entertainment

In 2022, it is DeFi projects that suffer the most attacks

It’s no secret that in 2022, the world of Web3 e Decentralized Finance (DeFi) It suffered a number of major exploits and attacks. From the attack of the Ronin Bridge to the breakthrough of the nomads, Top 10 exploits They caused themselves with a loss of more than $2 billion.

The 2022 Beosin Global Web3 Security Report revealed that of the 167 serious security incidents over the past year, those involving DeFi were the most aggressive. DeFi projects have been hacked 113 times, which is around 67.6% of the attacks recorded.

Track attacks on exchanges, in order, Non-Fungible Token Projects (NFTs)and cross-chain bridges and wallets.

According to the report, DeFi projects ranked second in terms of financial damage, with total losses amounting to $950 million. This is on top of the $1.89 billion lost over the past year due to cross-chain bridge exploits.

In total , $3.6 billion lost in the 2022 attacks. This represents an increase of 47.4% over the previous year’s totalwhich reported a loss of $2.4 billion in security exploit incidents.

Experts argue that the combination of the huge amount of DeFi projects that have popped up, the lack of pre-deployment security testing, and the value these projects offer are the reasons hackers are likely to choose this space.

Also, companies that deal with blockchain security They invite users to keep their private keysAs in 2023, the money lost due to the settlement of the latter will be due to its mismanagement.

In 2023, some exploits have already occurred. on January 3 Hackers stole $3.5 million to digital assets from GMX whale.

See also  The "American Republic" is the story of the origins of the United States and Europe

Despite this, December 2022 ended with Less value for money stolen from DeFijust $62 million in exploits.

Maggie Benson

"Bacon trailblazer. Certified coffee maven. Zombie lover. Tv specialist. Freelance communicator."

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
Close
Close