From Mt. Gox’s slow-bleed catastrophe to Bybit’s $1.4 billion single-day heist, a forensic look at the exchange hacks that shook the crypto industry, the security failures that made them possible, and the risk management lessons every firm should take away.

The Staggering Cost of Getting Security Wrong

In 2025 alone, hackers stole approximately $2.7 billion in cryptocurrency, according to TechCrunch’s year-end analysis. That figure set a new annual record, surpassing the $2.2 billion stolen in 2024, which itself exceeded the $2 billion lost in 2023. The trajectory is clear: crypto hacking is not slowing down. It is accelerating, professionalising, and becoming increasingly state-sponsored.

But the raw dollar figures, as alarming as they are, obscure the more important story. Each major hack reveals a specific, identifiable failure in risk management, security architecture, governance, or operational controls. These are not random acts of genius by mysterious hackers. They are predictable consequences of known vulnerabilities that went unaddressed.

This article breaks down the biggest crypto exchange hacks in history, dissects exactly what went wrong in each case, and extracts the operational risk management lessons that every crypto firm, investor, and regulator should internalise. If you work in risk, compliance, or security at a crypto firm, this is required reading.

The Biggest Crypto Exchange Hacks: A Timeline

Before we dive into the details, here is the scale of what we are talking about:

YearExchangeAmount StolenPrimary CauseOutcome
2011–2014Mt. Gox850,000 BTC (~$460M)Hot wallet compromise, no version controlBankruptcy; 10+ years of creditor proceedings
2016Bitfinex120,000 BTC (~$72M)Multisig implementation flawBFX token reimbursement; recovered 2022
2018Coincheck523M NEM (~$534M)Hot wallet, single-sig, phishingAcquired by Monex Group; users reimbursed
2020KuCoin$280M (multiple tokens)Private key compromise$204M recovered; rapid response model
2022Ronin Network173,600 ETH + 25.5M USDC (~$625M)Validator node compromise (Lazarus)Sky Mavis secured $150M from Binance
2022FTX$477M (during collapse)SIM-swap attack; internal chaosSBF sentenced to 25 years; ongoing recovery
2024DMM Bitcoin4,502 BTC (~$308M)Private key compromise (Lazarus)Exchange shut down Dec 2024; transferred to SBI
2024WazirX$235MMultisig wallet exploitMutual blame between exchange and custodian
2025Bybit401,000 ETH (~$1.4B)Supply chain attack on Safe{Wallet} UILargest hack in history; user balances honoured
2025Coinbase$180–400M (data breach)Insider bribery; social engineering$20M bounty offered; class action lawsuit filed

Source data compiled from Crystal Intelligence, Chainalysis 2025 report, The Block’s 2025 roundup, and CCN’s exploit tracker.

The Hacks: What Happened and What Went Wrong

1. Mt. Gox (2011–2014): The Hack That Nearly Killed Bitcoin

At its peak, Mt. Gox handled over 70% of global Bitcoin transactions. Between 2011 and 2014, hackers systematically drained approximately 850,000 BTC from the exchange’s hot wallets. The breach was not a single dramatic event. It was a slow, years-long bleed that went undetected because the exchange lacked the most basic software development and operational risk management practices.

What went wrong:

  • No version control software. CEO Mark Karpelès was the only person who could approve code changes. There was no test environment until shortly before the collapse.
  • Hot wallet over-exposure. The compromised wallet was a hot wallet managed directly by the exchange, with funds regularly transferred to unknown addresses undetected for years.
  • No real-time accounting. The exchange had no internal system to reconcile wallet balances against customer obligations. Withdrawals continued while the exchange was insolvent.
  • No incident detection. As WizSec’s 2015 investigation revealed, the majority of bitcoins were slowly withdrawn since 2011, not stolen in a single event.

Mt. Gox filed for bankruptcy in February 2014. Creditor repayments, which began over a decade later, remain one of the longest restitution processes in financial history. The Gemini Cryptopedia analysis provides an authoritative account of the full timeline.

2. Bitfinex (2016): When Multisig Was Not Enough

In August 2016, hackers drained 120,000 BTC (worth $72 million at the time) from Bitfinex by exploiting vulnerabilities in the exchange’s multisig wallet implementation with partner BitGo.

What went wrong:

  • Flawed multisig configuration. Bitfinex held two of three signing keys, with BitGo holding the third. The implementation allowed hackers to compromise enough keys to authorise withdrawals.
  • No withdrawal anomaly detection. There were no automated controls to flag or halt abnormally large fund transfers.
  • Shared responsibility, no accountability. Neither Bitfinex nor BitGo took responsibility. Neither issued a definitive post-mortem.

