Amberdata Blog

The $2B Problem: 2025's Security Crisis in Numbers

Written by Michael Marshall | May 4, 2026

This is Section 12, excerpted from our Amberdata Crypto Market Review 2025 and 2026 Outlook: Six Regimes, One Story. Our full report spans 14 sections - ETF flows, derivatives, on-chain, liquidity, and our complete 2026 outlook.

Bybit, Lazarus Group, and the hack timeline that changed everything.

KEY TAKEAWAYS

  • $2.09 billion stolen in 2025 - the largest year on record. Eight major incidents resulted in total losses exceeding $2 billion. The Bybit hack alone accounted for 70% of that total at $1.46 billion. This surpassed 2022's previous record and demonstrated that crypto's security problem continues to grow with the market.
  • State-sponsored actors dominated. North Korea's Lazarus Group ($1.46B via Bybit) and Iran's Predatory Sparrow ($90M via Nobitex) were responsible for over 74% of total losses. These nation-state hackers represent a fundamentally different threat than opportunistic attackers - they have unlimited patience, sophisticated capabilities, and no fear of prosecution.
  • Bybit triggered Regime 2 (Security Shock). The February 21 hack didn't just steal funds - it defined a market regime. BTC dropped 19.6% during R2 as exchange outflows spiked and institutional confidence wavered. The hack demonstrated that even major, regulated exchanges remained vulnerable to sophisticated attacks.
  • Security crisis accelerated regulatory clarity. Within weeks of Bybit, the SEC paused enforcement actions and accelerated ETF improvements. The security crisis didn't derail institutional adoption - it demonstrated the need for regulated infrastructure and proper custody solutions, pushing regulators toward action rather than litigation.

February 21, 2025: Bybit loses $1.46 billion to North Korea's Lazarus Group - the largest hack in crypto history. Within weeks, the SEC drops enforcement cases against major exchanges and accelerates ETF approvals. The connection wasn't coincidental. The security crisis became a regulatory catalyst. State-sponsored hackers had inadvertently demonstrated what enforcement actions couldn't: crypto's institutional infrastructure needed proper regulation, not litigation. Here's how 2025's $2 billion security problem reshaped both the threat landscape and the regulatory response.

Figure 12.1: 2025 Hack Timeline - Eight major incidents mapped against BTC price with regime shading. The Bybit hack (February 21) stands out both for scale ($1.46B) and impact - it defined Regime 2. Note the clustering of DeFi exploits in the middle of the year and the late-year Balancer incident during the fragile recovery.

The Bybit Attack: February 21, 2025

Largest Hack in History. The largest hack in cryptocurrency history didn't target a vulnerable DeFi protocol or an obscure exchange. It targeted Bybit - one of the world's largest centralized exchanges with sophisticated security infrastructure. The Lazarus Group, North Korea's elite state-sponsored hacking unit, compromised Bybit's hot wallet system and extracted $1.46 billion in a single operation.

Attack Vector. The attack vector was devastating in its sophistication. Lazarus didn't exploit a smart contract bug or trick users with phishing. They compromised the exchange's internal systems directly, gaining access to private keys through a combination of social engineering and zero-day exploits. The funds were immediately routed through a complex web of mixers and cross-chain bridges, making recovery virtually impossible. Within 48 hours, the stolen assets had been laundered through dozens of intermediary wallets and converted to Monero.

Market Response. The market response was swift and severe. BTC dropped over 15% in the week following the hack. Exchange outflows spiked as users moved assets to self-custody. Bybit's trading volume collapsed as liquidity providers and market makers reduced exposure. The incident triggered Regime 2 (Security Shock), which lasted through the end of February. The regime was defined not by macroeconomic factors or regulatory news, but by a single security event that shattered confidence in centralized exchange custody.

Bybit survived, but the industry was changed. The exchange's reserves were sufficient to cover the loss, and they continued operations after implementing emergency security measures. However, the incident demonstrated that no exchange - regardless of size, reputation, or security investment - was immune to state-sponsored attacks. The question wasn't whether exchanges could be hacked, but whether the industry had proper infrastructure to minimize damage and maintain confidence when hacks occurred.

