Decentralized finance has transformed the global financial landscape. Since the emergence of early lending and trading protocols in 2018, the total value locked across DeFi platforms has surged into the hundreds of billions of dollars. Automated market makers, yield aggregators, cross-chain bridges, and governance-driven treasuries have created an ecosystem that operates around the clock, without intermediaries, and with complete transparency of on-chain activity.
But that transparency cuts both ways. The open-source code that powers DeFi protocols is visible to everyone, including sophisticated attackers who study it for exploitable weaknesses. Since 2020, billions of dollars have been stolen from DeFi platforms through smart contract bugs, flash loan manipulations, bridge compromises, and private key thefts. According to data from Chainalysis, stolen cryptocurrency totaled approximately $3.8 billion in 2022 alone, a peak driven largely by DeFi protocol exploits. After a brief decline in 2023, losses rebounded to roughly $2.2 billion in 2024 and surged past $2.7 billion in 2025, setting a new record for the third consecutive year.
The human cost behind these numbers is significant. Individual users have lost life savings to rug pulls and protocol failures. Development teams have watched years of work unravel in minutes. Entire ecosystems built on compromised bridges have faced existential crises. Understanding the history, mechanics, and patterns of these incidents is not merely an academic exercise. It is a practical necessity for anyone allocating capital, building products, or participating in governance within the DeFi ecosystem.
This article provides a structured examination of the largest DeFi hacks in history, explains the core exploit categories that attackers use, and outlines the risk management frameworks that security professionals apply when evaluating protocol safety. Whether you are a newcomer researching DeFi security or an experienced participant assessing protocol risk, this guide is designed to serve as a definitive reference on DeFi hacks and the lessons they reveal.
The Biggest DeFi Hacks in History
The table below lists the most significant DeFi and crypto bridge exploits by estimated loss value. These incidents span multiple blockchains, attack vectors, and protocol types, but they share a common theme: a single vulnerability, whether in code, infrastructure, or operational security, can lead to catastrophic losses.
Protocol | Year | Estimated Loss | Attack Type | Recovery Status |
Bybit | 2025 | $1.4B | Compromised wallet interface | Partially via bounties |
Ronin Bridge | 2022 | $624M | Validator key compromise | Partially recovered |
Poly Network | 2021 | $611M | Smart contract exploit | Fully returned by hacker |
BNB Bridge | 2022 | $570M | Proof verifier bug | Most frozen on-chain |
Wormhole | 2022 | $320M | Signature verification bypass | Covered by Jump Crypto |
DMM Bitcoin | 2024 | $305M | Private key compromise | Under investigation |
PlayDapp | 2024 | $290M | Smart contract vulnerability | Unrecovered |
Cetus | 2025 | $223M | Spoofed token / liquidity drain | Partially recovered |
Euler Finance | 2023 | $197M | Flash loan / donate function flaw | Fully returned by hacker |
Nomad Bridge | 2022 | $190M | Message verification flaw | Partially returned |
Harmony Horizon | 2022 | $100M | Private key compromise (2-of-5 multisig) | Unrecovered |
Nobitex | 2025 | $90M | Hot wallet compromise | Under investigation |
Munchables | 2024 | $62.5M | Rogue developer / upgradeable proxy | Returned by developer |
Radiant Capital | 2024 | $53M | Multisig malware attack | Unrecovered |
Bybit (2025) — $1.4 Billion
The Bybit breach in February 2025 became the largest single crypto theft ever recorded. Attackers did not exploit a smart contract flaw. Instead, they compromised the development environment of Safe, a wallet infrastructure provider used by Bybit. Malicious JavaScript was injected into the wallet interface, altering what signers saw when approving transactions. The result was that over 401,000 ETH was drained from a cold wallet in a single disguised transaction. The FBI attributed the attack to North Korean state-sponsored hackers operating under the TraderTraitor campaign. The incident underscored that off-chain infrastructure, including developer tooling and user interfaces, can be just as dangerous as on-chain vulnerabilities.
Ronin Bridge (2022) — $624 Million
The Ronin Bridge, which supported the popular blockchain game Axie Infinity, was drained of 173,600 ETH and 25.5 million USDC in March 2022. The attack exploited the bridge’s reliance on a small validator set. A social engineering operation, later attributed to North Korea’s Lazarus Group, tricked a Sky Mavis engineer into downloading malware disguised as a job offer. This gave the attackers access to five of the nine validator keys needed to authorize withdrawals. The breach went undetected for six days, exposing significant gaps in monitoring and the centralization risks of validator-based bridges.
