As we delve into the first quarter of 2024, the landscape of crypto security reveals both persistent challenges and emerging trends in the midst of a bull run. From substantial financial losses to innovative recovery efforts, the crypto space continues to evolve amidst an environment of heightened threat activity. Our report aims to uncover the key findings of the quarter, providing valuable insights and recommendations to fortify the security of Web3 businesses.
While access control breaches remained prevalent, flash loans and smart contract vulnerabilities also emerged as significant attack vectors. Hackers are continually adapting their tactics to exploit vulnerabilities across multiple fronts.
In 2024, increased hacking activity and losses compared to 2023 can be attributed to the bullish market sentiment driving heightened activity and the emergence of vulnerable protocols in ‘’under-discovered” vectors like gaming, tokenization, and new dApps.
Security incidents spanned a wide range of project types, from tokens to gaming platforms and decentralized exchanges. This diversity underscores the pervasive nature of security threats across the entire Web3 ecosystem.
In Q1, over $443 million was successfully recovered or frozen from crypto hacks, amounting to 54% of the stolen funds. This represents a significant improvement in the industry’s responsiveness. Despite one standout incident involving PlayDapp, Web3 projects collectively managed to recover 23% of stolen funds, showcasing proactive measures from both teams and white hat hackers.
During Q1, only 44% of Web3 projects underwent smart contract audits, leaving vulnerabilities unresolved in 56% of cases. Exploits often occurred post-audit due to new code deployments or upgrades, highlighting the need for continuous security monitoring and updated audit scopes. Audits are crucial, but they don’t guarantee immunity; ongoing monitoring and security-first approaches are essential for risk mitigation.
Access these and other insights in the full report.
Our report showcases in-depth case studies of two significant incidents: Shido and ALI. Here’s a brief summary of the attacks.
The Shido Protocol suffered a major exploit due to an access control vulnerability, resulting in the loss of over $35 million. This incident underscores the critical importance of robust access controls and security restrictions.
The ALI token incident exemplifies the swift response and collaboration within the Web3 community, highlighting the efficacy of proactive measures in mitigating the impact of security breaches.
For a detailed analysis, access the full report.
As we navigate the evolving landscape of crypto security, proactive measures and collaborative efforts are critical for safeguarding the integrity of the Web3 ecosystem. By prioritizing security, fostering a culture of vigilance, and embracing comprehensive security practices, businesses can mitigate risks and build a more resilient future in the crypto space.
Be the first to receive our latest company updates, Web3 security insights, and exclusive content curated for the blockchain enthusiasts.
Table of contents
Tell us about your project
10 min read
Insights