$1.46B

Stolen from Bybit by North Korea's Lazarus Group - the largest single hack in crypto history. This represented 70% of all funds stolen in 2025 and triggered the Security Shock regime that defined February's market action.

The Attack Vectors: CEX vs DeFi vs DEX

Vulnerability Hierarchy. The 2025 hack distribution revealed a clear hierarchy of vulnerability:

CEX: $1.62B (78% of total) - dominated by private key compromise

DeFi: $248M (12%) - mathematical edge cases and architectural vulnerabilities

DEX: $220M (10%) - fake asset contracts and validation logic exploits

CEX Vulnerabilities. CEX losses were dominated by a single attack vector: private key compromise. Bybit, Phemex ($73M in January), and Nobitex ($90M in June) all fell to variations of the same fundamental vulnerability - hot wallet keys that could be accessed through sophisticated attacks on exchange infrastructure. The industry's solution has been clear for years: cold storage, multi-signature schemes, and reduced hot wallet balances. But operational requirements create persistent tension between security and functionality.

DeFi Sophistication. DeFi exploits showed increasing sophistication. The UPCX attack ($70M) exploited a mathematical rounding error in the protocol's pricing mechanism. GMX v1 ($40M) fell to a flash loan attack that manipulated oracle prices. Balancer V2's $128M loss came from a subtle bug in the pool rebalancing logic that had survived multiple audits. These weren't simple reentrancy attacks or unverified contracts - they were novel exploits that required deep protocol understanding to execute.

Figure 12.2: Hacks by Type & Target - The pie chart shows category distribution (CEX 78%, DeFi 12%, DEX 10%). The bar chart ranks individual incidents by size. Bybit's dominance is immediately visible - it dwarfs all other incidents combined.

Hot wallet keys remain the industry's Achilles heel. Every major CEX hack in 2025 came from the same fundamental vulnerability - keys that could be accessed through sophisticated attacks on exchange infrastructure.

The State Actors: Lazarus and Predatory Sparrow

Nation-State Threat. Two nation-state hacking groups were responsible for 74% of 2025's total losses. North Korea's Lazarus Group and Iran's Predatory Sparrow represent a threat category that the crypto industry had acknowledged but never fully experienced at this scale. These aren't opportunistic hackers looking for quick profits - they're state intelligence operatives with geopolitical motivations.

Lazarus Group. Lazarus Group has been stealing cryptocurrency since 2017, but 2025 marked a step-change in capability and ambition. The $1.46 billion Bybit hack represented more than North Korea's entire estimated cryptocurrency theft from 2017-2024 combined. The stolen funds reportedly flow into the regime's weapons programs, including nuclear and ballistic missile development. For North Korea, cryptocurrency theft isn't cybercrime - it's a strategic national security operation that circumvents international sanctions.

Predatory Sparrow. Predatory Sparrow, linked to Iranian intelligence services, targeted Nobitex - an Iranian exchange that served as a sanctions evasion tool for the regime. The $90M hack was as much a geopolitical message as a theft. The attack demonstrated that even sanctioned exchanges operating outside Western regulation remained vulnerable. The stolen funds' final destination remains unclear, but the incident highlighted how crypto theft has become a tool of inter-state conflict.

Figure 12.3: 2025 Major Hacks Summary - Reference table showing all eight incidents with dates, targets, amounts, types, and attribution. The attribution column reveals that only two groups (Lazarus, Predatory Sparrow) are identified - the remaining $540M came from unknown actors.

74%

Of 2025 losses came from state-sponsored hackers - North Korea's Lazarus Group ($1.46B) and Iran's Predatory Sparrow ($90M). These nation-state actors represent a fundamentally different threat than opportunistic attackers.

SO WHAT?