Poly Network (2021) — $611 Million
In August 2021, an attacker exploited a vulnerability in the cross-chain contract calls used by Poly Network for asset swaps. The flaw allowed the hacker to bypass security checks and authorize unauthorized withdrawals across Ethereum, BNB Chain, and Polygon. In an unusual twist, the attacker returned most of the funds over the following days, claiming the exploit was a white-hat exercise. The incident exposed the complexity of cross-chain architecture and the need for rigorous validation in multi-chain messaging systems.
BNB Bridge (2022) — $570 Million
In October 2022, hackers exploited a proof verification bug in the Binance Smart Chain bridge, minting 2 million BNB tokens worth approximately $570 million. The BNB Chain team responded by coordinating with validators to temporarily halt the network and freeze most of the stolen funds before they could be moved off-chain. The incident highlighted the tension between decentralization and the need for emergency intervention in bridge infrastructure.
Wormhole (2022) — $320 Million
In February 2022, an attacker bypassed the signature verification process on the Wormhole bridge connecting Ethereum and Solana. By injecting a fake system account, the hacker generated a fraudulent message instructing the bridge to mint 120,000 wrapped ETH with no backing collateral. Jump Crypto, the parent company of Wormhole, stepped in to replace the stolen funds with 120,000 ETH from its own reserves. The exploit stemmed from a code change pushed to GitHub on the same day as the attack, with the vulnerability in a deprecated and insecure verification function.
Euler Finance (2023) — $197 Million
On March 13, 2023, Euler Finance, an Ethereum-based lending protocol, suffered the largest flash loan attack in DeFi history. The attacker exploited two flaws: a missing liquidity check in the donateToReserves function (which allowed manipulation of equity and debt token balances) and a health score mechanism that let insolvent accounts retain collateral. Using a flash loan of 30 million DAI from Aave, the attacker leveraged these vulnerabilities across multiple token pools to extract approximately $197 million. In a rare outcome, the hacker returned the full amount over the following weeks after communicating with the Euler team via on-chain messages.
Harmony Horizon Bridge (2022) — $100 Million
Harmony’s Horizon bridge was drained of approximately $100 million in June 2022 after attackers compromised two of the five private keys required to approve transactions on its multisignature wallet. Security researchers had flagged the 2-of-5 signing threshold as dangerously low months before the attack. The exploit was later attributed to the Lazarus Group. Stolen tokens were swapped for ETH through decentralized exchanges and laundered through Tornado Cash. Despite a $1 million bounty offer, the funds were never recovered.
How DeFi Hacks Actually Work
DeFi exploits fall into several distinct categories, each targeting a different layer of the protocol stack. Understanding these categories is essential for evaluating the security posture of any DeFi platform.
Smart Contract Bugs
Smart contracts are self-executing programs deployed on a blockchain. Once deployed, their code is immutable in most cases, meaning bugs cannot be patched without deploying a new contract or using an upgradeable proxy pattern. Common vulnerabilities include reentrancy attacks (where a malicious contract repeatedly calls back into a victim contract before the first execution completes), integer overflow or underflow errors, unchecked return values, and faulty access control logic.
According to data from Halborn’s 2025 report, faulty input verification and validation has been the leading cause of direct contract exploitation in multiple years, accounting for approximately 34.6% of on-chain exploit cases. The open-source nature of DeFi means that attackers can study protocol code at their leisure, searching for logic errors that auditors may have missed. While professional audits reduce risk, they do not eliminate it. Euler Finance, for example, was audited by six different security firms before its $197 million exploit.
Flash Loan Attacks
Flash loans are a DeFi primitive that allows users to borrow large sums of capital without collateral, provided the loan is repaid within the same transaction. If the borrower fails to repay, the entire transaction reverts as if it never happened. This mechanism enables legitimate use cases such as arbitrage and collateral swaps, but it also gives attackers access to enormous capital for a single block.
In a typical flash loan attack, the attacker borrows millions of dollars, uses those funds to manipulate a protocol’s pricing oracle or internal token balances, extracts profit from the distorted state, and repays the loan, all in one atomic transaction. Flash loan attacks surged in 2024, making up 83.3% of eligible exploits according to Halborn’s analysis. The Euler Finance hack is a textbook example: the attacker borrowed 30 million DAI via flash loan, then used leveraged minting and a flawed donation function to extract nearly $197 million.
