Crypto hacks are hitting harder and moving faster than ever before. In the first half of 2025 alone, more than $3 billion was stolen across 119 attacks, a 50% jump from all of 2024. But the real game-changer isn’t just the scale it’s how hackers are laundering those funds.
According to a new report by blockchain intelligence firm Global Ledger, cross-chain bridges have now overtaken crypto mixers as the go-to tool for criminals looking to wash their stolen assets.
From Mixers to Bridges: A Shift in Crypto Laundering
Remember when mixers like Tornado Cash were the top choice for crypto laundering? Not anymore.
In the first half of this year, over $1.5 billion more than 50% of all stolen crypto was funneled through cross-chain bridges. That’s 4.4 times more than the $339 million routed through mixers, which now account for just 11% of laundering activity.
Why the shift? Bridges offer speed, liquidity, and lower regulatory scrutiny. They allow hackers to instantly move funds across different blockchains, obfuscating asset origins and complicating law enforcement efforts.
Mixers are still used often in combination with other tools but bridges are now clearly leading the charge.
The New Crypto Crime Timeline: Blink and It’s Gone
Perhaps the most alarming trend is how fast these thefts and laundering operations are happening. In some cases, stolen funds are moved and laundered before the hack is even made public.
- One of the fastest observed transfers took just 4 seconds after the breach occurred.
- The quickest full laundering cycle from theft to last traceable deposit was under three minutes.
- In 68% of cases, funds were moved before the incident was disclosed.
That kind of speed gives attackers a huge head start, often leaving law enforcement and alert systems in the dust.
Centralized Exchanges Still Rule the Off-Ramp
Despite DeFi’s growth, hackers still prefer centralized exchanges (CEXs) to cash out. The report found that:
- $453 million (15% of hacked funds) landed on CEXs
- Just $170 million (5.6%) went to decentralized platforms
Why? Centralized exchanges still offer easier access to fiat and more liquid exit paths even if they’re more heavily monitored.
Recovery Is Rare And Mostly Reactionary
The odds of recovering stolen funds remain slim:
- 13% ($379 million) of funds were frozen or destroyed, mostly through enforcement or internal security measures
- Only 4.6% ($140 million) was voluntarily returned
- Over $1.6 billion (53.6%) is still unspent some likely lying dormant, waiting for the spotlight to fade
The report stresses that while some enforcement progress has been made, most recovery still depends on catching the theft early before it disappears across chains.
The Bottom Line: Speed Is the New Threat
The crypto crime landscape is evolving rapidly. Hackers are no longer just relying on anonymity they’re relying on speed. And with cross-chain bridges now their weapon of choice, the challenge for regulators and security teams has never been greater.
Global Ledger sums it up best:
“Speed has become the new dangerous weapon… attackers are now moving over 75 times faster than alerting systems can keep up.”
With the window for action closing in minutes not hours it’s clear that fighting crypto crime in 2025 is a race against time. And right now, the hackers are winning.


















































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































