Crypto Santa’s Naughty List — List of Top Heists in 2025

ccn.com发布于2025-12-25更新于2025-12-25

文章摘要

Crypto Santa’s Naughty List: 2025 was a record-breaking year for crypto theft, with total losses estimated between $4–5 billion. North Korean hacking groups, particularly Lazarus, were responsible for over 60% of stolen funds. The largest single heist was the February Bybit breach, where $1.5 billion was stolen via a compromised multi-signature wallet. Other major incidents included a $200–400 million Coinbase insider breach, a $90–100 million attack on Iran’s Nobitex, a $48–50 million hot wallet exploit at BtcTurk, and a $91 million phishing scam against an individual Bitcoin holder. The year highlighted growing threats from state-backed actors, sophisticated social engineering, and vulnerabilities in both centralized and DeFi platforms.

Key Takeaways

  • 2025 was one of the most profitable years on record for crypto scammers, with losses topping $4 billion.
  • The February Bybit breach became the largest centralized exchange hack in history, draining more than $1.5 billion.
  • North Korea–linked hacking groups were responsible for over 60% of the year’s stolen crypto.

As 2025 comes to a close, the crypto industry is taking stock of a year defined by sharp contrasts.

On one side were record-breaking ETF inflows, growing institutional adoption, and long-awaited regulatory clarity.

On the other hand, there was a relentless surge in hacks, scams, and state-backed cybercrime that quietly drained billions from the ecosystem.

This year marked a grim milestone. More than $3 billion in crypto was stolen in the first half alone—already exceeding the total losses recorded in all of 2024.

By year-end, estimates place total losses closer to $4–$5 billion, driven by a mix of high-profile exchange breaches, DeFi exploits, and an explosion in increasingly sophisticated phishing campaigns.

At the center of it all were well-organized threat actors.

North Korea–linked hacking groups emerged as the most prolific offenders, accounting for the majority of stolen funds.

Their operations grew more advanced, blending malware, social engineering, and AI-assisted phishing to target both centralized platforms and decentralized protocols.

What follows is a breakdown of 2025’s biggest crypto heists, the groups behind them, and the structural weaknesses they exposed.

Consider it crypto’s year-end “naughty list”—not just a tally of losses, but a look at the lessons the industry is being forced to learn heading into 2026.

Earn Crypto with These Top Mining Apps
Sponsored
Disclosure
We sometimes use affiliate links in our content, when clicking on those we might receive a commission at no extra cost to you. By using this website you agree to our terms and conditions and privacy policy.
"}' data-trk="67d19e1ff74d32de176c1b03" href="https://www.miningrigrentals.com?ref=2742248" rel="nofollow" target="_blank">
Mining Rig Rentals<\/h3>"}' data-trk="67d19e1ff74d32de176c1b03" href="https://www.miningrigrentals.com?ref=2742248" rel="nofollow" target="_blank">

Mining Rig Rentals

promotions
Earn a commission on your referral\u2019s transactions.<\/strong>"}' data-trk="67d19e1ff74d32de176c1b03" href="https://www.miningrigrentals.com?ref=2742248" rel="nofollow" target="_blank"> Earn a commission on your referral’s transactions.
Coins
6
Claim Offer
"}' data-trk="67d19ee2f74d32de176c1b5f" href="https://hashing24.com/?rid=53616c7465645f5fe8657fbf16217f483baff299e53f4db4" rel="nofollow" target="_blank">
Hashing24<\/h3>"}' data-trk="67d19ee2f74d32de176c1b5f" href="https://hashing24.com/?rid=53616c7465645f5fe8657fbf16217f483baff299e53f4db4" rel="nofollow" target="_blank">

Hashing24

promotions
Earn 3-10% on referral purchases<\/strong>"}' data-trk="67d19ee2f74d32de176c1b5f" href="https://hashing24.com/?rid=53616c7465645f5fe8657fbf16217f483baff299e53f4db4" rel="nofollow" target="_blank"> Earn 3-10% on referral purchases
Coins
Claim Offer
"}' data-trk="67d1a119f74d32de176c1be1" href="https://accounts.binance.com/en/register?ref=DTDJBNX1" rel="nofollow" target="_blank">
Binance Pool<\/h3>"}' data-trk="67d1a119f74d32de176c1be1" href="https://accounts.binance.com/en/register?ref=DTDJBNX1" rel="nofollow" target="_blank">