Oracle Manipulation
DeFi protocols rely on price oracles to determine the value of assets for lending, borrowing, and liquidation calculations. If an attacker can manipulate the price feed, even temporarily, they can create artificial conditions that allow them to borrow against inflated collateral or trigger liquidations that benefit their positions.
Oracle manipulation was the leading cause of DeFi hacks in 2021, accounting for approximately 32% of incidents that year. Protocols that rely on a single on-chain source for pricing, such as the spot price of a decentralized exchange pool, are particularly vulnerable. More robust designs use time-weighted average prices, multiple independent oracle sources, or decentralized oracle networks like Chainlink to reduce manipulation risk.
Bridge Vulnerabilities
Cross-chain bridges allow users to move assets between different blockchains by locking tokens on one chain and minting equivalent wrapped tokens on another. This design creates a concentrated pool of assets secured by the bridge’s validator set or smart contract logic. If either layer is compromised, the entire pool is at risk.
Bridge exploits have produced some of the largest losses in DeFi history, including the Ronin, Wormhole, BNB, Harmony, and Nomad incidents. Attack vectors range from validator key compromise and social engineering to signature verification bypasses and message authentication flaws. According to Chainalysis, bridge hacks accounted for roughly 69% of all funds stolen in DeFi during 2022, making them the single most dangerous category of DeFi infrastructure during that period.
Governance Attacks
Many DeFi protocols use token-based governance, where holders of a governance token can propose and vote on changes to protocol parameters, treasury allocations, and smart contract upgrades. If an attacker acquires enough voting power, either by purchasing tokens, borrowing them via flash loans, or exploiting delegation mechanisms, they can pass malicious proposals.
Governance attacks accounted for roughly 5% of DeFi incidents in both 2022 and 2024, according to Halborn’s research. While less common than smart contract exploits, governance attacks can be devastating because they leverage the protocol’s own decision-making mechanism against it. Mitigation strategies include time-lock delays on proposal execution, quorum requirements, and snapshot-based voting that prevents flash loan manipulation.
New to DeFi? Download the free guide: Inside the guide: The 10 most important DeFi protocols | Strategies used in decentralized finance | Tools professionals use to track markets |
Why Cross-Chain Bridges Are the Most Dangerous DeFi Infrastructure
Cross-chain bridges have consistently produced the highest-value exploits in DeFi. The Ronin Bridge ($624M), BNB Bridge ($570M), Wormhole ($320M), Harmony Horizon ($100M), and Nomad ($190M) represent a combined loss exceeding $1.8 billion from bridge exploits alone in 2022. The pattern continued in subsequent years, with bridges remaining a primary target for state-sponsored hacking groups.
Several structural factors make bridges uniquely vulnerable. First, bridges concentrate enormous pools of locked assets in a single contract or set of contracts. Unlike a lending protocol where assets are distributed across many individual positions, a bridge’s reserves represent the total value of all assets that users have transferred across chains. This creates a high-value, single-point-of-failure target.
Second, bridge security often depends on a small set of validators or signers. The Ronin Bridge relied on nine validators, and a compromise of just five was sufficient to drain the entire reserve. Harmony’s Horizon bridge required only two of five signatures to authorize transactions. When the number of required signers is low relative to the total set, the security model is only as strong as the weakest key holder.
Third, bridges operate at the intersection of multiple blockchain environments, each with different virtual machines, consensus mechanisms, and security assumptions. Verifying the state of one chain from another is a fundamentally complex problem, and the messaging protocols used to relay cross-chain information introduce additional attack surface. The Wormhole exploit, for example, targeted the signature verification logic that validated cross-chain messages on Solana.
Finally, bridge monitoring has historically been inadequate. The Ronin Bridge hack went unnoticed for six days. Nomad’s message verification flaw allowed anyone who saw the initial exploit transaction to replicate it, leading to a chaotic mass withdrawal by hundreds of different addresses. These monitoring gaps mean that even when an exploit is not sophisticated, the response time is too slow to prevent significant losses.
