Author: Beosin Foreword This research report, initiated by the Blockchain Security Alliance and co-authored by alliance members Beosin and Footprint Analytics, Author: Beosin Foreword This research report, initiated by the Blockchain Security Alliance and co-authored by alliance members Beosin and Footprint Analytics,

2025 Web3 Security Annual Report: Supply Chain Attacks Become the Biggest Threat

2025/12/30 14:00
12 min read

Author: Beosin

Foreword

This research report, initiated by the Blockchain Security Alliance and co-authored by alliance members Beosin and Footprint Analytics, aims to comprehensively explore the global blockchain security landscape in 2025. Through analysis and assessment of the current state of global blockchain security, the report will reveal the current security challenges and threats, and provide solutions and best practices. Blockchain security and regulation are key issues in the development of the Web3 era. Through in-depth research and discussion in this report, we can better understand and address these challenges to promote the security and sustainable development of blockchain technology.

1. Overview of Web3 Blockchain Security Landscape in 2025

According to Alert, a platform under the blockchain security and compliance technology company Beosin, the total losses in the Web3 space due to hacking, phishing scams, and project rug pulls reached $3.375 billion in 2025. There were a total of 313 major blockchain security incidents, including 191 hacking incidents with total losses of approximately $3.187 billion; project rug pull incidents with total losses of approximately $11.5 million; and 113 phishing scams with total losses of approximately $177 million.

The first quarter of 2025 saw the most significant losses, with the vast majority stemming from the Bybit hack. While the amount of money lost to the hack continued to decline quarter by quarter, it saw a substantial increase compared to 2024, rising by 77.85%. Losses from phishing scams and Rug Pull incidents both decreased significantly compared to 2024, with phishing scam losses decreasing by approximately 69.15% and Rug Pull losses decreasing by approximately 92.21%.

In 2025, the types of projects attacked included DeFi, CEXs, public blockchains, cross-chain bridges, NFTs, Memecoin trading platforms, wallets, browsers, third-party code packages, infrastructure, and MEV bots, among others. DeFi remained the most frequently attacked project type, with 91 attacks targeting DeFi resulting in losses of approximately $621 million. CEXs suffered the highest total losses, with 9 attacks targeting CEXs causing losses of approximately $1.765 billion, accounting for 52.30% of the total losses.

In 2025, Ethereum remained the public blockchain with the highest losses, with 170 security incidents on Ethereum causing approximately $2.254 billion in losses, accounting for 66.79% of the total losses for the year.

In terms of attack methods, the Bybit incident caused approximately $1.44 billion in losses due to supply chain attacks, accounting for 42.67% of the total losses, making it the most damaging attack method. Besides this, contract exploitation was the most frequent attack method, accounting for 62 out of 191 attacks, or 32.46%.

2. Top Ten Security Incidents in 2025

In 2025, there were three security incidents that resulted in losses exceeding $100 million: Bybit ($1.44 billion), Cetus Protocol ($224 million), and Balancer ($116 million). Following these were Stream Finance ($93 million), BTC whales ($91 million), Nobitex ($90 million), Phemex ($70 million), UPCX ($70 million), Ethereum users ($50 million), and Infini ($49.5 million).

Unlike previous years, two of this year's top 10 security incidents involved significant losses for individual users, caused by social engineering/phishing attacks. While these attacks are not the most financially damaging, their frequency is increasing annually, making them a major threat to individual users.

3. Types of projects attacked

Centralized exchanges became the project type with the highest losses.

In 2025, centralized exchanges suffered the most losses, with nine attacks targeting them resulting in approximately $1.765 billion in losses, accounting for 52.30% of the total losses. Bybit suffered the largest loss, approximately $1.44 billion. Other exchanges with significant losses included Nobitex (approximately $90 million), Phemex (approximately $70 million), BTCTurk ($48 million), CoinDCX ($44.2 million), SwissBorg ($41.3 million), and Upbit ($36 million).

DeFi was the most frequently attacked project type, with 91 attacks targeting DeFi resulting in losses of approximately $621 million, ranking second in terms of total losses. Cetus Protocol suffered a loss of approximately $224 million, accounting for 36.07% of all stolen DeFi funds, while Balancer lost approximately $116 million. Other DeFi projects with significant losses included Infini ($49.5 million), GMX ($40 million), Abracadabra Finance ($13 million), Cork Protocol ($12 million), Resupply ($9.6 million), zkLend ($9.5 million), Ionic ($8.8 million), and Alex Protocol ($8.37 million).

4. Loss details for each chain

Ethereum is the blockchain with the highest amount of losses and the most security incidents.

