DeFi loses $169M in Q1 as Circle pushes for quantum security – Details

ambcryptoОпубліковано о 2026-04-07Востаннє оновлено о 2026-04-07

Анотація

DeFi security in Q1 saw $169 million lost across 34 protocols, primarily to operational weaknesses rather than cryptographic failures. Key compromises and permission errors accounted for a majority of attacks, with 63% linked to access control issues. While immediate threats remain execution-based, long-term quantum risks are gaining attention. Circle is proactively adopting Post-Quantum Cryptography (PQC), and new chains like Arc are building quantum-resistant features natively to avoid future upgrade challenges. Legacy chains, however, face slow adoption due to scalability and coordination hurdles, with significant value still locked in incumbent systems. The market currently prioritizes liquidity and usability, delaying broader PQC transition despite rising future threats.

Crypto security in 2026 is shifting, yet the threat pattern still reflects practical weaknesses rather than cryptographic failure. Attacks now target how systems operate, as access control gaps and key management errors remain easier to exploit. This shift occurs because attackers follow the simplest path, where operational flaws offer faster returns than breaking encryption.

DeFiLlama data shows $169 million lost across 34 protocols in Q1, reinforcing this pattern. Incidents such as a $40 million key compromise and Resolv’s $24.5 million breach show how control layers are becoming primary targets. At the same time, SlowMist reports that permission failures are responsible for 63% of DeFi-related attacks.

This dynamic reshapes risk perception, as users face execution-layer threats today, while firms like Circle prepare for future cryptographic risks, balancing immediate defense with long-term resilience.

Circle moves early on Quantum security risk

Notably, Circle is moving early on Post-Quantum Cryptography (PQC), and that shift reflects how security priorities are changing across the market. Arc L1 is building PQC into its base layer, which avoids the need for complex upgrades later. This matters because existing networks already carry exposure, with about 6.7 million Bitcoin [BTC], nearly one-third of the supply, sitting in vulnerable addresses.

Source: Quantumai Whitepaper

This risk persists because address reuse remains common, while upgrades require long coordination cycles. Past changes like SegWit and the Merge took years, showing how slow adaptation can be.

This explains why Circle is acting now to reduce future disruption. For current users, however, the risk is being felt gradually, which means adoption may be slow until mounting pressure drives broader change.

Arc embeds PQC as legacy chains face upgrade challenges

Such a shift exposes a deeper divide in how networks handle future risk, as design choices begin to matter more than upgrades. Arc embeds PQC from the start, which removes the need for large-scale coordination later. This approach emerges because legacy systems already operate at scale, with Bitcoin handling 550,000–590,000 daily addresses and Ethereum [ETH] near 385,000.

Source: Glassnode

However, that scale creates inertia, since upgrades must align millions of users, wallets, and contracts. Past changes like SegWit and the Merge took years, showing how difficult system-wide shifts become. This means retrofitting PQC could introduce friction and fragmentation.

Arc reduces this risk through design, yet incumbents retain over $94 billion in Locked Value. This balance indicates that users prioritize liquidity in the present, while long-term security may drive gradual structural changes.

That said, Circle’s quantum push strengthens long-term security, yet impact depends on timing, as markets still prioritize liquidity and usability over distant cryptographic threats.


Final Summary

  • Post-Quantum Cryptography (PQC) emerges as a forward security layer, yet current crypto risks remain driven by operational exploits, not cryptographic failure.
  • PQC adoption depends on timing, as markets prioritize liquidity today, delaying transition despite long-term systemic risk.

Пов'язані питання

QWhat was the total amount lost in DeFi during Q1 according to DeFiLlama data, and how many protocols were affected?

AAccording to DeFiLlama data, $169 million was lost across 34 protocols in Q1.

QWhat percentage of DeFi-related attacks does SlowMist report are due to permission failures?

ASlowMist reports that permission failures are responsible for 63% of DeFi-related attacks.

QWhy is Circle moving early on Post-Quantum Cryptography (PQC), and what risk does it address?

ACircle is moving early on Post-Quantum Cryptography (PQC) to reduce future disruption from quantum computing threats, which could break current encryption. This addresses the risk that approximately 6.7 million Bitcoin (nearly one-third of the supply) sits in addresses vulnerable to a quantum attack.

QWhat is a key advantage of Arc L1 blockchain embedding PQC into its base layer from the start?

AA key advantage of Arc L1 embedding PQC into its base layer from the start is that it avoids the need for complex, large-scale coordination upgrades later, which are difficult and slow for legacy systems.

QAccording to the article's final summary, what is the primary driver of current crypto risks, and what is prioritized by markets today over long-term security?

AAccording to the final summary, the primary driver of current crypto risks is operational exploits, not cryptographic failure. Markets today prioritize liquidity and usability over distant cryptographic threats, delaying the transition to quantum-resistant security.