The bridge problem is not going away. As the multi-chain ecosystem expands and users demand seamless movement of assets between Layer 1 networks, Layer 2 rollups, and emerging chains, bridge infrastructure will only grow in importance and in the size of the assets it secures. The industry is experimenting with improved designs, including zero-knowledge proof-based bridges, optimistic verification with fraud proofs, and decentralized relayer networks, but each approach introduces its own trade-offs between security, speed, and cost. Until a demonstrably secure bridge standard emerges, cross-chain infrastructure will remain the most dangerous surface area in DeFi.
The Real Risks of DeFi
While headline-grabbing hacks capture public attention, the risk landscape in DeFi extends well beyond code exploits. The following table summarizes the primary risk categories that every DeFi participant should understand.
Risk Category | Description |
Smart Contract Risk | Bugs or logic errors in protocol code that attackers can exploit to drain funds or manipulate balances. |
Liquidity Risk | Sudden withdrawal of liquidity from pools, leaving remaining depositors with worthless or illiquid positions. |
Economic Exploits | Manipulation of pricing oracles, flash loan attacks, or arbitrage strategies that extract value from protocol mechanics. |
Rug Pulls | Developers abandon a project after raising funds, draining liquidity pools or minting tokens to sell at user expense. |
Governance Manipulation | Attackers acquire or borrow governance tokens to pass malicious proposals that redirect protocol funds. |
Bridge Risk | Cross-chain bridges concentrate large pools of assets behind validator sets or smart contracts that may be compromised. |
Private Key Compromise | Theft of signing keys through social engineering, malware, or insider threats, giving attackers direct control of wallets. |
The shift in attack patterns over recent years is also noteworthy. In the early years of DeFi, on-chain smart contract exploits dominated the threat landscape. By 2024 and 2025, off-chain attack vectors had overtaken on-chain exploits in total value stolen. Compromised private keys and wallet infrastructure accounted for more than half of all incidents in 2024 and were responsible for approximately 80% of stolen funds that year. In the first half of 2025, wallet compromises alone accounted for an estimated $1.71 billion in losses, roughly 69% of all funds stolen.
This evolution reflects a maturing codebase in many established protocols, but it also reveals that operational security, key management, and supply chain integrity have become the weakest links. Protocols that invest heavily in smart contract audits but neglect the security of their signing infrastructure, developer environments, and front-end code remain highly vulnerable.
Rug pulls deserve special mention as a distinct category of risk. Unlike external hacks, rug pulls involve the protocol’s own developers acting against user interests. Common patterns include developers deploying contracts with hidden withdrawal functions, creating upgradeable proxies where the developer retains the ability to redirect funds, or launching tokens with sell restrictions that only apply to buyers. The Munchables incident in 2024, where a rogue developer exploited an upgradeable proxy to assign themselves a million-unit balance and then drained $62.5 million in ETH, illustrates how insider access can be just as dangerous as external attacks. Due diligence on team backgrounds, contract upgradeability, and admin key controls is essential for identifying rug pull risk before it materializes.
The Security Framework Professionals Use
Before interacting with any DeFi protocol, experienced participants evaluate a set of security indicators. No single metric guarantees safety, but a structured assessment significantly reduces exposure to the most common risks. The following checklist represents the core due diligence framework used by security-conscious DeFi participants.
✓ Total Value Locked (TVL): Higher TVL generally indicates broader adoption and more at stake, but it also makes the protocol a more attractive target. Evaluate TVL trends over time rather than a single snapshot.
✓ Security Audits: Verify that the protocol has been audited by reputable firms. Review the audit reports for unresolved findings. Note that audits reduce risk but do not guarantee security, as demonstrated by Euler Finance, which had six audits before its exploit.
✓ Protocol Age and Track Record: Protocols that have operated for years without major incidents have a demonstrated resilience. Newer protocols carry higher uncertainty. Check deployment dates and historical incident records.
✓ Developer Activity: Active development signals ongoing maintenance and responsiveness to vulnerabilities. Monitor the protocol’s GitHub repository for commit frequency, issue resolution speed, and contributor diversity.
✓ Bug Bounty Programs: Protocols that offer substantial bug bounties incentivize white-hat researchers to disclose vulnerabilities before they can be exploited. Look for bounty programs on platforms like Immunefi, and check the maximum payout relative to the protocol’s TVL.
✓ Token Distribution and Governance Structure: Concentrated token holdings can enable governance attacks. Examine the distribution of governance tokens and the thresholds required to pass proposals. Look for time-lock mechanisms on critical changes.
