{"id":23755,"date":"2025-05-07T17:45:41","date_gmt":"2025-05-07T14:45:41","guid":{"rendered":"https:\/\/forklog.com\/en\/expert-highlights-inadequate-cybersecurity-progress-in-crypto-projects\/"},"modified":"2025-05-07T17:45:41","modified_gmt":"2025-05-07T14:45:41","slug":"expert-highlights-inadequate-cybersecurity-progress-in-crypto-projects","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/expert-highlights-inadequate-cybersecurity-progress-in-crypto-projects\/","title":{"rendered":"Expert Highlights Inadequate Cybersecurity Progress in Crypto Projects"},"content":{"rendered":"<p>Even the loss of nearly $1.5 billion from the February <a href=\"https:\/\/u1f987.com\/en\/news\/bybit-exchange-suffers-1-46-billion-loss-in-hack\">Bybit hack<\/a> failed to prompt industry participants to change their approach to cybersecurity issues. This was stated by Hacken CEO Dima Budorin in an interview with <a href=\"https:\/\/cointelegraph.com\/news\/hacken-ceo-crypto-security-april-hacks-360-million-token2049\">Cointelegraph<\/a>.<\/p>\n<p>The industry continues to rely on a limited set of measures such as bounty programs or penetration tests. However, this is categorically insufficient, the expert believes.<\/p>\n<p>According to him, crypto companies need to adopt a more multi-layered approach, similar to that used in traditional industries. This includes supply chain security, operational risks, and their assessment considering blockchain specifics.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cIn large Web2 companies, this is mandatory,\u201d Budorin clarified.<\/p>\n<\/blockquote>\n<p>He also acknowledged that certain changes in security have occurred following the largest hack in the industry&#8217;s history.<\/p>\n<p>For instance, Chainalysis has started maintaining a blacklist of wallets interacting with stolen assets almost in real-time. Previously, it took the firm up to three days after a transaction to mark addresses.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cAnd this was obviously pointless, as hackers had enough time to launder the stolen money through exchanges,\u201d Budorin noted.<\/p>\n<\/blockquote>\n<p>After the unauthorized withdrawal of $1.46 billion from Bybit, the perpetrators \u201ccleaned\u201d the coins in about ten days. They actively <a href=\"https:\/\/u1f987.com\/en\/news\/bybit-ceo-over-half-of-stolen-assets-remain-traceable\">used<\/a> mixers such as CryptoMixer, Tornado Cash, and Railgun, as well as platforms like Wasabi, THORChain, eXch, Lombard, LI.FI, Stargate, and SunSwap.<\/p>\n<p>According to PeckShield, the industry lost $357.11 million in April due to 18 hacker attacks.<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/PeckShieldAlert?src=hash&#038;ref_src=twsrc%5Etfw\">#PeckShieldAlert<\/a> In April 2025, 18 major crypto hacks were recorded, resulting in $357.11M in total losses. Notably, <a href=\"https:\/\/twitter.com\/zksync?ref_src=twsrc%5Etfw\">@zksync<\/a>, <a href=\"https:\/\/twitter.com\/KiloEx_perp?ref_src=twsrc%5Etfw\">@KiloEx_perp<\/a>, and <a href=\"https:\/\/twitter.com\/term_labs?ref_src=twsrc%5Etfw\">@term_labs<\/a> recovered a combined $14.4M of stolen funds.<br \/>Top 5 Hacks in April 2025 <br \/>\u2014<a href=\"https:\/\/twitter.com\/hashtag\/BTC?src=hash&#038;ref_src=twsrc%5Etfw\">#BTC<\/a> unauthorized transfer: $330.7M <br \/>\u2014<a href=\"https:\/\/twitter.com\/KiloEx_perp?ref_src=twsrc%5Etfw\">@KiloEx_perp<\/a>\u2026 <a href=\"https:\/\/t.co\/y0ve1cRshS\">pic.twitter.com\/y0ve1cRshS<\/a><\/p>\n<p>\u2014 PeckShieldAlert (@PeckShieldAlert) <a href=\"https:\/\/twitter.com\/PeckShieldAlert\/status\/1919997403895398609?ref_src=twsrc%5Etfw\">May 7, 2025<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The increase compared to March was 990%. However, the majority of the damage\u2014$330.7 million\u2014was linked to the theft of <a href=\"https:\/\/u1f987.com\/en\/news\/alleged-bitcoin-theft-of-330-million-boosts-monero-price\">3520 BTC<\/a> from an elderly investor in the US. Scammers used social engineering methods to phish the crypto wallet.<\/p>\n<p>Other major incidents in April included attacks on the DeFi protocol <a href=\"https:\/\/u1f987.com\/en\/news\/hacker-loopscale-offers-to-return-5-8-million-for-a-reward\">Loopscale<\/a> ($5.8 million) and the ZKsync airdrop smart contract (<a href=\"https:\/\/u1f987.com\/en\/news\/zksync-reaches-agreement-with-hacker-for-return-of-5-million\">~$5 million<\/a>).<\/p>\n<p>PeckShield specialists noted the increasing prevalence of phishing schemes, confirming <a href=\"https:\/\/u1f987.com\/en\/news\/phishing-accounts-for-92-of-aprils-crypto-crime-revenue\">CertiK&#8217;s findings<\/a>.<\/p>\n<p>Since the beginning of 2024, losses from crypto hacks have <a href=\"https:\/\/u1f987.com\/en\/news\/cryptocurrency-industry-faces-3-83-billion-loss-from-hacks-since-2024\">exceeded $3.83 billion<\/a>, with centralized exchanges and DeFi services being the main targets for hackers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Even the loss of nearly $1.5 billion from the February Bybit hack failed to prompt industry participants to change their approach to cybersecurity issues. This was stated by Hacken CEO Dima Budorin in an interview with Cointelegraph. The industry continues to rely on a limited set of measures such as bounty programs or penetration tests. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":23754,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1111,1138],"class_list":["post-23755","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity","tag-opinions"],"aioseo_notices":[],"amp_enabled":true,"views":"12","promo_type":"","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/23755","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=23755"}],"version-history":[{"count":0,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/23755\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/23754"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=23755"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=23755"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=23755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}