As in previous years, Ethereum remains the public blockchain with the highest amount of losses and the most security incidents. 170 security incidents on Ethereum resulted in losses of approximately $2.254 billion, accounting for 66.79% of the total losses for the year.

The public blockchain ranking second in terms of the number of security incidents is BNB Chain, with 64 security incidents resulting in losses of approximately $89.83 million. While BNB Chain experienced a high number of on-chain attacks, the total amount of losses was relatively small. However, compared to 2024, both the number of security incidents and the amount of losses increased significantly, with the amount of losses increasing by 110.87%.

Base ranks third in terms of the number of security incidents, with a total of 20 incidents. Solana follows closely behind with 19 security incidents.

5. Analysis of attack methods

Contract vulnerability exploitation is the most frequent attack method.

Of the 191 attacks, 62 were contract vulnerability exploits, accounting for 32.46%, resulting in a total loss of $556 million. This was the largest type of attack in terms of financial loss, second only to Bybit's supply chain attack.

According to the breakdown of contract vulnerabilities, the most damaging vulnerability was the business logic vulnerability, which caused a total loss of $464 million. The top three most frequent contract vulnerabilities were business logic vulnerabilities (53 times), access control vulnerabilities (7 times), and algorithm defects (5 times).

There were 20 private key breaches this year, with total losses of approximately $180 million. The number of breaches and the resulting losses are significantly lower than last year. Exchanges, project teams, and users have shown increased awareness of private key protection.

6. Typical Security Incident Attack Analysis

6.1 Analysis of the $224 Million Security Incident Involving the Cetus Protocol

Event Summary

On May 22, 2025, the DEX Cetus Protocol on the Sui ecosystem was attacked. The vulnerability stemmed from an implementation error in the left shift operation within the open-source library code. Taking one of the attack transactions (https://suivision.xyz/txblock/DVMG3B2kocLEnVMDuQzTYRgjwuuFSfciawPvXXheB3x?tab=Overview) as an example, the simplified attack steps are as follows:

1. Enable flash loans: The attacker borrowed 10 million haSUI through flash loans.

2. Create a liquidity position: Open a new liquidity position with a price range of [300000, 300200].

3. Increased Liquidity: Using only 1 unit of haSUI increased liquidity, but yielded a liquidity value of up to 10,365,647,984,364,446,732,462,244,378,333,008.

4. Remove Liquidity: Immediately remove liquidity from multiple transactions to deplete the liquidity pool.

5. Repay Flash Loans: Repay flash loans and retain approximately 5.7 million SUIs as profit.

Vulnerability Analysis

The root cause of this attack lies in an implementation error in the `checked_shlw` function within the `get_delta_a` function, which caused the overflow check to fail. Attackers only need a small number of tokens to exchange for a large amount of assets in the liquidity pool, thus enabling the attack.

As shown in the diagram, `checked_shlw` is used to determine whether shifting the u256 number left by 64 bits will cause an overflow. Input values less than 0xffffffffffffffff << 192 will bypass the overflow detection, but the input value may exceed the maximum value of u256 after shifting left by 64 bits (overflow). `checked_shlw` will still output "no overflow occurred" (false). This will severely underestimate the number of tokens required in subsequent calculations.

Furthermore, in Move, integer arithmetic is designed to prevent overflow and underflow, as these can lead to unexpected behavior or vulnerabilities. Specifically: if the result of addition and multiplication is too large for an integer type, the program will terminate. If the divisor is zero, division will terminate.

The unique feature of left shift (<<) is that it does not stop when an overflow occurs. This means that even if the number of bits shifted exceeds the storage capacity of the integer type, the program will not terminate, which may lead to erroneous values or unpredictable behavior.

6.2 Balancer $116 Million Security Incident Analysis

On November 3, 2025, the Balancer v2 protocol was attacked, resulting in losses of approximately $116 million across multiple blockchains for several projects, including its fork protocol. For example, the attacker's transaction on Ethereum was: 0x6ed07db1a9fe5c0794d44cd36081d6a6df103fab868cdd75d581e3bd23bc9742

1. The attacker first launched an attack transaction through the bulk swap function, using BPT to swap out a large number of liquidity tokens from the pool, causing the pool's liquidity token reserves to become very low.

2. The attackers then began swapping liquidity tokens (osETH/WETH).

3. Then exchange the liquidity tokens back into BPT tokens, and repeat the above operation in multiple pools.

4. Finally, withdraw the money to realize your profit.

Vulnerability Analysis

ComposableStablePools uses Curve's StableSwap invariant formula to maintain price stability among similar assets. However, scaling operations during invariant calculations introduce errors.

The mulDown function performs integer division down to the floor. This precision error is propagated to the calculation of invariants, causing the calculated value to be abnormally low, thus creating an opportunity for attackers to profit.

