The Rising Tide of Crypto Hacks: BlockDivers Mission

The cryptocurrency and digital asset industry is at a pivotal moment. With groundbreaking developments like BlackRock’s Bitcoin ETFs, the tokenization of Real-World Assets (RWAs), and the rise of stablecoin transactions, the market is rapidly evolving. By the end of 2024, the total market capitalization of crypto reached $3.2 trillion, with DeFi’s total value locked (TVL) returning to its 2021 peak at $134 billion. However, this growth has also made the industry an increasingly attractive target for sophisticated cyberattacks, threatening its stability and trustworthiness. That is where we step in, BlockDivers. 

At BlockDivers, our mission is to safeguard the integrity of the digital asset ecosystem by providing cutting-edge forensic analysis and blockchain intelligence. We empower businesses, institutions, and law enforcement with actionable insights to combat fraud, trace illicit activities, and ensure transparency in the evolving world of cryptocurrency.

The surge in crypto adoption has introduced new vulnerabilities and expanded attack surfaces. As the notorious Jesse James said, we rob the banks because that’s where the money is! Below are the key drivers behind the rising number of hacks:

  • Higher Transaction Volumes: As blockchain transactions grow, attackers find more lucrative targets. The financial incentives to exploit these systems have never been higher.
  • Surge in Users & Wallets: The global cryptocurrency user base grew by nearly 40 million in late 2024. Each new wallet or account represents a potential entry point for attackers.
  • More dApp Interactions: Decentralized applications (dApps) often have vulnerabilities in smart contracts and front-end systems, exposing users to phishing attacks and developers to bugs or improper admin access.
  • Expanding API Usage: APIs are essential for automated crypto services but can expose sensitive systems if poorly designed or inadequately secured.
  • Entry of New Market Players: New entrants often lack robust security practices, making them easier targets for attackers.
  • AI in the Wrong Hands: Attackers are leveraging AI to scale exploits like deepfake social engineering and advanced phishing campaigns, leading to significant financial losses.

Traditional cybersecurity measures are insufficient to address the unique challenges posed by crypto-related attacks. Unlike conventional cyberattacks that focus on indirect monetization through data theft or ransom, crypto hacks aim for direct monetization by exploiting financial applications and operational workflows. To secure the next billion users, organizations must address vulnerabilities across both end-user and organizational layers.

Key Areas of Vulnerability

  1. End-User Vulnerabilities
    • Phishing Attacks: Sophisticated phishing campaigns trick users into signing malicious transactions or revealing private keys.
    • Address Poisoning: Attackers manipulate wallet addresses in transaction data to redirect funds to malicious accounts.
  2. Organizational Vulnerabilities
  1. Personnel Risks: Insider threats, fake recruiting schemes, and spear-phishing attacks target employees with access to critical systems.
  2. API Exploits: Poorly secured APIs can be abused to steal credentials and compromise operational workflows.
  3. Operational Workflow Weaknesses: Blind signing practices, fake deposit attacks, private key exploits, and supply chain vulnerabilities expose organizations to significant risks.

I wrote about the Lazarus hack a few weeks ago. The Lazarus group exemplifies the sophistication of modern crypto attackers. In one notable case, Lazarus compromised a Safe (wallet) developer’s machine and deployed malicious code into Bybit’s wallet User Interface. This allowed them to manipulate transactions through blind signing practices, ultimately stealing $1.5 billion from Bybit.

Another example involves a DeFi protocol’s compromised Twitter account being used to promote a fake token launch. This led an asset management firm’s portfolio manager to connect their account to a phishing dApp and sign a malicious transaction. The attacker gained control over the firm’s assets, resulting in a seven-figure loss.

Our virtual asset recovery firm, BlockDivers, is working on a case right now where a malicious phishing scam tricked our client, a savvy crypto investor, into using is seed phrase to unlock his cold storage wallet. Three minutes later all his crypto assets were gone.

To mitigate these risks, crypto organizations must adopt advanced security measures tailored to their unique challenges:

  • Strengthen API Security: Ensure APIs are rigorously tested for vulnerabilities and protected against unauthorized access.
  • Enhance Personnel Screening: Implement robust hiring processes to prevent fake candidates from infiltrating organizations.
  • Educate Users: Provide comprehensive training on identifying phishing attempts and securing wallets.
  • Adopt Advanced Key Management Systems (KMS): Protect private keys with multi-layered security protocols.
  • Monitor Supply Chains: Regularly audit third-party vendors for security compliance.

As crypto adoption continues to grow, so does its attractiveness as a target for hackers. Organizations must prioritize security innovations that address both technical vulnerabilities and human factors. The future of crypto depends on building trust through robust protections that safeguard users and institutions alike from increasingly sophisticated attack vectors.