Thursday, April 9, 2026
spot_img

Crypto hackers steal $169M from 34 DeFi protocols in Q1: DefiLlama

Crypto Hack Losses Drop Sharply in Early 2026, But Risks Remain Persistent

Decentralized finance (DeFi) protocols experienced a significant decline in cryptocurrency theft during the first quarter of 2026, with hackers stealing $168.6 million across 34 incidents, according to data from the analytics platform DefiLlama. This figure represents a dramatic fall from the same period last year, which was dominated by one of the largest crypto heists in history.

The largest single exploit of Q1 2026 was the $40 million private key compromise of Step Finance in January. It was followed by a $26.4 million drain of ether (ETH) from the scaling solution Truebit on January 8, resulting from a smart contract manipulation. The quarter’s third-largest loss, $15 million, came from a private key compromise targeting stablecoin issuer Resolv Labs on March 21.

The first three months of 2026 saw less stolen compared to the prior year period. Source: DefiLlama

This quarterly total is notably lower than the staggering $1.58 billion stolen in Q1 2025. The bulk of that prior-year figure—approximately $1.4 billion—came from the high-profile hack of the exchange Bybit. However, security experts caution against interpreting the 2026 data as a sign of a fundamentally safer ecosystem.

Attack Cycles Follow Value, Not Calendars

“Cybercriminal activity in crypto tends to rise around market and event-driven cycles rather than fixed periods,” explained Nick Percoco, Chief Security Officer at the Kraken exchange. He noted that threat actors are inherently drawn to areas where liquidity and value are most concentrated, meaning attack spikes often follow the money.

“Bull markets, major product launches, and fast-moving growth phases all create more attractive conditions for attackers because more value is at stake and new infrastructure can introduce risk,” Percoco stated. He emphasized that this pattern does not mean periods of lower activity equate to lower risk. “Vulnerabilities can be exploited in any market environment, particularly in complex or rapidly evolving systems, underlining that security in crypto must be continuous.”

The Diverse and Evolving Threat Landscape

The crypto attacker ecosystem is a “broad and evolving mix,” Percoco said, encompassing highly sophisticated state-affiliated groups, organized cybercriminal networks, and opportunistic individual hackers. A persistent and formidable threat comes from hackers linked to North Korea, suspected in numerous high-value attacks. This includes a recent incident where Drift Protocol, a decentralized exchange, lost an estimated $285 million to a private key leak.

“It is a broad and evolving mix, but they are ultimately targeting the same thing: global, liquid and accessible value,” Percoco explained. “Targeting is rarely purely random. In many cases, attackers are deliberate in how they assess infrastructure, code, access controls, and even human behavior.”

He added that the inherent transparency of blockchain technology can be a double-edged sword, making it easier for opportunistic actors to spot emerging weaknesses. “The most attractive targets tend to be those combining large concentrations of value, technical complexity, and gaps in operational security.”

This evolving threat aligns with prior expert forecasts for 2026, which predicted an increase in sophisticated credential theft, social engineering, and AI-powered attacks. The fluctuating quarterly data serves as a stark reminder that while the scale of theft can vary, the underlying threat to the crypto ecosystem remains constant and adaptive.

This article is produced in accordance with Cointelegraph’s Editorial Policy and aims to provide accurate and timely information. Readers are encouraged to verify information independently. Data on stolen funds is sourced from DefiLlama, and analysis is attributed to Nick Percoco of Kraken. For more on security trends, see related reporting from Immunefi on hacked token recovery rates.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

spot_imgspot_img
spot_img

Hot Topics

Related Articles