Cryptocurrency Losses: How $118 Million Was "Swallowed" in December 2024

December 2024 has left a costly lesson for the crypto ecosystem. According to a report from leading blockchain security firm CertiK, a total of $118 million was exploited by cybercriminals through security vulnerabilities. This figure is not just a statistic but evidence of the sophistication of modern attacks and the persistent existence of bugs in blockchain protocols. Notably, $93.4 million of this total loss came from phishing campaigns—social engineering vulnerabilities that even users can fall victim to if not warned. Incidents involving Trust Wallet, Flow blockchain, and Unleash Protocol revealed dangerous bugs that the industry has yet to fully control.

Social Engineering Bugs: Phishing Dominates with $93.4 Million

Phishing techniques remain the most effective attack weapon. The vulnerabilities exploited by attackers are not from code but from user psychology. Fake email chains, mimicking app interfaces exactly like the originals, or posting deceptive airdrop notices on fake support channels—these tactics can steal $93.4 million from crypto investors.

Current phishing bugs are no longer basic. Attackers now use independent blockchain domain tools to create false legal advantages. They deploy smarter automatic wallet withdrawal scripts capable of stealing multiple asset types simultaneously from victims. Some campaigns are even tailored to target specific community groups within a protocol, rather than broad fishing.

Another aspect of these bugs is cross-chain coordination. Attackers are not only attacking on Ethereum but also exploiting similar bugs on BNB Chain and Polygon simultaneously. As security teams’ staffing decreases during the year-end holidays and cybercriminal organizations face financial pressures, these bugs become golden opportunities for attacks.

Major Bugs: When Big Projects Are Also “Hacked”

December 2024 is not only about large total losses but also specific incidents showing many major projects still harbor serious bugs.

Trust Wallet, a widely used wallet app with millions of users worldwide, was compromised through a bug in its seed phrase recovery mechanism. Attackers used a fake browser extension to steal seed phrases, resulting in $8.5 million in stolen assets. This is a bug related to authentication and version control—a vulnerability the industry is still learning to prevent.

Flow blockchain faced another bug: the private keys of validator nodes were leaked, allowing attackers to manipulate the blockchain governance process. Total damage: $3.9 million. This is a bug related to key management and governance voting processes—elements that should be well protected.

Unleash Protocol also fell victim to a bug: attackers exploited a flaw in its flash loan mechanism combined with oracle price manipulation across multiple DEXs. By coordinating these exploits, they stole $3.9 million.

Beyond these incidents, security analysts at CertiK identified many other bugs—from basic smart contract vulnerabilities, private key leaks, to sophisticated combinations of technical exploits and psychological manipulation.

Worrying Trends: Increasing Bugs, Growing Losses

Looking back at the last three months of 2024, the picture is not optimistic. October saw $72 million exploited, November increased to $86 million (a 37% rise), and December surged to $118 million. This is not random fluctuation but a clear upward trend.

Phishing bugs are becoming more effective. They accounted for 68% of total losses in October, 74% in November, and rose to 79% in December. New bugs also emerged with the launch of new protocols and expanding cross-chain interactions.

However, there is a small bright spot: despite increasing losses, the average loss per incident slightly decreased. This indicates bugs are no longer concentrated in core vulnerabilities of major projects but are spreading to more areas. Attackers are shifting tactics to target a broader scope rather than just wealthy targets.

Month Total Loss Phishing % Number of Major Incidents
10/2024 $72 million 68% 4
11/2024 $86 million 74% 5
12/2024 $118 million 79% 7

Preventing Bugs: From Technology to User Awareness

To reduce bugs, the industry is deploying a range of new technical solutions.

First, multi-signature wallets. Instead of a single private key controlling all assets, major protocols now require multiple signatures to approve transactions. If one key is compromised, damage can still be limited.

Second, time-locked transactions. For large amounts exceeding certain thresholds, transactions are locked for a period, allowing managers to detect and block suspicious activity.

Third, mandatory security audits before mainnet launch. Firms like CertiK review all code, economic logic, and potential vulnerabilities before a protocol is publicly released.

Additionally, major wallet providers are implementing transaction simulation features—allowing users to preview transaction outcomes before execution. Insurance protocols are also expanding options to protect DeFi participants.

But technology is only part of the solution. User awareness must also be raised. Every crypto user should:

  • Carefully verify URLs before visiting
  • Always confirm airdrop notifications through official channels
  • Use hardware wallets for large holdings
  • Avoid clicking on unwanted links
  • Never share seed phrases or private keys

Outlook for 2025: New Bugs Await

2025 will bring new security challenges. Phishing campaigns augmented by AI will become more convincing and harder to detect. Cross-chain interactions will create new attack surfaces that are not yet fully understood.

Particularly, the development of quantum technology could threaten current cryptographic standards that the entire crypto ecosystem relies on. However, opportunities also emerge: formal verification tools are improving, and decentralized security networks offer promising defensive prospects.

The crypto ecosystem must continue adapting. Today’s bugs will teach lessons for tomorrow’s vulnerabilities.

Conclusion

The $118 million total loss in December 2024 is not just a statistic. It’s a wake-up call for the entire industry. Social engineering bugs (phishing) account for 79% of total losses, highlighting that human factors remain the weakest link. Major incidents involving Trust Wallet, Flow, and Unleash Protocol show that no project is completely immune.

The immediate challenge is balancing innovation with security. The industry must push forward with technical solutions like multi-sig wallets, mandatory audits, and anomaly detection tools. Simultaneously, educating users about phishing vulnerabilities should be a top priority.

The race between security providers and attackers continues. Today’s bugs will be fixed, but new ones will appear. The key is for the industry to learn from each incident and continuously improve defenses.

Frequently Asked Questions

What is a bug in the context of cryptocurrency?
A bug is a weakness or flaw in the security system, which can stem from smart contract code, governance processes, or human psychology (phishing). Attackers exploit these bugs to steal assets.

How much was lost to phishing in December 2024?
Phishing accounted for $93.4 million of the total $118 million exploited, representing 79% of all exploits that month.

Which project suffered the biggest loss?
Trust Wallet lost $8.5 million, while Flow and Unleash Protocol each lost $3.9 million.

What are the trends in crypto exploits?
Losses increased from $72 million (October) to $86 million (November), then to $118 million (December). Phishing is becoming more prevalent, with increasingly sophisticated and targeted attacks.

What should users do to protect themselves?
Carefully verify URLs, enable transaction simulation, use hardware wallets for large funds, confirm airdrops via official channels, and never share seed phrases.

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
0/400
No comments
  • Pin