Hackere har allerede stjålet over 450 millioner dollar fra ~45 kryptoprotokoller i 2026
According to crypto analyst @jussy_world, in the first four months of 2026 alone, hackers have successfully attacked around 45 DeFi protocols and centralized platforms, stealing a total of more than $450 million. Just in the past two weeks (as of April 16), there have been 12 incidents, including:
- CoW Swap — frontend/DNS hijack
- Hyperbridge — fake message exploit (1 billion tokens minted, price crashed to zero)
- Dango — smart-contract bug ($410K)
- Silo V2 — oracle manipulation ($392K)
- BSC TMM — reserve manipulation ($1.67M)and many others.
Even major players like Bybit (a $1 billion attempt that was stopped in time) and Kraken (insider extortion) came under fire. On April 19, another major attack hit — Kelp DAO lost $293 million, becoming the biggest exploit of the year so far.
Why has 2026 already turned into a “hack season,” even though Q1 losses were significantly lower ($168–170 million across 34 protocols)? Analytics from Chainalysis, CertiK, Hacken, and other firms paint a clear picture: the problem isn’t just in the code, it’s systemic.
Main Reasons DeFi Protocols Are Hacked So Often
- Social engineering, phishing, private-key compromises, and multisig attacks dominate. Hackers spend months building trust with developers (as seen in the Drift Protocol case, $285 million stolen in April after a 6-month campaign at conferences). Insider attacks, fake support teams, blind signing, and unlimited approvals account for 95%+ of user wallet losses. Even projects with multiple audits (Resolv Labs — 18 audits, Venus — 5 audits) lose tens of millions due to operational security failures.
- Logical errors, oracle manipulation, reentrancy attacks, weak access control, and inherited bugs remain classic issues. DeFi moves too fast: new features outpace thorough audits and formal verification. Growing TVL attracts more hackers. The interconnected nature of protocols creates a “domino effect.”
- Frontends, DNS, cloud credentials, and wallet providers (like Zerion) are now prime targets. In 2025, infrastructure attacks alone accounted for 76% of all losses ($2.2 billion out of $2.9 billion total). Smart-contract exploits made up only 12%. The 2026 trend continues: hackers are moving “higher up the stack,” where traditional audits are powerless.
- The average exploit payout has increased. Hackers (including DPRK-linked groups) have become more professional, using AI for phishing and deepfakes. Attacks pay off quickly, and while blockchain is transparent, tracking stolen funds is still extremely difficult.
What’s Next?
Analysts warn: without radical changes, timelocks on multisigs, AI agents for continuous auditing, mandatory formal verification, and better user education on approvals, 2026 could break the records set in 2025 ($3.4 billion in total losses). Some protocols are already adding extra security layers, but the April “hack season” proved one thing: security isn’t a one-time audit, it’s an ongoing war.

Kommentarer