State-sponsored hackers don't respond to SEC lawsuits, industry blacklists, or international condemnation. They respond only to technical security improvements and institutional-grade custody infrastructure. The Bybit hack demonstrated that regulatory enforcement was the wrong tool - what the industry needed was regulated infrastructure that made attacks harder and recovery more likely.

The Regime Analysis: When Hacks Defined Markets

Security's Role. Mapping security incidents to 2025's regime structure reveals which hacks moved markets and which were absorbed without regime-defining impact. The Amberdata Crypto Market Review 2025 Section 3 details the regime framework; here we focus on security's role.

Regime 2 (Security Shock). This regime was explicitly triggered by the Bybit hack. The February 21 incident created a distinct market phase characterized by exchange outflows, elevated volatility, and negative institutional sentiment. BTC returned -19.6% during this regime - the second-worst performance of the year. The regime lasted until the end of February, only ending when exchange flows stabilized and the market processed the security implications.

Regime 4 (Institutional Expansion). This regime absorbed three incidents totaling $140M without market disruption. The Nobitex, Resupply, and GMX attacks occurred during a period of strong institutional inflows and positive sentiment. BTC returned +8.0% despite the security events. The market had developed resilience - smaller hacks no longer triggered regime changes. Only Bybit-scale events could shift market structure.

Regime 5 (Macro Shock). Notably, this regime had zero security incidents. The October crash that triggered this regime was entirely macro-driven - Federal Reserve policy uncertainty and broader market stress. This distinction matters: October proved that crypto could crash without security catalysts, while February proved that security alone could trigger crashes. The industry faced multiple independent risk vectors.

Figure 12.4: Hacks by Regime - Bar chart showing total losses per regime alongside BTC returns. R2's $1.46B concentration and negative return stand out. R4 absorbed $140M with positive returns - demonstrating market resilience to smaller incidents.

Bybit-scale hacks define market regimes. Smaller incidents get absorbed. The industry has developed resilience to $100M events - but not to billion-dollar attacks from state-sponsored actors.

The DeFi Exploits: Sophistication Meets Scale

Evolution in Sophistication. While CEX hacks dominated total losses, DeFi exploits in 2025 revealed an evolution in attack sophistication. These weren't the simple reentrancy bugs of 2021 or the unverified contracts of 2022. They were novel attacks that required deep mathematical understanding and patient preparation.

Cetus DEX ($220M, May). The Cetus attack exploited a vulnerability in Sui's native liquidity protocol. The attacker created a fake asset contract that the protocol's validation logic accepted, allowing them to drain pools of legitimate assets. The exploit required understanding both Sui's unique architecture and Cetus's specific implementation - knowledge that suggested either an insider or extensive reverse engineering.

Balancer V2 ($128M, November). This loss came from a mathematical edge case in the protocol's weighted pool rebalancing mechanism. The bug had survived three independent audits and two years of production operation. The attacker needed to understand not just the code, but the mathematical model underlying it - then construct a series of transactions that exploited the model's edge cases. This level of sophistication represents the new normal for DeFi attacks.

Figure 12.5: Security Incidents by Regime - Reference table showing hack counts, amounts, targets, and BTC returns per regime. Note R2 (triggered BY Bybit), R4 (absorbed multiple incidents), and R5 (zero security incidents during macro crash).

8

Major security incidents in 2025 - averaging one every six weeks. The industry operated under constant security pressure, with no extended period free from significant exploits. This cadence demands continuous vigilance, not periodic security reviews.

The Regulatory Connection: Crisis as Catalyst

Paradox of 2025. The paradox of 2025 was that the worst security year in crypto history accelerated rather than derailed institutional adoption. The mechanism was regulatory: security failures demonstrated the inadequacy of the enforcement-based approach and the necessity of proper infrastructure.

Within weeks of the Bybit hack, the SEC paused its enforcement campaign against major exchanges. The agency's new leadership recognized that suing Coinbase and Binance wouldn't stop North Korean hackers. What would stop them - or at least minimize damage - was institutional-grade custody infrastructure that banks could provide, but only if SAB 121 was rescinded. The security crisis made the regulatory argument concrete and urgent.

