It is every cryptocurrency project’s nightmare: Well-resourced hackers — perhaps backed by a rogue state such as North Korea — strike out of nowhere, dismantling cyberdefenses and making off with millions of dollars in customer funds.
Many crypto outfits have been permanently damaged this way. Yet across the industry, start-ups strapped for cash after a prolonged funding drought have cut security spending even as soaring digital-asset prices tempt hackers, firms that sift through code for weaknesses have found.
That leaves the cryptosphere vulnerable as the number of exploits targeting the industry skyrockets, undermining efforts to establish it as a viable alternative to traditional finance. In particular, hackers linked to North Korea, among the most sophisticated in the business, are showing no signs of letting up.
“The only way to stop exploits is to stop them from happening in the first place. That means hardening cyberdefenses,” said Ari Redbord, global head of policy at TRM Labs, which uses blockchain forensics to track crypto crimes.
Hacks and scams cost the crypto industry an estimated US$1.8 billion last year, down about 50 percent from 2022, said Immunefi, which runs a platform where companies offer bounties to those who locate and flag security flaws in their software.
A drop in the very biggest heists, such as the roughly US$600 million one related to blockchain game Axie Infinity two years ago, explains why the total value fell, but the number of incidents almost doubled, to 319, Immunefi said.
Lazarus Group, associated with North Korea, accounted for nearly one-fifth of total losses, Immunefi data showed.
A separate report from Chainalysis Inc in January showed that the number of North Korea-linked crypto hacks jumped to a record last year.
Crypto thieves have stalked the industry almost since its inception. In what remains perhaps the most famous incident to date, Japan-based Bitcoin exchange Mt. Gox was struck in 2011. Over time, the hackers made off with tokens worth billions of dollars based on the current market price.
Mt.Gox eventually went bankrupt and its users have yet to recover their losses.
As the number of blockchains and projects built upon them multiplied over the following years, so did the target surface area for hackers. Exploits mushroomed, creating a lucrative niche for security firms and “white-hat” hackers who earn bounties reaching into the millions of dollars for uncovering crypto vulnerabilities.
“When you have a really big incident, when you lose customer funds — you are either well funded enough that you or your investors can bail out your customers, or you don’t reimburse your users,” said Oliver Horr, director of operations at security firm Hats Finance. “Obviously if you don’t reimburse them, your product is dead, but both outcomes are pretty devastating.”
Despite the stakes, many firms find themselves having to make tough choices. While there is not any data tracking code-auditing spending by crypto firms, executives at outfits that provide such services say demand has cooled.
Even after the cost of a typical crypto audit dropped roughly 50 percent since 2022 to about US$20,000 per week, “projects are still unable to afford that,” said Hind Kurhan, who in September founded security auditing firm Thesis Defense and aims to establish an industry standard for audits.
At crypto-auditing start-up Halborn, “inbound interest” dropped 60 percent last year, CEO Robert Behnke said.
Rates for auditing a type of smart contract built on the Ethereum blockchain fell as much as 20 percent, he said.
Diligence, the auditing arm of ConsenSys, has seen the waiting time for its security screenings shrink.
Some companies are forgoing labor-intensive manual code audits in favor of using less-precise automated tools to scan for weaknesses, security experts say.
To be sure, audits are no guarantee that cyber defenses will hold.
Euler Finance, a decentralized lending protocol, was drained of almost US$200 million in cryptocurrencies by hackers in March last year, even after being audited “at great expense,” founder Michael Bentley said.
North Korea in particular poses a formidable threat to the industry.
The UN Security Council’s Panel of Experts said in a report this month that it is investigating 58 suspected cyberattacks by North Korean leader Kim Jong-un’s regime on crypto-related companies that took place between 2017 and last year and were valued at about US$3 billion, which “reportedly help to fund the country’s development of weapons of mass destruction.”
North Korean hacks were 10 times as damaging as those linked to other thieves, TRM said in a January report.
In June alone, Lazarus was responsible for high-profile heists targeting crypto companies Alphapo, CoinsPaid and Atomic Wallet, the FBI said.
“Over the last few years we have seen North Korea attack crypto projects at alarming speed and scale,” Redbord said. “It is absolutely critical that if you are building today in the crypto space — centralized or decentralized — that cybersecurity is foundational infrastructure.”
Taiwan Semiconductor Manufacturing Co (TSMC, 台積電), the world’s largest contract chipmaker, yesterday said its materials management head, Vanessa Lee (李文如), had tendered her resignation for personal reasons. The personnel adjustment takes effect tomorrow, TSMC said in a statement. The latest development came one month after Lee reportedly took leave from the middle of last month. Cliff Hou (侯永清), senior vice president and deputy cochief operating officer, is to concurrently take on the role of head of the materials management division, which has been under his supervision, TSMC said. Lee, who joined TSMC in 2022, was appointed senior director of materials management and
Gudeng Precision Industrial Co (家登精密), the sole extreme ultraviolet pod supplier to Taiwan Semiconductor Manufacturing Co (台積電), yesterday said it has trimmed its revenue growth target for this year as US tariffs are likely to depress customer demand and weigh on the whole supply chain. Gudeng’s remarks came after the US on Monday notified 14 countries, including Japan and South Korea, of new tariff rates that are set to take effect on Aug. 1. Taiwan is still negotiating for a rate lower than the 32 percent “reciprocal” tariffs announced by the US in April, which it later postponed to today. The
MAJOR CONTRIBUTOR: Revenue from AI servers made up more than 50 percent of Wistron’s total server revenue in the second quarter, the company said Wistron Corp (緯創) on Tuesday reported a 135.6 percent year-on-year surge in revenue for last month, driven by strong demand for artificial intelligence (AI) servers, with the momentum expected to extend into the third quarter. Revenue last month reached NT$209.18 billion (US$7.2 billion), a record high for June, bringing second-quarter revenue to NT$551.29 billion, a 129.47 percent annual increase, the company said. Revenue in the first half of the year totaled NT$897.77 billion, up 87.36 percent from a year earlier and also a record high for the period, it said. The company remains cautiously optimistic about AI server shipments in the third quarter,
Nvidia Corp CEO Jensen Huang (黃仁勳) on Thursday met with US President Donald Trump at the White House, days before a planned trip to China by the head of the world’s most valuable chipmaker, people familiar with the matter said. Details of what the two men discussed were not immediately available, and the people familiar with the meeting declined to elaborate on the agenda. Spokespeople for the White House had no immediate comment. Nvidia declined to comment. Nvidia’s CEO has been vocal about the need for US companies to access the world’s largest semiconductor market and is a frequent visitor to China.