TRM Labs Report: 75 Crypto Attacks in First Half of 2025 Result in Over $2.1 Billion Losses

·

TRM Labs' mid-2025 cybersecurity report reveals alarming trends in cryptocurrency attacks, with 75 major incidents causing over $2.1 billion in losses during the first six months of the year. This marks the highest half-year total on record, demonstrating escalating threats in decentralized finance (DeFi) and centralized exchanges.

Key Findings from the 2025 Crypto Threat Landscape

The Bybit Heist: Largest Single Attack

The most devastating incident involved a suspected North Korean-linked breach of Bybit exchange, resulting in $1.5 billion in stolen assets. This single attack comprised:

MetricValue
Percentage of total 2025 losses71%
Attack duration6 hours
Assets targetedBTC, ETH, and stablecoins

Emerging Threat Patterns

  1. Geopolitical warfare expansion:

    • The Nobitex attack (June 2025) saw Israel-affiliated groups steal $90M from Iranian exchange
    • 60% of nation-state attacks targeted cross-border transactions
  2. Social engineering evolution:

    • Phishing schemes now average 42% success rate
    • Multi-chain attacks increased 300% YoY

👉 Learn how to secure your crypto assets

Protective Measures Recommended by TRM Labs

For exchanges:

For individual users:

FAQ: Understanding the 2025 Crypto Threat Landscape

Q: Why has 2025 seen record attack numbers?
A: The combination of improved blockchain analytics detecting more attacks and sophisticated new attack methodologies has driven numbers upward.

Q: How does the $2.1B loss compare to previous years?
A: This represents a 140% increase over H1 2024 ($875M) and exceeds all of 2023's total losses ($1.9B).

Q: Are DeFi or CeFi platforms more vulnerable?
A: While DeFi protocols see more frequent attacks (60% of incidents), centralized exchanges suffer larger individual losses (82% of total value).

👉 Essential crypto security tools

The Path Forward: Industry-Wide Security Enhancements

TRM Labs emphasizes three critical need areas:

  1. Global cooperation: Establishing cross-border cybersecurity task forces
  2. Education initiatives: Developer security certification programs
  3. Technological safeguards:

    • AI-powered anomaly detection
    • Decentralized identity solutions
    • Real-time transaction monitoring

The report concludes with an urgent call to action for all blockchain participants to prioritize security measures commensurate with these evolving threats.