Bitfinex recovered relatively well, issuing BFX tokens to spread losses across its customer base (each customer lost about 36%) and eventually redeeming them. In February 2022, US authorities seized $3.6 billion of the stolen Bitcoin, the largest financial seizure in DOJ history at the time.

3. Coincheck (2018): $534 Million in NEM Stored in a Hot Wallet

On January 26, 2018, hackers stole 523 million NEM tokens (worth approximately $534 million) from Coincheck, a Tokyo-based exchange. At the time, this was the largest digital currency theft in history.

What went wrong:

  • Hot wallet storage of massive holdings. Coincheck stored the majority of its NEM tokens in a hot wallet connected to the internet, rather than in cold storage.
  • Single-signature authorisation. The compromised wallet used single-signature authorisation instead of multisig, creating a single point of failure.
  • Phishing as the entry vector. Attackers used phishing to infiltrate the hot wallet and install malware for fund transfer.

Coincheck was subsequently acquired by Japanese brokerage Monex Group and reimbursed affected users at $0.83 per NEM token. The hack triggered Japan’s Financial Services Agency to tighten exchange regulation significantly. For context on how business continuity planning for cryptocurrency firms should address this scenario, see our detailed guide.

4. KuCoin (2020): The Recovery Success Story

In September 2020, hackers compromised KuCoin’s private keys and drained approximately $280 million across multiple tokens from the Singapore-based exchange’s hot wallets.

What went wrong:

  • Private key compromise. Hackers obtained keys to several hot wallets, enabling direct asset withdrawal.
  • Insufficient key rotation. Key management protocols did not include regular rotation or compartmentalisation.

What went right:

  • Rapid response. KuCoin immediately blocked all transactions, launched a forensic investigation, and coordinated with other exchanges and blockchain projects to freeze stolen assets.
  • Recovery at scale. Over $204 million was recovered within weeks through cross-exchange cooperation and token contract updates that rendered stolen tokens unusable.

KuCoin’s response became the industry benchmark for incident management. The Lazarus Group was identified as a suspect. This case illustrates why a tested BCP risk assessment and incident response plan is not optional.

5. Ronin Network (2022): $625 Million Through Compromised Validators

On March 23, 2022, attackers stole approximately 173,600 ETH and 25.5 million USDC from the Ronin network, a blockchain bridge linked to the popular Axie Infinity game. The breach was not discovered until six days later.

What went wrong:

  • Validator key compromise. Ronin used a 5-of-9 validator scheme. The attackers, later attributed to North Korea’s Lazarus Group, obtained control of five validator keys, meeting the threshold to authorise withdrawals.
  • Validator centralisation. Sky Mavis (Axie Infinity’s developer) controlled four of the nine validators, creating a concentrated point of failure.
  • Six-day detection delay. The hack went unnoticed for nearly a week because monitoring systems failed to flag the massive outflow.

This hack exposed the fragility of bridge protocols, which connect different blockchains. Binance provided $150 million to support recovery. For firms evaluating their own cross-chain dependencies, the risk management lifecycle must explicitly account for bridge and validator risks.

6. FTX (2022): Chaos, Collapse, and $477 Million Vanishes

On November 11, 2022, hours after FTX filed for bankruptcy amid revelations that founder Sam Bankman-Fried had embezzled billions in customer funds, an additional $477 million in crypto was drained from the exchange’s wallets.

What went wrong:

  • SIM-swap attack during institutional collapse. According to Fortune’s investigation, US-based hackers used a fake ID at an AT&T store to hijack a female FTX executive’s phone account, intercepting wallet security codes.
  • No operational controls during crisis. During bankruptcy proceedings, there was no functioning security team to detect or respond to the unauthorised transfers.
  • Pre-existing governance failure. FTX lacked basic corporate controls. New CEO John Ray III described it as the worst corporate governance failure he had ever seen.

SBF received a 25-year prison sentence in March 2024 and was ordered to forfeit $11 billion. The Elliptic blockchain trail analysis tracked stolen funds through mixers, cross-chain bridges, and Russian-linked laundering networks.

7. DMM Bitcoin (2024): $308 Million and a Business Destroyed

In May 2024, Japan’s DMM Bitcoin exchange lost 4,502.9 BTC (worth approximately $308 million) in a hack attributed to North Korea’s Lazarus Group. The exchange initially secured funding to cover customer deposits, but could not sustain operations under ongoing withdrawal restrictions.

