Crypto attackers didn’t slow down in August. According to security firm PeckShield, hackers made off with about $163 million, up 15% from July’s ~$142 million. The total came from roughly 16 incidents, with just a few high-profile breaches accounting for most of the damage.
What Drove the Spike
- $91.4M BTC theft from a longtime holder: The single biggest hit of the month.
- BtcTurk breach ($48–54M on Aug. 18): Tied to compromised hot-wallet keys. It’s the Turkish exchange’s second major failure in just over a year after a $54M theft in June 2024, pushing cumulative losses above $100M. PeckShield flagged laundering patterns resembling Lazarus Group activity.
- Other notable hits: ODIN•FUN ($7M), BetterBank.io ($5M), and CrediX Finance ($4.5M) on the Sonic chain. The CrediX case highlighted multi-layered attacks that blend access-control exploits with social engineering to trick signers into authorizing malicious transactions.
Although July recorded 17 exploits (including the $44M CoinDCX breach), August’s losses were more concentrated, hitting core infrastructure and centralized exchanges harder.
2025 Trend: Fewer Attacks, Bigger Average Hauls
PeckShield’s mid-year view suggests 2025 attacks are less frequent but more destructive:
- Average loss per exploit (H1 2025): $7.18M, over 2× H1 2024’s $3.1M.
- Root causes:
- Access-control failures (private-key theft, malicious approvals) ≈ 78% of losses.
- Social engineering adds another ~23%.
- Recovery rates: Still poor at ~7–8%.
- Attribution: A “significant portion” tied to state-affiliated actors (e.g., Lazarus), who rapidly move funds through mixers and cross-chain bridges, complicating freezes and clawbacks.
Why It’s Getting Harder to Fight Back
Analysts warn that the pivot toward human-targeted tactics, coupled with faster laundering and geopolitical involvement, is making recovery tougher than in past cycles.
What defenders recommend:
- Multi-sig custody with strict role separation.
- AI-driven anomaly detection across wallets, bridges, and market venues.
- Industry-wide intel sharing, including rapid blacklists and coordinated incident response.
The Bottom Line
With $163M lost in August and 2025’s cumulative damages on pace to top $4B, the threat landscape is tilting toward high-impact, access-control and social-engineering–led exploits. The takeaway for teams and traders is the same: tighten keys, harden approvals, monitor flows in real time, and treat human security as seriously as code audits.
































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































