Binance Pool

promotions
Sign up, verify, deposit 100 USDT, get 100 USDT bonus<\/strong>"}' data-trk="67d1a119f74d32de176c1be1" href="https://accounts.binance.com/en/register?ref=DTDJBNX1" rel="nofollow" target="_blank"> Sign up, verify, deposit 100 USDT, get 100 USDT bonus
Coins
5
Claim Offer

Bybit Exchange Hack (February 21, 2025 – ~$1.46–1.5 Billion Lost)

North Korea’s Lazarus Group orchestrated the largest single cryptocurrency theft in history by exploiting the Bybit exchange.

Hackers compromised a third-party multi-signature wallet interface by injecting malware into the signing process, tricking approvers into redirecting over 400,000 ETH from Bybit’s cold wallet.

Funds were rapidly laundered across chains using bridges and mixers.

This incident alone accounted for nearly 70% of first-half losses, triggering market dips, regulatory scrutiny, and a reevaluation of third-party dependencies in exchange infrastructure.

The hack shook global markets, and the BTC price dipped 8%.

Although Bybit reimbursed users, it faced lawsuits due to security lapses. The incident highlighted the risks associated with cold wallet exchanges.

Coinbase Insider Breach (March 2025 – $200-400 Million)

The incident involved an employee leaking API keys and insider information about individuals for bribes.

As a result, unknown hackers drained hot wallets. However, it wasn’t a full-fledged direct exploit but enabled targeted thefts.

Coinbase pledged reimbursements, and it led to enhanced insider vetting industry-wide.

Nobitex Exchange Attack (June 2025 – ~$90–100 Million)

Iran’s largest crypto platform fell victim to a politically motivated breach, attributed to hacktivist group “Predatory Sparrow” in retaliation against the regime.

Hot wallets were drained, with funds partially “burned” or frozen—highlighting rare geopolitical hacks amid rising nation-state involvement.

BtcTurk Hot Wallet Exploit (August- $48—$50 Million)

In August 2025, BtcTurk, a Turkish CEX, suffered its second major hack in a little over a year.

This time, the attackers stole an estimated $48 million from the exchange’s hot wallets.

The 2025 attack on BtcTurk was a less expensive mirror of its June 2024 incident.

In both cases, the attacker gained access to the private keys used to manage the protocol’s hot wallets.

With this access, the attackers were able to drain funds from these wallets.

In 2024, the CEX lost approximately $55 million, while the more recent incident resulted in roughly $48 million being stolen from the exchange across seven blockchains.

These funds were then consolidated into a few different accounts.

Individual BTC Phishing (August-$91 Million)

In August 2025, a cryptocurrency investor was defrauded of 783 BTC (valued at approximately $91 million at the time) through a sophisticated social engineering phishing scam.

This incident is considered one of the largest individual Bitcoin losses due to this type of attack.

The scammers convinced the victim to provide sensitive access credentials or their seed phrase, allowing them to drain the entire 783 BTC from the wallet in a single transaction within minutes.

Visit Our Stablecoin Partners
  • Trade with Stablecoins Here Are Our Top Exchanges for Stablecoins
  • Buy Stablecoins Fast & Easy Buy Stablecoins & Crypto With a Credit Card
  • Bet with Stablecoins Top Crypto Casinos that Accept Stablecoins

相关问答

QWhat was the total estimated value of cryptocurrency stolen in 2025 according to the article?

AThe total losses were estimated to be between $4 and $5 billion.

QWhich group was responsible for the largest single cryptocurrency theft in history in 2025, and which exchange did they target?

ANorth Korea's Lazarus Group was responsible for the theft, and they targeted the Bybit exchange, stealing an estimated $1.46 to $1.5 billion.

QWhat percentage of the year's stolen crypto was attributed to North Korea-linked hacking groups?