✓ Multisig and Key Management: Understand who controls upgrade permissions and treasury access. Evaluate the multisig scheme (how many signers are required relative to the total), and whether cold storage or multi-party computation is used for key management.
✓ On-Chain Monitoring and Incident Response: Assess whether the protocol uses real-time monitoring tools to detect anomalous transactions. Protocols with published incident response plans and established relationships with security firms demonstrate a higher level of operational maturity.
Applying this framework consistently does not eliminate risk, but it establishes a baseline of due diligence that filters out the highest-risk protocols and identifies those with the strongest security posture.
The Future of DeFi Security
The DeFi security landscape is evolving in response to the scale and sophistication of attacks. Several trends are shaping the next generation of defense mechanisms.
Formal Verification is a mathematical approach to proving that smart contract code behaves exactly as intended under all possible conditions. Unlike traditional testing, which checks specific scenarios, formal verification exhaustively proves properties of the code. Adoption is growing among high-value protocols, particularly those handling bridge infrastructure and lending markets.
On-Chain Monitoring and AI-Driven Detection systems are becoming standard infrastructure. These tools analyze transaction patterns in real time, flagging anomalous behavior such as unusually large withdrawals, rapid draining of liquidity pools, or interactions with known exploit contracts. The goal is to reduce detection time from days, as in the Ronin case, to minutes or seconds.
Bug Bounty Expansion continues to grow as protocols recognize that incentivizing white-hat hackers is far less expensive than absorbing exploit losses. Leading bounty platforms now offer rewards exceeding $10 million for critical vulnerabilities. The economic logic is straightforward: paying a researcher $1 million to disclose a bug is vastly preferable to losing $200 million to an attacker.
Smart Contract Auditing Standards are becoming more rigorous. The industry is moving toward continuous auditing models, where security reviews are integrated into the development lifecycle rather than performed as one-time events before launch. New code changes, particularly those that modify core financial logic or access control, trigger re-audit requirements.
Improved Key Management practices are addressing the shift toward off-chain attack vectors. Multi-party computation wallets, hardware security modules, and threshold signature schemes are replacing simple multisig setups. Protocols are also hardening their developer environments, supply chains, and front-end code to prevent the kind of infrastructure-level compromise seen in the Bybit attack.
Despite these advances, the cat-and-mouse dynamic between attackers and defenders shows no signs of slowing down. As DeFi protocols grow in complexity and total value, the incentives for attackers scale accordingly. State-sponsored hacking groups, particularly those attributed to North Korea, have demonstrated increasing sophistication in targeting crypto infrastructure. The Lazarus Group alone has been linked to some of the largest thefts in history, including the Ronin Bridge, Harmony Horizon, and Bybit incidents. Their operations combine social engineering, supply chain attacks, and on-chain exploitation in ways that require defenders to think across every layer of the technology stack.
The protocols that survive long term will be those that treat security not as a checklist item, but as a continuous, organization-wide discipline. This means investing not just in smart contract audits, but in operational security training, infrastructure hardening, supply chain verification, real-time monitoring, and incident response planning. The cost of comprehensive security is high, but as the hack record demonstrates, the cost of inadequate security is far higher.
Conclusion
The history of DeFi hacks is a record of hard-earned lessons. From the $611 million Poly Network exploit in 2021 to the $1.4 billion Bybit breach in 2025, the scale of losses has grown alongside the ecosystem itself. Cross-chain bridges, flash loan mechanisms, and off-chain infrastructure have each served as primary attack surfaces at different points in DeFi’s evolution.
The patterns are clear. Concentrated signing authority, whether in bridge validators or multisig wallets, creates single points of failure. Missing validation checks in smart contract logic enable cascading exploits. Inadequate monitoring allows attackers to operate undetected for hours or even days. And the shift from on-chain to off-chain attack vectors means that code audits alone are no longer sufficient.
For anyone participating in decentralized finance, the takeaway is straightforward: security due diligence is not optional. Evaluate protocols using the framework outlined in this guide. Understand the specific risks associated with each category of DeFi infrastructure. And recognize that even the most audited, well-funded protocols can be compromised if their operational security does not match their on-chain security.
DeFi hacks are not an argument against decentralized finance. They are an argument for building it better. The protocols, researchers, and security firms that absorb these lessons and apply them will define the next chapter of the industry. Those that do not will continue to provide case studies for articles like this one.

