According to the REKT Database, DeFi has suffered $77.1 billion in total losses from scams, hacks, and exploits since the ecosystem emerged. Only $6.5 billion has been recovered—roughly 8.4%. Let’s walk through every major exploit era and extract the patterns that keep costing us billions.
The Year-by-Year Breakdown
2020: The Innocent Era ($100M)
DeFi was small. Hacks were small. Flash loans were a novelty. 16 recorded exploits, mostly targeting early AMMs and lending protocols with basic reentrancy bugs.
2021: The Explosion ($2.5B)
A 2400% increase in losses as TVL exploded. 62 exploits recorded. Market manipulation became the leading attack vector (32.1% of incidents). This year alone accounted for 38% of the top 100 DeFi hacks ever. Poly Network’s $611M hack showed the stakes.
2022: The Bridge Bloodbath ($3.8B)
The worst year on record. Cross-chain bridges became the primary target—accounting for 64% of all losses that year. October 2022 alone saw bridges represent 82% of stolen funds.
The carnage:
- Ronin Network: $625M - Lazarus Group compromised 5 of 9 validator keys
- Wormhole: $325M - Signature verification spoofing
- Nomad Bridge: $190M - Copy-paste exploit anyone could replicate
- BNB Bridge: $568M - Proof verification bypass
2023: Flash Loan Sophistication ($1.7B)
Losses dropped 54%, but attacks became more complex:
- Euler Finance: $197M - Non-price flash loan attack exploiting donation logic
- Curve/Vyper: $69M - Compiler bug in reentrancy locks (78.6% of all reentrancy losses that year)
- Multichain: $126M - Still unexplained, possibly insider
2024: The Off-Chain Pivot ($2.2B)
The attack surface shifted. Off-chain attacks represented 80.5% of stolen funds. Private key compromises dominated. Smart contract exploits became less profitable as protocols improved.
2025: Breaking Records ($2.5B+ in H1)
Q1 2025 was the worst quarter ever for crypto hacks. The Bybit supply chain attack ($1.5B) showed attackers now target the humans and infrastructure around protocols, not just the code.
Top 10 Exploits by Value
| Rank | Protocol | Amount | Year | Vector |
|---|---|---|---|---|
| 1 | Bybit | $1.5B | 2025 | Supply chain |
| 2 | Ronin | $625M | 2022 | Key compromise |
| 3 | Poly Network | $611M | 2021 | Access control |
| 4 | BNB Bridge | $568M | 2022 | Proof verification |
| 5 | Wormhole | $325M | 2022 | Signature spoof |
| 6 | Euler | $197M | 2023 | Flash loan |
| 7 | Nomad | $190M | 2022 | Validation bypass |
| 8 | Wintermute | $160M | 2022 | Key compromise |
| 9 | Mango Markets | $114M | 2022 | Price manipulation |
| 10 | Beanstalk | $76M | 2022 | Flash loan governance |
Attack Pattern Evolution
The threat landscape transformed completely:
2020-2021: Classic smart contract bugs
- Reentrancy
- Integer overflows
- Access control misconfigurations
- Logic errors
2022: Infrastructure attacks
- Bridge validator compromises
- Cross-chain message spoofing
- Proof verification bypasses
2023: Economic attacks
- Sophisticated flash loan sequences
- Oracle manipulation
- Governance takeovers
- Compiler-level vulnerabilities
2024-2025: Human-layer attacks
- Social engineering (55.3% of value)
- Supply chain compromises
- Private key phishing
- Developer workstation malware
What Actually Improved
- Oracle security: TWAP/VWAP implementations reduced manipulation
- Reentrancy guards: Standard in modern contracts
- Access control patterns: OpenZeppelin patterns widely adopted
- Circuit breakers: Automatic pausing during anomalies
- Time-locks: Governance attacks became harder
What Keeps Failing
- Bridges: Still architecturally fragile—off-chain verification is the weak point
- Key management: Multisig adoption only 19% among hacked protocols
- Operational security: The human attack surface keeps expanding
- Recovery: Only 8.4% of stolen funds ever returned
- Learning: Same patterns repeat despite public post-mortems
The Uncomfortable Truth
The $77B loss figure understates the problem. It doesn’t include:
- Rug pulls and soft exits
- MEV extraction
- Unreported private key compromises
- Social engineering without public disclosure
The real number is likely over $100B.
Discussion questions:
- Which exploit taught the ecosystem the most valuable lesson?
- Are bridges fundamentally unfixable, or just immature?
- Why do teams still ignore basic security patterns that have been documented for years?
- Will AI-based detection systems actually prevent the next wave, or just create new attack vectors?
security_sam