ANorth Korea-linked hacking groups were responsible for over 60% of the year's stolen crypto.

QWhat was the nature of the Coinbase breach in March 2025, and how much was lost?

AThe Coinbase breach was an insider incident where an employee leaked API keys and insider information for bribes, enabling targeted thefts that resulted in losses between $200 and $400 million.

QWhat was unique about the Nobitex Exchange attack in June 2025 compared to other heists mentioned?

AThe Nobitex attack was a politically motivated breach attributed to the hacktivist group 'Predatory Sparrow' in retaliation against the Iranian regime, making it a rare example of a geopolitical hack.

你可能也喜欢

从生存到加速发展:ZODL创始人亲述Zcash三年崛起之路

Zcash(ZEC)在经历三年深度调整后,从治理僵局与增长困境中强势崛起,实现了从生存到加速发展的转变。其创始人回顾了关键突破点: 首先,治理枷锁被打破。旧有模式将20%区块奖励固定分配给少数机构,导致激励扭曲。随着ECC主动放弃直接资助并推动NU6升级,资金分配改为社区主导的追溯性模式,同时商标协议终止,治理垄断被彻底破除。 其次,产品战略转向用户增长。团队从专注底层技术研发,转向开发用户真正需要的产品,如默认匿名、易用的Zodl钱包。这直接推动了匿名池资产占比从11%大幅增长至31%,匿名交易占比达到86.5%,体现了真实用户对隐私自托管的信任。 再者,叙事定位得以重塑。Zcash摆脱了易受监管打击的“隐私币”标签,重新定位为“隐私货币”,构建了协议、资产、应用门户的“三位一体”清晰框架,为其获得更广泛的交易所、ETF及机构支持铺平了道路。 最后,组织架构完成蜕变。原ECC团队脱离非营利组织的束缚,成立ZODL并成功融资2500万美元,以创业公司模式加速产品开发与规模化。 目前,ZEC价格与市场情绪显著提升,社区讨论焦点已转向产品与技术。未来工作将集中于提升钱包用户体验、通过Tachyon项目实现高可扩展性,以及推进后量子安全准备,致力于使Zcash更快、更易用且更具未来安全性。

marsbit11分钟前

从生存到加速发展:ZODL创始人亲述Zcash三年崛起之路

marsbit11分钟前

五种对手方风险架构:加密交易所TradFi五模型分类的结算层方法论

本报告是币贝研究院此前发布的《加密交易所 TradFi 扩张:五模型分类框架》的伴侣篇,将分析焦点转向五种架构中“对手方风险持有者”这一核心维度。报告旨在揭示,在不同压力情境下,损失由谁的资产负债表首先吸收,这是评估各类架构稳健性的根本问题。 报告逐一剖析了五种对手方风险架构及其对应的历史失败模式: 1. **模型1:稳定币发行方与CEX自持仓**。用户面临稳定币(如USDT)发行方储备挤兑风险与交易所自身偿付能力的双重考验。 2. **模型2:CFD经纪商资产负债表**。在B-book模式下,经纪商是用户直接对手方。不同监管辖区(如ESMA强制负余额保护,而毛里求斯FSC不强制)决定了损失由经纪商承担还是转嫁给客户。 3. **模型3:链下托管与转让代理链**。资产实际由链下实体持有,其资产负债表健康状况、公司治理及用户协议条款(如Celsius案中明确转移资产所有权的条款)是用户能否取回资产的关键。 4. **模型4:DEX保险基金与被动减仓(ADL)机制**。协议无传统对手方,损失由预存的保险基金承担,不足时通过ADL机制强制平仓盈利方头寸来分摊,其稳健性取决于预言机设计和规则参数。 5. **模型5:受监管中央对手方(CCP)**。制度化程度最高,拥有多层预存资源(如违约基金)和清晰的损失分担流程,但在极端压力下仍可能动用撤销交易(如LME镍事件)或支持负价格结算(如CME原油事件)等非典型工具。 报告强调,监管差异与对手方风险分配是同一制度选择的两种表述,并非简单的因果关系。最后,报告为每种架构提炼出一组可观察的结构性指标(观察清单),用于在压力事件发生时进行归因分析,而非预测具体失败概率。本研究不构成投资建议。