Causation. The Amberdata Crypto Market Review 2025 Section 13 details the regulatory transformation. Here, the key point is causation: Bybit's $1.46B loss created political space for regulatory action that industry lobbying alone had failed to achieve. The hack demonstrated that crypto's security problem was a national security problem - state-sponsored actors were stealing billions. The solution wasn't more enforcement against US exchanges; it was building infrastructure that made attacks harder and recovery more likely.

SO WHAT?

Security crises can be regulatory catalysts. The Bybit hack demonstrated what years of industry lobbying couldn't: crypto needed regulated infrastructure, not litigation. The 2025 regulatory transformation - SAB 121 rescission, ETF improvements, 401(k) access - was accelerated by security failures that made the case for proper institutional involvement undeniable.

THE BOTTOM LINE

2025's $2.09 billion security crisis was defined by scale, state actors, and unintended consequences. The Bybit hack ($1.46B) represented 70% of losses and triggered Regime 2. State-sponsored hackers (Lazarus Group, Predatory Sparrow) accounted for 74% of total theft. But the crisis accelerated regulatory clarity rather than derailing adoption. The industry's worst security year became a catalyst for its most significant regulatory progress. The Amberdata Crypto Market Review 2025 Section 13 details how this connection reshaped the institutional landscape.

This analysis connects to (S3)'s complete regime analysis, which details the Security Shock period triggered by Bybit. (S11) provides DeFi exploit details and protocol-level analysis.

From here, (S13) details the regulatory transformation that followed the security crisis. (S14) incorporates the 2026 security outlook and risk projections into forward scenarios.

This article provides a security crisis analysis. The full Amberdata Crypto Market Review 2025 goes deeper:

  • The $80,000 floor: What happens when ETF cost basis breaks?
  • Which ETF issuer is already underwater? The entity-level breakdown reveals all
  • October's "capitulation"? The data says arbitrage - here's the carry trade proof
  • 123,173 BTC: The mega whale accumulation hiding in plain sight
  • Six regimes, 14 sections: One framework that explains everything
  • Early or late cycle? On-chain valuation signals decoded
  • $60K or $180K? 2026 scenarios with specific price targets
  • DeFi's $2B security crisis: What broke and why it matters
  • SAB 121 to 401(k): The regulatory timeline reshaping crypto
  • And more...

Full-Market Research. Institutional Depth. Derivatives, ETFs, on-chain, DEXs, microstructure, risk signals - and more. Subscribe at the bottom of our page for research that covers every corner of crypto and visit the Amberdata Research Blog.

Access Amberdata Intelligence for institutional-grade digital asset intelligence, or contact our team to discuss custom solutions.

Links & Resources

Platform

Recommended next reads

ETF Cost Basis Series

More key reads

Disclaimers

The information contained in this report is provided by Amberdata solely for educational and informational purposes. The contents of this report should not be construed as financial, investment, legal, tax, or any other form of professional advice. Amberdata does not provide personalized recommendations; any opinions or suggestions expressed in this report are for general informational purposes only.

Although Amberdata has made every effort to ensure the accuracy and completeness of the information provided, it cannot be held responsible for any errors, omissions, inaccuracies, or outdated information. Market conditions, regulations, and laws are subject to change, and readers should perform their own research and consult with a qualified professional before making any financial decisions or taking any actions based on the information provided in this report.

Past performance is not indicative of future results, and any investments discussed or mentioned in this report may not be suitable for all individuals or circumstances. Investing involves risks, and the value of investments can go up or down. Amberdata disclaims any liability for any loss or damage that may arise from the use of, or reliance on, the information contained in this report.

By accessing and using the information provided in this report, you agree to indemnify and hold harmless Amberdata, its affiliates, and their respective officers, directors, employees, and agents from and against any and all claims, losses, liabilities, damages, or expenses (including reasonable attorney's fees) arising from your use of or reliance on the information contained herein.

Copyright © 2026 Amberdata. All rights reserved.