Cryptocurrency hacks and thefts: Insecure exchanges?

Cryptocurrency exchanges continue to be a target of hackers – and theft is the prize.

On February 21, the cryptocurrency exchange Bybit reported that an Ethereum transaction was transferred to an unidentified address, resulting in the theft of $1.5 billion in Ethereum cryptocurrency. 

This is one in a long list of substantial cryptocurrency hacks and thefts. Chainalysis reports that more than $1.7 billion in cryptocurrency was stolen in 2023 and more than $3.8 billion in 2022. Since the hack resulting in the theft of $473 million in Bitcoin from the Mt. Gox exchange in 2011, theft and fraud have continued to be a serious risk in the cryptocurrency arena. Recent examples include the hack and theft of $477 million in cryptocurrency from the FTX exchange in November 2022; the hack and theft of $570 million in cryptocurrency from the Binance exchange in October 2022; the hack and theft of $625 million in cryptocurrency from the Ronin Network in March 2022; the hack and theft of $611 million in cryptocurrency from the Poly Network In August 2021; and the hack and theft of $532 million in cryptocurrency from the Coincheck exchange in January 2018.

It should not be surprising that cryptocurrency exchanges are a target for hacks, fraud, and theft. Cryptocurrency as a whole continues to occupy a gray space between existing frameworks for the financial industry and rapidly evolving developments in new technologies and in the way they are regulated. Well-established requirements have become more complex in crypto. Examples include Know Your Customer – better known as “KYC,” monitoring for criminal activity, reporting suspicious activity, or even determining which jurisdiction has authority over taxation or legal enforcement. Then there are examples that might be described tongue-in-cheek as “we have no law for your crime.” This includes whether entities with the power to insert, omit, or reorder blockchain transactions are performing activities that constitute market manipulation.

Cryptocurrency is built on blockchain technology, and is ostensibly secure. Like any other digital system, however, security is dependent upon the coding, the security controls and the personnel overseeing the process. Is all cryptocurrency secure? Of course not – one only has to consider the billions that have been stolen since its inception. 

Can it be secure? Of course, but like any other digital system, it depends on many moving parts. At the system level, due diligence can root out only so much regarding the actual product and the cryptocurrency exchange information security program. Investors must also exercise care about their own digital security. Malicious actors regularly engage in social engineering through phishing attacks during which they may deploy software to monitor keystrokes and obtain user account names and passwords. They monitor public wi-fi networks and continually look for means of access to cryptocurrency accounts. They also attempt to compromise consumer phones by social engineering phone service providers, persuading them to transfer consumer phone numbers to the malicious actor’s subscriber identity module – called a SIM swap. SIM swaps allow the malicious actors to manipulate and bypass multi-factor authentication, reset passwords, and continue the fraud and theft affecting cryptocurrency exchanges.  

For both cryptocurrency exchanges and individuals, many principles of security do not, and should not, change simply because they involve cryptocurrency. These include enabling two-factor authentication wherever possible, limiting sharing of private keys/account information, being cautious on public networks, and avoiding common pitfalls of scams (including looking out for fake websites or URLs, and not engaging with unsolicited offers and communications with unusually high-pressure tactics or demands).

In order to reduce the fraud and theft affecting cryptocurrency exchanges in 2025, exchanges must continuously review and enhance their information security programs, and cryptocurrency investors and users must ensure that their own information security practices are improved.  Investors and users should also consider removing their cryptocurrency from exchanges – which will continue to be the target of hacks and theft - and use Cold Wallets and Hardware Wallets to increase the security of their funds.

The Constangy Cybersecurity & Data Privacy team assists businesses of all sizes and industries with implementing necessary updates to their privacy and compliance programs to address these complex and evolving issues. If you would like additional information on how to prepare your organization, contact us directly at cyber@constangy.com.

  • Sean Hoar in a dark pinstriped suit, light blue shirt, and patterned tie, smiling confidently against a transparent background. His posture and attire suggest a professional or corporate setting.
    Partner

    Sean is a former cyber attorney for the U.S. Department of Justice, where he served as the lead cyber attorney for the U.S. Attorney's Office in Oregon and worked with the Computer Crime & Intellectual Property Section in Washington ...

  • Ryan  Steidl
    Partner

    He advises clients on compliance with a wide range of state, federal, and international privacy laws, helping them develop and implement business-focused data protection strategies that reduce legal risk and align with ...

The Constangy Cyber Advisor posts regular updates on legislative developments, data privacy, and information security trends. Our blog posts are informed through the Constangy Cyber Team's experience managing thousands of data breaches, providing robust compliance advisory services, and consultation on complex data privacy and security litigation. 

Search

Get Updates By Email

Subscribe

Archives

Jump to Page

Constangy, Brooks, Smith & Prophete, LLP Cookie Preference Center

Your Privacy

When using this website, Constangy and certain third parties may collect and use cookies or similar technologies to enhance your experience. These technologies may collect information about your device, activity on our website, and preferences. Some cookies are essential to site functionality, while others help us analyze performance and usage trends to improve our content and features.

Please note that if you return to this website from a different browser or device, you may need to reselect your cookie preferences.

For more information about our privacy practices, including your rights and choices, please see our Privacy Policy. 

Strictly Necessary Cookies

Always Active

Strictly Necessary Cookies are essential for the website to function, and cannot be turned off. We use this type of cookie for purposes such as security, network management, and accessibility. You can set your browser to block or alert you about these cookies, but if you do so, some parts of the site will not work. 

Functionality Cookies

Always Active

Functionality Cookies are used to enhance the functionality and personalization of this website. These cookies support features like embedded content (such as video or audio), keyword search highlighting, and remembering your preferences across pages—for example, your cookie choices or form inputs during submission.

Some of these cookies are managed by third-party service providers whose features are embedded on our site. These cookies do not store personal information and are necessary for certain site features to work properly.

Performance Cookies

Performance cookies help us improve our website by collecting and reporting information on its usage. We access and process information from these cookies at an aggregate level.

Powered by Firmseek