What went wrong:

  • Private key mismanagement. The attack targeted infrastructure vulnerabilities that enabled unauthorised key access.
  • Insufficient recovery capacity. Despite raising $320 million in emergency funding, the sustained operational disruption proved terminal.

DMM Bitcoin shut down in December 2024 and transferred all customer accounts to SBI VC Trade by March 2025. This is the clearest recent example of how a single hack can destroy an exchange entirely, underscoring the need for robust business continuity planning.

8. Bybit (2025): The $1.4 Billion Supply Chain Attack

On February 21, 2025, Bybit suffered the largest cryptocurrency theft in history. Approximately 401,000 ETH ($1.4 billion) was drained from its cold wallet in minutes. The attack, attributed to North Korea’s Lazarus Group, was a masterclass in supply chain compromise.

What went wrong:

  • Third-party infrastructure compromise. Attackers did not breach Bybit’s own systems. They compromised a Safe{Wallet} developer’s machine through social engineering (a trojanised Docker project), then used stolen AWS credentials to inject malicious JavaScript into Safe’s S3 bucket.
  • UI-level transaction manipulation. The malicious code displayed a legitimate-looking routine transfer to Bybit’s signers, while the actual transaction payload was a delegatecall that transferred control of the wallet to the attackers. As Fireblocks’ analysis confirmed, the UI deception was targeted specifically at Bybit’s wallet addresses.
  • Blind signing on hardware wallets. Ledger hardware wallets used by Bybit’s signers could not parse and display the complex smart contract transaction details, forcing operators to approve transactions without seeing what they were actually signing. Cobo’s post-mortem calls this the fundamental flaw.
  • No independent transaction verification layer. Bybit’s entire security stack relied on Safe{Wallet}’s solution. Once that UI was compromised, the multisig mechanism was effectively bypassed. There was no secondary validation system.
  • No subresource integrity (SRI) checks. Safe{Wallet} did not implement SRI hashing to detect modified frontend code, and had no real-time alerting for unauthorised S3 edits.

Bybit honoured all customer balances and began rebuilding its wallet infrastructure. Within 48 hours, at least $160 million had been laundered through mixers and cross-chain bridges. The CSIS policy analysis and Chainalysis’s detailed forensic breakdown both provide essential reading on the attack’s implications. The TRM Labs investigation estimates North Korea’s total crypto theft at over $5 billion since 2017.

9. Coinbase (2025): The $400 Million Insider Threat

In May 2025, Coinbase disclosed that criminals had bribed overseas customer support contractors to steal sensitive personal data from 69,461 customers. The breach did not directly compromise crypto wallets or private keys, but it enabled downstream social engineering scams where attackers impersonated Coinbase staff and convinced customers to transfer funds.

What went wrong:

  • Insider threat via outsourced contractors. Attackers bribed third-party support agents based in India to access internal systems and extract customer names, addresses, SSNs, bank details, and transaction histories.
  • Slow detection. According to the Maine AG filing, the breach began in December 2024 but was not detected until May 2025.
  • Insufficient insider monitoring. Despite handling the majority of $122 billion in spot-Bitcoin ETF tokens, Coinbase’s internal behavioural monitoring did not flag the data exfiltration pattern.

Coinbase refused the attackers’ $20 million ransom demand and instead offered a $20 million reward for information leading to arrests. Estimated remediation costs: $180–400 million. The Fortune investigation revealed the attackers were teenage members of “The Comm,” a loose hacking collective coordinating via Telegram and Discord.

Five Patterns That Connect Every Major Hack

Looking across all these incidents, five failure patterns emerge repeatedly:

Pattern 1: Private key concentration remains the single largest vulnerability. From Mt. Gox’s unmonitored hot wallet to DMM Bitcoin’s infrastructure compromise, private key exposure caused more dollar losses than any other attack vector. Chainalysis’s 2024 data confirms that private key compromises accounted for 43.8% of all stolen crypto in 2024.

Pattern 2: Third-party and supply chain risks are the new frontier. The Bybit hack was not a direct attack on the exchange. It was a supply chain compromise of Safe{Wallet}’s development infrastructure. Similarly, Coinbase was breached through outsourced support contractors. Your security is only as strong as your weakest vendor. A rigorous risk management policy must extend to every third party with access to your systems or data.

Pattern 3: North Korea’s Lazarus Group is the dominant threat actor. Lazarus has been linked to at least five of the ten largest exchange hacks (Ronin, DMM Bitcoin, WazirX, Bybit, and multiple smaller incidents). TRM Labs estimates the group has stolen over $5 billion in crypto since 2017, with the Bybit hack alone exceeding all of North Korea’s 2024 crypto theft combined.