Пов'язані матеріали

North Korean Hackers Loot $500 Million in a Single Month, Becoming the Top Threat to Crypto Security

North Korean hackers, particularly the notorious Lazarus Group and its subgroup TraderTraitor, have stolen over $500 million from cryptocurrency DeFi platforms in less than three weeks, bringing their total theft for the year to over $700 million. Recent major attacks on Drift Protocol and KelpDAO, resulting in losses of approximately $286 million and $290 million respectively, highlight a strategic shift: instead of targeting core smart contracts, attackers are now exploiting vulnerabilities in peripheral infrastructure. For instance, the KelpDAO attack involved compromising downstream RPC infrastructure used by LayerZero's decentralized validation network (DVN), allowing manipulation without breaching core cryptography. This sophisticated approach mirrors advanced corporate cyber-espionage. Additionally, North Korea has systematically infiltrated the global crypto workforce, with an estimated 100 operatives using fake identities to gain employment at blockchain companies, enabling long-term access to sensitive systems and facilitating large-scale thefts. According to Chainalysis, North Korean-linked hackers stole a record $2 billion in 2025, accounting for 60% of all global crypto theft that year. Their total historical crypto theft has reached $6.75 billion. Post-theft, they employ specialized money laundering methods, heavily relying on Chinese OTC brokers and cross-chain mixing services rather than standard decentralized exchanges. Security experts, while acknowledging the increased sophistication, emphasize that many attacks still exploit fundamental weaknesses like poor access controls and centralized operational risks. Strengthening private key management, limiting privileged access, and enhancing coordination among exchanges, analysts, and law enforcement immediately after an attack are critical to improving defense and fund recovery chances. The industry's challenge now extends beyond secure smart contracts to safeguarding operational security at the infrastructure level.

marsbit29 хв тому

North Korean Hackers Loot $500 Million in a Single Month, Becoming the Top Threat to Crypto Security

marsbit29 хв тому

Circle CEO's Seoul Visit: No Korean Won Stablecoin Issuance, But Met All Major Korean Banks

Circle CEO Jeremy Allaire's recent activities in Seoul indicate a strategic shift for the company, moving away from issuing a Korean won-backed stablecoin and instead focusing on embedding itself as a key infrastructure provider within Korea’s financial and crypto ecosystem. Despite Korea accounting for nearly 30% of global crypto trading volume—with a market characterized by high retail participation and altcoin dominance—Circle has chosen not to compete for the role of stablecoin issuer. Instead, Allaire met with major Korean banks (including Shinhan, KB, and Woori), financial groups, leading exchanges (Upbit, Bithumb, Coinone), and tech firms like Kakao. This approach reflects a broader industry transition: the core of stablecoin competition is shifting from issuance rights to systemic positioning. With Korean regulators still debating whether banks or tech companies should issue stablecoins, Circle is avoiding regulatory uncertainty by strengthening its role as a service and technology partner. The company is deepening integration with trading platforms, building connections, and promoting stablecoin infrastructure. This positions Circle to benefit regardless of which entity eventually issues a won stablecoin. Allaire also noted the potential for a Chinese yuan stablecoin in the next 3–5 years, underscoring a regional trend of stablecoins becoming more regulated and integrated with traditional finance. Ultimately, Circle’s strategy highlights that future influence in the stablecoin market will belong not necessarily to the issuers, but to the foundational infrastructure layers that enable cross-system transactions.

marsbit57 хв тому

Circle CEO's Seoul Visit: No Korean Won Stablecoin Issuance, But Met All Major Korean Banks

marsbit57 хв тому

SpaceX Ties Up with Cursor: A High-Stakes AI Gambit of 'Lock First, Acquire Later'

SpaceX has secured an option to acquire AI programming company Cursor for $60 billion, with an alternative clause requiring a $10 billion collaboration fee if the acquisition does not proceed. This structure is not merely a potential acquisition but a strategic move to control core access points in the AI era. The deal is designed as a flexible, dual-path arrangement, allowing SpaceX to either fully acquire Cursor or maintain a binding partnership through high-cost collaboration. This "option-style" approach minimizes immediate regulatory and integration risks while ensuring long-term alignment between the two companies. At its core, the transaction exchanges critical AI-era resources: SpaceX provides its Colossus supercomputing cluster—one of the world’s most powerful AI training infrastructures—while Cursor contributes its AI-native developer environment and strong product adoption. This synergy connects compute power, models, and application layers, forming a closed-loop AI capability stack. Cursor, founded in 2022, has achieved rapid growth with over $1 billion in annual revenue and widespread enterprise adoption. Its value lies in transforming software development through AI agents capable of coding, debugging, and system design—positioning it as a gateway to future software production. For SpaceX, this move is part of a broader strategy to evolve from a aerospace company into an AI infrastructure empire, integrating xAI, supercomputing, and chip manufacturing. Controlling Cursor fills a gap in its developer tooling layer, strengthening its AI narrative ahead of a potential IPO. The deal reflects a shift in AI competition from model superiority to ecosystem and entry-point control. With programming tools as a key battleground, securing developer loyalty becomes crucial for dominating the software production landscape. Risks include questions around Cursor’s valuation, technical integration challenges, and potential regulatory scrutiny. Nevertheless, the deal underscores a strategic bet: controlling both compute and software development access may redefine power dynamics in the AI-driven future.

marsbit1 год тому

SpaceX Ties Up with Cursor: A High-Stakes AI Gambit of 'Lock First, Acquire Later'

marsbit1 год тому

Торгівля

Спот
Ф'ючерси
活动图片