7. Analysis of Typical Anti-Money Laundering Cases

7.1 US sanctions against drug cartel led by Ryan James Wedding

According to documents disclosed by the U.S. Treasury Department, Ryan James Wedding and his team smuggled tons of cocaine through Colombia and Mexico and sold it to the United States and Canada. Their criminal organization used cryptocurrency to launder money, thereby accumulating a vast amount of illicit wealth.

Using Beosin Trace, an on-chain tracing and investigation tool owned by Beosin, we analyzed the cryptocurrency addresses associated with Wedding's drug trafficking group. The results are shown below:

The addresses held by the three wedding companies, TAoLw5yD5XUoHWeBZRSZ1ExK9HMv2CiPvP, TVNyvx2astt2AB1Us67ENjfMZeEXZeiuu6, and TPJ1JNX98MJpHueBJeF5SVSg85z8mYg1P1, handled a total of 266,761,784.24 USDT. Some of these assets have been frozen by Tether, but most of them have been laundered through high-frequency trading addresses and multi-level transfers, and deposited into platforms such as Binance, OKX, Kraken, and BTSE.

The Sokolovski group holds addresses on multiple blockchain networks (BTC, ETH, Solana, TRON, BNB Beacon Chain), and the analysis of their fund flows can be viewed in the full report.

7.2 GMX $40 million theft case

On July 10, 2025, GMX was compromised due to a reentrancy vulnerability, resulting in hackers profiting approximately $42 million. Beosin Trace's investigation of the stolen funds revealed that the attacker's address, 0x7d3bd50336f64b7a473c51f54e7f0bd6771cc355, used DEX protocols to exchange various stablecoins and altcoins for ETH and USDC after profiting, and then transferred the stolen assets to the Ethereum network through multiple cross-chain protocols.

Subsequently, approximately 32 million ETH of the stolen GMX assets were stored in the following four Ethereum network addresses:

0xe9ad5a0f2697a3cf75ffa7328bda93dbaef7f7e7

0x69c965e164fa60e37a851aa5cd82b13ae39c1d95

0xa33fcbe3b84fb8393690d1e994b6a6adc256d8a3

0x639cd2fc24ec06be64aaf94eb89392bea98a6605

Approximately $10 million in assets were stored on the Arbitrum network at address 0xdf3340a436c27655ba62f8281565c9925c3a5221.

The money laundering path in this incident is very typical. Hackers used DeFi protocols, cross-chain bridges, and other methods to obfuscate and hide the path of funds in order to evade tracking and freezing by regulatory agencies and law enforcement agencies.

8. Summary of Web3 Blockchain Security Landscape in 2025

In 2025, losses from phishing scams and project rug pulls both decreased significantly compared to 2024. However, hacker attacks remained frequent, resulting in losses exceeding $3.1 billion, with exchanges still suffering the highest losses. Meanwhile, security incidents related to private key leaks decreased. The main reasons for this shift include:

Following last year's rampant hacking activities, the entire Web3 ecosystem is placing greater emphasis on security this year. From project teams to security companies, efforts are being made in various aspects, such as internal security operations, real-time on-chain monitoring, increased focus on security audits, and actively learning from past contract vulnerability exploitation incidents. Security awareness is being continuously strengthened in areas such as private key custody and project operational security. As contract vulnerabilities and the theft of private keys become increasingly difficult, hackers are beginning to use other methods, such as supply chain attacks and front-end vulnerabilities, to trick users into transferring assets to addresses controlled by hackers.

Furthermore, with the integration of the crypto market and the traditional market, attack targets are no longer limited to DeFi, cross-chain bridges, and exchanges, but have shifted to a variety of targets such as payment platforms, gambling platforms, crypto service providers, infrastructure, development tools, and MEV bots. The focus of attacks has also shifted to more complex protocol logic flaws.

For individual users, social engineering/phishing attacks and potential coercion pose significant threats to their personal assets. Currently, many phishing attacks go unreported or unrecorded due to the small amounts involved and the victims being individual users, leading to an underestimation of their losses. However, users should raise their awareness of how to prevent such attacks. Furthermore, physical methods of coercion, such as kidnapping, targeting crypto users have occurred repeatedly this year. Users must protect their personal identification information and minimize the public exposure of their crypto assets.

Overall, Web3 security in 2025 still faces significant challenges, and project teams and individual users cannot afford to be complacent. In the future, supply chain security is likely to become paramount for Web3 security. How to continuously protect various infrastructure service providers within the industry and monitor and alert on threats in the supply chain is a major challenge that all parties in the industry need to address collectively. Furthermore, AI-driven social engineering/phishing attacks are likely to continue to increase, necessitating the construction of a multi-layered, real-time, and dynamic defense system, from individual awareness and technological barriers to community collaboration.

