology’s early-stage vulnerabilities and susceptibility to various attacks largely contributed to the hacking of many projects, resulting in staggering losses.
Since then, the industry has made notable progress. Security researchers, investigators, founders, investors, and projects have increasingly prioritized Crypto security, leading to a significant reduction in the amount stolen.
However, losses still amount to billions annually, highlighting the critical need for more comprehensive tools, robust reviews, and advanced monitoring frameworks to enhance fund recovery and overall security.
The adoption of these measures is essential to maintaining trust and accelerating mass adoption. The industry must come together around standards and frameworks for preventive security.
DeFi’s Transformative RiseThe integration of real-world value on-chain and the widespread adoption of blockchain technologies are two key trends propelling the revolutionary evolution of decentralized finance (DeFi). Tokenized markets, such as the $2 billion tokenized US Treasury market, are bridging traditional finance and blockchain, while on-chain solutions like Base and Ink are revolutionizing the storage, transfer, and use of value.
Base and Ink stand out from other L2 solutions due to their both being incubated by large, well-known CEXs. This is a sign that the future is on-chain.
Millions of new users are using blockchain apps for the first time, as 1 billion cryptocurrency users are projected by 2027. This wave of adoption presents a unique challenge: how to create a safe environment where users can explore technologies without losing their investments to exploits or poorly designed protocols.
Managing Risks in DeFiRecent attacks on cross-chain bridges and tokenization platforms have demonstrated the vulnerabilities inherent in transferring significant value on-chain.
DeFi’s complexity introduces several types of risk:
Developers shouldn’t just rely on smart contract audits to protect the growing number of institutional and retail users. Instead, they should set up clear, safe systems with decentralized oracles, multi-signature wallets, and proactive monitoring tools.
Users should also implement proven security practices such as the use of hardware wallets and two-factor authentication. If either the user or the dApp fails in their attempt to stay secure, TVL goes to 0.
Recent Innovations in Crypto SecurityThe growing complexity of decentralized systems has prompted the creation of numerous new security solutions. Some of the key innovations in this space include:
Next-block Mitigation & Front-running Protection:The goal of these mechanisms is to stop attackers from taking advantage of predictable transaction behaviors. By concealing transaction details or building blocks that prevent malicious transactions from mining first, it offers vital protection against front-running and related exploits.
Fuzzing & Client-Side Monitoring:Fuzz testing has become a crucial tool for smart contract security, involving the use of random or unexpected inputs to uncover hidden vulnerabilities. However, it is important to note that fuzz testing is compute-intensive, requiring significant processing power to explore a wide range of potential edge cases effectively.
Additionally, client-side monitoring has proven highly effective in identifying potential issues in contract interactions with clients, allowing developers to address problems proactively before they escalate.
Fig. 6: Smart contract security life cycleHow Formal Verification Prevents BugsFormal verification is crucial to Crypto security, as shown by the recent compiler-level bug affecting Aave on ZKSync Era. Formal verification tools helped find the problem’s root cause: it was caused by a small optimization flaw in the LLVM compiler that created an incorrect bitmask dimension. This led to incorrect behavior in bit manipulation operations.
A “magic value,” which is a constant value, was hardcoded in the compiler’s optimization routine and caused the bug. This value, which is a 64-bit constant mask meant to clear certain bits, was used incorrectly in the 256-bit ZK-EVM environment. Because the higher-order bits were set to zero in the wrong way, lower-bit flags were cleared during bitwise operations without meaning to.
This example demonstrates how formal verification enables deep, low-level analysis, which traditional testing methods frequently overlook.
Bug Bounty and Audit CompetitionsIn recent years, the industry has grown significantly, which is indicative of how crucial security is becoming in the blockchain space. More than $100 million has been distributed to white-hat hackers through bug bounty and audit platforms thus far.
Platforms like Code4rena, Sherlock, and Cantina are gaining traction by offering pre-deployment security audits, where security researchers review code before it is made public. Together, these platforms have helped uncover over 1600 high-level bugs, over 30,000 unique findings, and secured billions of dollars.
Fig. 7: Growth in Smart Contract Security Service ProvidersNotably, platforms like Code4rena (recently acquired by zellic) are growing rapidly, having conducted over 418 audits to date, with projects like Opensea, Uniswap, and zkSync choosing them over traditional security firms due to the larger number of auditors they attract for reviewing the codebase.
Traditional post-deployment security solutions include bug bounty programs, which offer monetary rewards to ethical hackers who find vulnerabilities. Crypto leaders Immunefi and Hats Finance are setting the standard by providing bug bounty programs and fusing them with competitive audits for a more comprehensive security strategy.
