Skip to main content

Phishing Drives Majority of Web3 Losses to $464M in Q1, Hacken



Hacken’s Q1 2026 security snapshot tallies $464.5 million in losses across 43 Web3 incidents, underscoring a shift in where attackers hit and how damage accumulates. The report highlights phishing and social-engineering campaigns as the dominant threat, totaling $306 million in losses for the quarter. A separate, highly disruptive incident—a $282 million hardware-wallet scam in January—was responsible for 81% of the quarter’s damage, according to Hacken. Smart-contract exploits reached $86.2 million, while access-control failures, including compromised keys and cloud-service breaches, accounted for $71.9 million. The quarter stands as the second-lowest first quarter since 2023, helped by the absence of a Bybit-scale mega hack that drove much of the year-ago decline.


Hacken’s chief executive and co-founder, Yev Broshevan, emphasized a notable trend: the costliest failures increasingly occur outside the code itself. “The most expensive failures happen outside the code layer entirely,” he told Cointelegraph, pointing to real-world weaknesses in operational and infrastructure layers that traditional code audits often miss.


For context, Hacken’s review arrives as regulators and institutional players sharpen expectations around security. The report notes that regulatory regimes such as the European Union’s Markets in Crypto-Assets Regulation (MiCA) and the Digital Operational Resilience Act (DORA) are moving from framework to enforcement, while regulators in the UAE, Singapore, and Dubai’s regulator, among others, tighten oversight and incident-response requirements. These shifts are shaping what Hacken calls “regulator-ready” security stacks that demand continuous monitoring and rapid containment measures.


Key takeaways



  • $464.5 million in losses across 43 incidents in Q1 2026, with phishing/social engineering driving $306 million of that total. A single January incident of $282 million hardware-wallet theft accounted for a large share of the quarter’s damage.

  • Smart-contract exploits totaled $86.2 million, while $71.9 million stemmed from access-control and compromised-key or cloud-service failures.

  • The quarter marks the second-lowest first quarter since 2023, aided by the absence of a mega hack on the scale of Bybit’s 2025 incident.

  • Attack patterns are shifting toward operational and infrastructure risk, reinforcing the view that audits of on-chain code alone are insufficient to measure a protocol’s security posture.

  • Regulators are tightening expectations. MiCA, DORA, Dubai’s VARA, Singapore’s Basel-aligned requirements, and the UAE’s Capital Market Authority push for stronger incident reporting, continuous monitoring, and defined response timelines.


Operational risk dominates the early 2026 landscape


The Hacken analysis stresses a transition in the vulnerability ledger from purely on-chain code issues to failures rooted in operations and infrastructure. The most expensive losses, the report suggests, arise from misconfigurations, compromised credentials, and weak third-party integrations rather than only from bugged smart contracts. This is consistent with a broader industry message: a robust security program must cover people, processes, and technology in parallel with code audits.


Hacken’s interview with Broshevan reinforces this view: the most consequential incidents tend to emerge from non-contract layers, such as identity and access management, cloud configurations, and supply-chain dependencies. The result is a security problem that requires defense-in-depth measures that extend beyond formal audits of deployed code.


Legacy code and multi-year vulnerabilities persist


Even as the industry grapples with modern attack vectors, the report highlights several high-cost incidents rooted in legacy deployments or well-known vulnerability patterns. Notably, a $26.4 million loss at Truebit stemmed from a Solidity contract bug deployed roughly five years ago. Venus Protocol faced a donation-style attack that exploited long-standing patterns around contract governance. In another example, a $40 million loss occurred via a North Korea-linked fake venture-capital outreach targeting Step Finance, illustrating how social-engineering campaigns still deliver significant damage.


In parallel, Resolv Labs experienced a compromise of its AWS key-management service, illustrating how access-control failures can underpin large losses even when the code itself isn’t the root cause. Hacken’s incident mapping also flags the broader “playbook” that attackers used in 2025—fake VC outreach, malicious video-call tooling, and endpoint compromises—that reportedly contributed to roughly $2.04 billion in sector-wide losses that year.


Beyond these marquee cases, six audited projects—among them Resolv (18 audits) and Venus (five auditing firms)—accounted for $37.7 million in losses. The data hints at a nuanced relationship between audit activity and loss exposure: higher-value protocols with more assets at stake may attract more sophisticated attackers, even if audited.


Audits, TVL, and the resilience gap


The finding that six audited projects were responsible for millions in losses despite having undergone multiple audits raises a practical question for builders: does audit severity or frequency translate into real-world risk reduction? Hacken notes that these audited protocols typically carry higher total value locked (TVL), which equates to bigger prize pools for attackers. In other words, audits alone may not solve the complex, multi-layer risk profile faced by high-TVL projects, underscoring the need for continuous security monitoring and layered defenses.


Regulatory tightening and the move toward “regulator-ready” security


The quarter’s regulatory backdrop reinforces the story that security is becoming a market and a compliance issue. MiCA and DORA are moving deeper into enforcement, with regional regulators increasing expectations for ongoing security practices. In Dubai, the Virtual Assets Regulatory Authority tightened its Technology and Information Rulebook, while Singapore has enforced Basel-aligned capital and rapid incident-notification timelines. The UAE’s new Capital Market Authority has assumed broader digital-asset oversight with stiffer penalties. Hacken frames these developments as a call to operators to demonstrate constant security readiness, not just to pass a one-off audit.


