
- Crypto hacks in H1 2025 caused $3.01B in losses.
- Centralized exchanges were major targets.
- Laundering speed complicates recovery efforts.
Swiss blockchain firm Global Ledger reports $3.01 billion stolen through 119 hacks in H1 2025, predominantly affecting centralized exchanges, highlighting growing security vulnerabilities in crypto trading platforms.

These findings highlight urgent security challenges for centralized platforms, with accelerated laundering techniques complicating recovery efforts and pressuring exchanges to enhance security protocols.
Swiss blockchain analytics firm Global Ledger reports that $3.01 billion was lost through 119 crypto hacks in the first half of 2025. Centralized exchanges (CEXs) were notably vulnerable, accounting for over half of the total losses.
The report highlights the involvement of centralized exchanges as primary targets, suffering losses exceeding $1.63 billion. No direct statements from Global Ledger’s leadership were documented, leaving their issued reports as the primary information source.
The financial sectors and individual investors faced immediate repercussions, as the frequency and magnitude of hacks rose. Laundering of stolen funds has become markedly swift, sometimes occurring in as little as three minutes.
Stolen funds are primarily laundered swiftly, complicating recovery. The cybersecurity landscape is stressed under current anti-money laundering practices, which are often outpaced by the fast actions of hackers.
“Projects have to care about their old or legacy codebase if it was not stopped from operating completely.” – Yehor Rudytsia, Head of Forensics, Hacken
2025 has already surpassed 2024’s total hacks, complicating industry security efforts. The absence of executive statements from affected parties hints at a lack of immediate public strategies for remediation.
Historical patterns depicted in the report suggest a shift towards attacking centralized custodianship points over technical protocol exploits. With high-liquidity tokens featured in these incidents, the need for robust, automated security protocols remains highlighted.