Types of Hacks and Vulnerabilities in Crypto (2024)As Crypto matures, attacker strategies become more complex and focused. As an industry, we can reduce risks and make ourselves more resilient by learning about the most common types of vulnerabilities.
Fig. 8: Top Ten DeFi Attack Vectors in 2024.1. Re-Entrancy AttacksA lot of projects still ask users to “just trust us” in an industry that was built on the idea that people should not need to trust each other. This paradox represents one of blockchain’s most pressing challenges. Think about these common situations:
Each instance introduces trust assumptions that contradict blockchain’s foundational promise: verifiable trust through code. When is crypto going to make good on this promise?
Moving Towards Verifiable, Embedded SecurityIn today’s world, users can only check social media sites like Twitter, Telegram, Discord, or Reddit to find out if the protocol they are using has been hacked. This lack of transparency makes users vulnerable and unaware of potential threats to their funds and data. This is where verifiable security measures play a crucial role in ensuring that users can independently verify the security and integrity of the protocols they interact with.
Traditional trust assumptions frequently rely on a few centralized actors or unverified entities, which contrasts sharply with the ethos of underlying blockchain technology. Its systems may not be open or accountable, putting the industry at risk.
Putting in place verifiable security measures like cryptographic proofs and transparent assertion layers to lower these risks. These let users and developers check security claims on their own without having to rely on central authorities. This is how it appears in real life:
1. Cryptographic ProofsAdditionally, the level at which security guarantees are made is extremely important; for instance, sequencer-level security built right into the base layer is nearly impossible to bypass, making it very effective against hackers.
The more embedded security is, the better.
The “Don’t Trust, Verify” FrameworkBlind trust is greatly reduced when verifiable security is incorporated directly into protocols, creating a culture of do not trust but verify. This strategy strengthens the foundation of transparency and trustworthiness while also improving the overall security framework. Thus, it attracts retail and institutional players who demand higher digital asset security standards.
Modern protocols should enable users to verify:
For developers:
For users:
Enabling users to verify more rather than asking them to trust less is the way of the future for blockchain security. Projects succeeding in this space will:
Make verification accessible to average users.
What we cannot forget is that Crypto security is a never-ending game of cat and mouse between attackers and defenders. Attackers are always coming up with new ways to get around increasingly sophisticated defenses.
The adaptation cycle looks like this:
Attack → Defense → Innovation → New Attack VectorThis cycle serves as an example of an important reality: security is a process of constant adaptation rather than a final destination.
Every time defenses are broken, a new wave of sophisticated attacks comes out. Let us look at some common patterns and trends that have been seen and have had a big impact on the tools, protocols, and frameworks that make the industry strong:
1. Flash Loan Attacks (2020)The security challenges of Crypto are very different from those of Web2. The absence of a central authority in Web3 decentralized systems makes it challenging to retrieve lost money. Web2 platforms, on the other hand, feature a central hub that makes dispute resolution simpler.
Crypto presents special challenges, such as the possibility of decentralized exchange (DEX) vulnerabilities and the risk of 51% attacks on consensus algorithms. As a result, it requires innovative solutions that prioritize transparency and community-driven oversight.
The differences are our strengths and weaknesses at the same time. More focus than ever is needed to solve the paintpoints and make good on the upsides of crypto.
Redefining Proactive Security with Credible LayerProactive security in Crypto demands a shift beyond traditional methods and tools. While AI and machine learning have their place, the real power lies in fundamentally rethinking the integration of security into blockchain systems. It needs to be embedded and verifyable.
This is where the Credible Layer emerges as a groundbreaking solution, preventing hacks at the base layer.
The Credible Layer operates by enforcing provable assertions that allow dApps to define what constitutes a hack for their protocol. The block-building process validates these assertions, ensuring the detection and removal of malicious transactions before execution. Read more about how it works here.
Unlike conventional security measures that rely on reacting to threats, the Credible Layer embeds protection directly into the infrastructure, enabling:
This provable and embedded security model not only addresses immediate vulnerabilities but also builds a foundation of trust and reliability for dApps, protocols, and users alike.
By creating safer blockspace, the Credible Layer transforms security from a reactive afterthought into a proactive guarantee, enabling the blockchain ecosystem to scale with confidence.
Looking toward the next evolution of Crypto, the Credible Layer represents a transformative leap in securing decentralized systems, ensuring that innovation, adoption, and user trust are interdependent. This shift is not just necessary — it’s the cornerstone of blockchain’s future.
This article was created in collaboration with Phylax Systems. Special thanks to their team for their valuable insights and contributions to advancing Web3 security.Better security = more capital = more funds for dApps = more users = mass adoption.For users, enhanced security isn’t just about protecting assets—it's about trust. Cryptographic proofs transform the user experience from blind faith to verifiable confidence, making it as secure as traditional banking.
Thank you for reading ✌