Pattern 4: Detection delays compound losses exponentially. Mt. Gox was drained over three years without detection. Ronin took six days to notice $625 million was gone. Coinbase’s insider breach ran for five months. Continuous monitoring, real-time reconciliation, and anomaly detection are not optional. For KRI design guidance, see our best key risk indicators guide.

Pattern 5: Post-hack response separates survivors from casualties. KuCoin’s rapid cross-industry response recovered $204 million. Bitfinex’s BFX token model kept the exchange alive. Meanwhile, Mt. Gox and DMM Bitcoin failed to recover and shut down. Your business continuity plan and incident response playbook determine whether a hack is a crisis or a death sentence.

Risk Management Lessons for Every Crypto Firm

Based on the forensic evidence from every hack above, here are the controls that would have prevented or significantly mitigated each incident:

Control AreaMinimum StandardBest Practice (post-Bybit)
Key managementCold storage for >95% of assets; multi-signature with no single entity holding quorumMPC wallets with geographically distributed key shares; HSM-backed storage; automated key rotation
Transaction verificationHuman review of all large transactionsIndependent transaction validation layer; clear signing (not blind signing) on hardware wallets; AI-based anomaly detection
Supply chain securityVendor risk assessments; contract security requirementsSubresource Integrity (SRI) checks; code-signing verification; independent frontend UIs for critical operations
Insider threatBackground checks; access controls; segregation of dutiesBehavioural analytics on privileged users; zero-trust architecture; in-house critical support functions
Monitoring and detectionDaily wallet reconciliation; transaction loggingReal-time on-chain monitoring; automated alerts on threshold breaches; <1 hour detection SLA
Incident responseDocumented IR plan with defined rolesPre-tested playbooks; cross-exchange cooperation agreements; token freezing capabilities; recovery bounty frameworks
Business continuityBCP with defined RTOs for wallet access and transaction processingTested failover infrastructure; pre-funded insurance coverage; customer communication templates; regulatory notification procedures

For a structured approach to implementing these controls, our essential risk management process flow chart provides the step-by-step framework. For firms building cyber risk into their enterprise risk programme, the enterprise risk management cyber security guide covers the integration methodology.

The Regulatory Response Is Hardening

Regulators worldwide are responding to these escalating losses. The FDIC, OCC, and Federal Reserve’s July 2025 joint statement on crypto-asset safekeeping explicitly requires governance expertise, contingency planning, and incident response protocols at every enterprise level. The EU’s MiCA regulation mandates sound administrative procedures, internal control mechanisms, and continuity arrangements for all licensed crypto firms.

The CSIS policy analysis of the Bybit hack notes that the incident coincided with the Trump administration making cryptocurrency a bellwether of its technology policy portfolio, creating a regulatory paradox: the desire to promote crypto innovation collides with the reality that state-sponsored actors are exploiting weak security to fund weapons programmes.

For compliance teams, the message is unambiguous: demonstrating robust risk management processes and operational risk controls is no longer optional. It is a regulatory expectation that will increasingly determine licensing decisions.

What Should You Do Now?

If you manage, invest in, or regulate a crypto exchange or custodian, here are your immediate priorities:

  • Audit your key management architecture. If any single person or entity can authorise material fund movements, you have a ticking time bomb. Implement multi-sig or MPC with no single-point-of-failure quorum configurations.
  • Map your third-party dependencies. The Bybit hack proved that your security is your vendor’s security. Conduct penetration testing and code integrity checks on every piece of third-party infrastructure that touches your wallet operations.
  • Implement continuous on-chain monitoring. Six-day detection windows (Ronin) and five-month insider breaches (Coinbase) are unacceptable. Deploy real-time monitoring with automated alerts and sub-hour response targets.
  • Test your incident response plan. KuCoin recovered $204 million because it acted fast. Mt. Gox and DMM Bitcoin died because they could not. Run tabletop exercises quarterly and live drills semi-annually. See our BCP risk assessment guide for the framework.
  • Address insider threat proactively. The Coinbase breach was not a technical exploit. It was a human failure. Background checks, behavioural analytics, access reviews, and in-sourcing critical functions are table stakes.
  • Build your risk register. Document every risk identified here, with controls, owners, and review dates. Our key elements of a risk register guide provides the template.

The crypto industry has now experienced over $10 billion in exchange-level hacks. Each one was preventable with controls that were well-understood at the time. The question is not whether the next hack will happen. It is whether your firm will be prepared when it does.

For further reading, explore our guides on business continuity planning for small cryptocurrency firms, crypto trading risk management strategies, and the key risk indicators for financial institutions.

External Sources and Further Reading