marsbit28分钟前

五种对手方风险架构:加密交易所TradFi五模型分类的结算层方法论

marsbit28分钟前

Zcash上涨1500%,其最大支持者解释原因

据Zcash主要支持者乔希·斯威哈特分析,ZEC价格约1500%的飙升并非偶然,而是2023至2024年间在治理、产品、叙事和组织结构上进行多年重置的成果。 他指出,三年前ZEC价格约30美元,仅不到11%的供应量被屏蔽(shielded),且社区陷于治理争议。如今ZEC价格约600美元,约31%的供应量被屏蔽,用户控制的屏蔽钱包持有价值超30亿美元,且屏蔽交易占比在三月中旬达到86.5%。 **治理重置成为核心**:2024年,Electric Coin Co.宣布不再接受直接资助,打破了原有核心机构长期获得固定区块奖励的格局。网络升级6取消了直接资助,将8%奖励导向社区赠款,12%放入协议控制的锁箱,供ZEC持有者追溯奖励为生态创造价值的贡献者。同时,商标协议的终止消除了ECC和Zcash基金会对协议的潜在否决权,使治理更加去中心化。 **产品重心回归用户与屏蔽使用**:ECC于2024年1月将重点转向用户增长。默认屏蔽的钱包Zodl(原Zashi)于2024年3月推出,带动屏蔽供应量从约11%升至2025年底的约30%。钱包自10月起处理了超6亿美元的ZEC互换,反映了真实用户对隐私和自托管的选择。 **叙事从“隐私币”转向“不可阻挡的私人货币”**:这一新定位使Zcash更易被机构理解,吸引了如Robinhood上线、Multicoin披露持仓、Grayscale提交ETF申请及Foundry推出矿池等进展。 **组织重组与融资**:2026年1月,ECC团队脱离后成立了Zcash开放开发实验室(ZODL),并获得了Paradigm、a16z crypto等机构2500万美元融资,旨在以初创公司的速度和资本推动大规模消费者产品开发。 近期重点包括提升用户体验、可扩展性(目标将区块时间从75秒降至25秒)及后量子安全准备。斯威哈特总结,Zcash将变得更快、更易用、功能更丰富、可扩展性更强并具备后量子安全性。 截至发稿时,ZEC交易价格为570.36美元。

bitcoinist2小时前

Zcash上涨1500%,其最大支持者解释原因

bitcoinist2小时前

交易

现货
合约

热门文章

如何购买S

欢迎来到HTX.com!我们已经让购买Sonic(S)变得简单而便捷。跟随我们的逐步指南,放心开始您的加密货币之旅。第一步:创建您的HTX账户使用您的电子邮件、手机号码注册一个免费账户在HTX上。体验无忧的注册过程并解锁所有平台功能。立即注册第二步:前往买币页面,选择您的支付方式信用卡/借记卡购买:使用您的Visa或Mastercard即时购买Sonic(S)。余额购买:使用您HTX账户余额中的资金进行无缝交易。第三方购买:探索诸如Google Pay或Apple Pay等流行支付方法以增加便利性。C2C购买:在HTX平台上直接与其他用户交易。HTX场外交易台(OTC)购买:为大量交易者提供个性化服务和竞争性汇率。第三步:存储您的Sonic(S)购买完您的Sonic(S)后,将其存储在您的HTX账户钱包中。您也可以通过区块链转账将其发送到其他地方或者用于交易其他加密货币。第四步:交易Sonic(S)在HTX的现货市场轻松交易Sonic(S)。访问您的账户,选择您的交易对,执行您的交易,并实时监控。HTX为初学者和经验丰富的交易者提供了友好的用户体验。

2.2k人学过发布于 2025.01.15更新于 2025.03.21

如何购买S

相关讨论

欢迎来到HTX社区。在这里,您可以了解最新的平台发展动态并获得专业的市场意见。以下是用户对S(S)币价的意见。

活动图片