$3.1B in Web3 Attacks: Access Control Is the Core Weakness

SHARE

$3.1B in Web3 Attacks: Access Control Is the Core Weakness

SHARE

Table of Contents

$3.1B in Web3 attacks: Access control is the core weakness. Hacken report exposes multisig failures and escalating threats in AI infrastructure. Remember the massive Bybit hack? That was precisely about a vulnerability in a third-party service, and today it remains one of the most critical attack vectors. Yes, Bybit restored its balance and liquidity at record speed, but how resilient are other platforms?

ByBIt-logo-white@2x
Score Up to $30,050 on Bybit — Just for Trading

AI-driven attacks are also on the rise, as confirmed by another security report we previously covered. Let’s take a closer look at Hacken’s latest analysis.

Just Six Months, and $3.1B Lost in Web3

So far, Web3 security incidents in 2025 have already doubled the losses recorded by the same point last year. And the issue isn’t the blockchain itself — it’s the connected services that form the primary threat vector: 59% of incidents stemmed from some form of access control failure.

This means that in Q1 alone, losses from this category totaled $1.63 billion:

  • Bybit ($1.465B). A Safe{Wallet} exploit triggered by a 1-of-1 multisig configuration. A malicious contract was injected via delegate call to control the proxy and initiate a withdrawal. The primitives remained intact – it was the signer validation that failed.
  • zkSync ($5M). The airdrop contract was controlled by a “multisig” with an effective threshold of 1-of-1. Leaking a single key granted total control.
  • UPCX ($70M). The ProxyAdmin owner upgraded the implementation to a malicious contract and invoked withdrawByAdmin. A full takeover via a system-level role.
  • KiloEx ($7.5M). A missing permission check in MinimalForwarder enabled oracle manipulation to open and close profitable positions on BNB Chain, Base, and opBNB.
  • Roar. The developer hardcoded their own wallet address with a fixed user.amount in the constructor, giving them withdrawal rights from the start. The backdoor was used immediately after liquidity was added to the LP.

Indeed, the absence of formal access control frameworks (especially off-chain) remains one of the systemic causes of such incidents. “Multisig” in practice often ends up being a single signer with root-level privileges.

DeFi and Smart Contracts

While access control dominated loss volume, standard logic bugs weren’t far behind. After five consecutive quarters of decline, Q2 2025 marked DeFi’s worst quarter since early 2023. Total losses from contract logic flaws reached $263M.

  • Cetus ($223M). An overflow in liquidity calculation logic enabled a flash loan to open ultra-narrow tick ranges (300000–300200), sweeping 264 pools – from haSUI ($22M) to AXAI ($2,500). The attack lasted just 15 minutes. Hacken notes that with real-time TVL monitoring and auto-pause, up to 90% of funds could have been saved.
  • Cork Protocol ($12 million). After removing a modifier on the beforeSwap hook, attackers were able to invoke the function, inject arbitrary data into CorkCall, forge token structures, and redeem fake components for real tokens. The protocol relied on a custom Uniswap V4 implementation where access validation was disabled.

Phishing and Social Engineering, of Course

$594M – or 19.2% of all losses – came from non-technical attacks relying solely on deception.

  • $330M in BTC stolen from an elderly investor. A multi-step scheme involving fake tech support, display of real balances, and psychological pressure to gain access. The funds were peeled through hundreds of wallets, mixed into Monero (causing a 50% XMR price spike), and partially bridged to Ethereum.
  • Coinbase leak & support fraud ($100+ million). Following a database compromise, users received phone calls from“support” quoting real balances and offering “assistance.” Most cases ended with the victim revealing seed phrases or keys. Funds were laundered via OTC desks, mixers, and DeFi.

AI and LLM Threats

Hacken reports a staggering 1025% increase in AI-related attacks compared to 2023. The vulnerabilities are no longer in the models themselves, but in the integration infrastructure.

  • Langflow (CVE-2025-3248, CVSS 9.8). RCE via the code-validation API. Over 1,050 public instances were affected.
  • BentoML (CVE-2025-32375). Insecure deserialization → RCE via crafted headers.
  • MITRE Caldera (CVE-2025-27364). A 0-day in the adversary-emulation tool enabled delayed RCE through dynamic code generation.
  • Prompt Injection. Researchers successfully injected hidden instructions into Gemini, triggering persistent long-term memory corruption.
  • WormGPT and vibe hacking. Attack kits now enable even non-experts to execute large-scale, generative phishing and malware campaigns.

Major Losses – Critical Lessons

Hacken stresses that companies must focus on the following practices to minimize these incidents:

  • CCSS + ISO/IEC 27001 as a dual standard for access control (on-chain and off-chain)
  • OWASP GenAI Red Teaming + ISO/IEC 42001 for AI-integrated architectures
  • TVL Monitor + Safe Multisig Monitor as baseline security controls
  • Model Context Protocol (MCP) for secure deployment of agentic LLM systems

ByBIt-logo-white@2x
Score Up to $30,050 on Bybit — Just for Trading

Disclaimer: The content provided in this article is for informational and educational purposes only and does not constitute financial, investment, or trading advice. Any actions you take based on the information provided are solely at your own risk. We are not responsible for any financial losses, damages, or consequences resulting from your use of this content. Always conduct your own research and consult a qualified financial advisor before making any investment decisions. Read more

Join our Legends Community Today!
Gain access to exclusive insights, trading setups 
and daily market reports.
Picture of Alexandros

Alexandros

My name is Alexandros, and I am a staunch advocate of Web3 principles and technologies. I'm happy to contribute to educating people about what's happening in the crypto industry, especially the developments in blockchain technology that make it all possible, and how it affects global politics and regulation.

Related Post

Buy / Sell Bitcoin

Rating: 90%

Conveniently buy/sell Bitcoin with EUR

binance

Rating: 85%

World’s largest crypto exchange

Our Favourite Trading Platform

Rating: 98%

Claim up to $30,050 in Bonus

100x Leverage

Rating: 90%

Sign Up and Earn up To $300 in Bonuses

WEEX-dark

Rating: 90%

20% Bonus + VIP Perks Inside

Follow Us