As part of this shift, Hacken advocates a concrete framework for “regulator-ready” security architectures. The blueprint includes:



  • Proof-of-reserves attestations backed by daily internal reconciliation;

  • 24/7 on-chain monitoring across treasury wallets and privileged roles;

  • Automated circuit-breakers for minting and governance actions;

  • Incident notification clocks calibrated to the strictest applicable standard.


Hacken also references a spectrum of response-time targets, distinguishing between “realistic” and “aspirational” goals. Realistic aims include awareness within 24 hours, labeling within four hours, and blocking within 30 seconds. Aspirational targets envision detection within 10 minutes and a 1-second block, drawing on data from Global Ledger’s 2025 Laundering Race. While ambitious, these benchmarks outline concrete steps for projects seeking to align with regulator expectations and institutional counterparties.


Threat actors, playbooks, and the evolving risk landscape


The report keeps returning to the human factor: North Korean actor clusters are identified as the most consistent operational threat in Q1 2026. The combination of social-engineering campaigns, fake professional outreach, and compromised employee endpoints continues to provide a reliable pathway to large losses. The Step Finance case and the Bitrefill-related infrastructure breach illustrate a broader pattern where attackers blend social manipulation with technical exploitation to extract value, often targeting high-value protocols with sophisticated tooling.


For investors, developers, and operators, the takeaway is clear: a successful‑looking deployment with strong smart contracts can still be undermined by weak operational practices, poor key management, or insufficient incident response readiness. The evolving threat landscape demands a multi-layered security approach, ongoing monitoring, and a clear plan for rapid containment—precisely what regulators are now pushing as non-negotiable standards. For builders, this means integrating security into product design from day one and maintaining a culture of continuous testing, diligence, and resilience.


Further reading and related reporting reinforce the broader context: industry-wide security incidents in early 2026 came with a cautionary reminder that DeFi risk resides not just in code but in how projects operate, govern, and respond under pressure. As enforcement tightens and security expectations rise, market participants will be watched not just for audits and audits’ results, but for visible, verifiable resilience across people, processes, and technologies.


Looking ahead, observers will be watching whether Q2 2026 echoes the Q1 trend toward infrastructure and operational risks or whether new defenses and policy measures begin to close the gap. The balance between code quality, operational hygiene, and regulatory compliance will determine how quickly the ecosystem can move toward a posture that can withstand both sophisticated attacks and tougher supervisory regimes.



https://www.cryptobreaking.com/phishing-drives-majority-of-web3/?utm_source=blogger%20&utm_medium=social_auto&utm_campaign=Phishing%20Drives%20Majority%20of%20Web3%20Losses%20to%20$464M%20in%20Q1,%20Hacken%20

Comments

Popular posts from this blog

Scaramucci Family Invests $100M in Trump-Backed Bitcoin Mining Firm

The recent investment in American Bitcoin highlights the growing interest and participation of prominent figures and families in the cryptocurrency mining sector, particularly in the United States. With over $100 million from the Scaramucci family’s Solari Capital and backing from notable entrepreneurs and investors, American Bitcoin is solidifying its position as a significant player in the evolving blockchain and crypto markets. This move underscores the increasing institutional and individual involvement in Bitcoin and related assets, shaping the future of the crypto industry amidst regulatory and market dynamics. The Scaramucci family’s private investment firm, Solari Capital, has committed over $100 million to American Bitcoin, a major U.S.-based mining company. American Bitcoin raised $220 million in a funding round before going public via reverse merger, with notable backers including Tony Robbins, Charles Hoskinson, Grant Cardone, and Peter Diamandis. The company ...

Interactive Brokers Now Accepts USDC for Account Funding

Interactive Brokers Expands Crypto Offerings with Stablecoin Funding Electronic brokerage firm Interactive Brokers has significantly enhanced its cryptocurrency services by allowing clients to fund their accounts with stablecoins that are seamlessly converted into US dollars. This move aims to streamline international trading and address longstanding issues surrounding cross-border capital movement. Key Takeaways Clients can now use stablecoins like USDC on the Ethereum, Solana, and Base blockchains for instant, 24/7 account funding. The stablecoins are converted immediately into US dollars, credited directly to client accounts without dependence on traditional banking hours. Support for Ripple USD and PayPal USD is anticipated to roll out next week, further expanding stablecoin options. The initiative targets reducing costs and delays associated with conventional fiat wire transfers. Tickers mentioned: none Sentiment: Positive Price impact: Neutral; the move enhances transactional ...

What Does it Mean When BTC Futures Turn Negative Compared to Spot Price?

Recent shifts in the cryptocurrency market highlight a growing cautious sentiment among traders, as the Bitcoin futures-to-spot basis has turned negative for the first time since March 2025. This development suggests a potential cooling of investor enthusiasm, with traders showing a preference to de-risk amid increasing market volatility. The trend underscores ongoing uncertainty in the crypto markets, impacting Bitcoin’s price outlook and trading dynamics. Bitcoin futures-spot basis has dipped into negative territory, signaling increased caution among traders. Internal exchange flow surges often precede heightened volatility and liquidity stress. The market’s leverage ratio has decreased, indicating a healthier futures environment and reduced forced-liquidation risks. Historical patterns of negative basis may point either to a market bottom or further downside, depending on subsequent price movements. Bitcoin futures-spot basis signals two different pathways Bitcoi...