Market Opportunity
Best Wallet Logo
Best Wallet Price(BEST)
$0.001421
$0.001421$0.001421
-0.55%
USD
Best Wallet (BEST) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

CEO Sandeep Nailwal Shared Highlights About RWA on Polygon

CEO Sandeep Nailwal Shared Highlights About RWA on Polygon

The post CEO Sandeep Nailwal Shared Highlights About RWA on Polygon appeared on BitcoinEthereumNews.com. Polygon CEO Sandeep Nailwal highlighted Polygon’s lead in global bonds, Spiko US T-Bill, and Spiko Euro T-Bill. Polygon published an X post to share that its roadmap to GigaGas was still scaling. Sentiments around POL price were last seen to be bearish. Polygon CEO Sandeep Nailwal shared key pointers from the Dune and RWA.xyz report. These pertain to highlights about RWA on Polygon. Simultaneously, Polygon underlined its roadmap towards GigaGas. Sentiments around POL price were last seen fumbling under bearish emotions. Polygon CEO Sandeep Nailwal on Polygon RWA CEO Sandeep Nailwal highlighted three key points from the Dune and RWA.xyz report. The Chief Executive of Polygon maintained that Polygon PoS was hosting RWA TVL worth $1.13 billion across 269 assets plus 2,900 holders. Nailwal confirmed from the report that RWA was happening on Polygon. The Dune and https://t.co/W6WSFlHoQF report on RWA is out and it shows that RWA is happening on Polygon. Here are a few highlights: – Leading in Global Bonds: Polygon holds 62% share of tokenized global bonds (driven by Spiko’s euro MMF and Cashlink euro issues) – Spiko U.S.… — Sandeep | CEO, Polygon Foundation (※,※) (@sandeepnailwal) September 17, 2025 The X post published by Polygon CEO Sandeep Nailwal underlined that the ecosystem was leading in global bonds by holding a 62% share of tokenized global bonds. He further highlighted that Polygon was leading with Spiko US T-Bill at approximately 29% share of TVL along with Ethereum, adding that the ecosystem had more than 50% share in the number of holders. Finally, Sandeep highlighted from the report that there was a strong adoption for Spiko Euro T-Bill with 38% share of TVL. He added that 68% of returns were on Polygon across all the chains. Polygon Roadmap to GigaGas In a different update from Polygon, the community…
Share
BitcoinEthereumNews2025/09/18 01:10
SHIB Price Analysis for February 8

SHIB Price Analysis for February 8

The post SHIB Price Analysis for February 8 appeared on BitcoinEthereumNews.com. Original U.Today article Can traders expect SHIB to test the $0.0000070 range soon
Share
BitcoinEthereumNews2026/02/09 00:26
UK Looks to US to Adopt More Crypto-Friendly Approach

UK Looks to US to Adopt More Crypto-Friendly Approach

The post UK Looks to US to Adopt More Crypto-Friendly Approach appeared on BitcoinEthereumNews.com. The UK and US are reportedly preparing to deepen cooperation on digital assets, with Britain looking to copy the Trump administration’s crypto-friendly stance in a bid to boost innovation.  UK Chancellor Rachel Reeves and US Treasury Secretary Scott Bessent discussed on Tuesday how the two nations could strengthen their coordination on crypto, the Financial Times reported on Tuesday, citing people familiar with the matter.  The discussions also involved representatives from crypto companies, including Coinbase, Circle Internet Group and Ripple, with executives from the Bank of America, Barclays and Citi also attending, according to the report. The agreement was made “last-minute” after crypto advocacy groups urged the UK government on Thursday to adopt a more open stance toward the industry, claiming its cautious approach to the sector has left the country lagging in innovation and policy.  Source: Rachel Reeves Deal to include stablecoins, look to unlock adoption Any deal between the countries is likely to include stablecoins, the Financial Times reported, an area of crypto that US President Donald Trump made a policy priority and in which his family has significant business interests. The Financial Times reported on Monday that UK crypto advocacy groups also slammed the Bank of England’s proposal to limit individual stablecoin holdings to between 10,000 British pounds ($13,650) and 20,000 pounds ($27,300), claiming it would be difficult and expensive to implement. UK banks appear to have slowed adoption too, with around 40% of 2,000 recently surveyed crypto investors saying that their banks had either blocked or delayed a payment to a crypto provider.  Many of these actions have been linked to concerns over volatility, fraud and scams. The UK has made some progress on crypto regulation recently, proposing a framework in May that would see crypto exchanges, dealers, and agents treated similarly to traditional finance firms, with…
Share
BitcoinEthereumNews2025/09/18 02:21