You are here

Most Crypto Hacks Don’t Start With Stolen Wallets—They Start in the Code

Published

27 minutes ago

on

May 20, 2026

| 14 views

-->

By

Jenna Ross

Graphics & Design

  • Howard Zack
  • Twitter
  • Facebook
  • LinkedIn
  • Reddit
  • Pinterest
  • Email

Most Crypto Hacks Don’t Start With Stolen Wallets—They Start in the Code

Early crypto hacks often focused on stealing wallet credentials. Today, many of the industry’s biggest losses stem from vulnerabilities hidden in platform software.

This graphic, created in partnership with Inigo, breaks down the top 10 ways hackers steal crypto. 

Ranking the Top 10 Crypto Hacking Methods

From May 2025 to April 2026, the most costly method was a type of infrastructure attack known as cross-chain data manipulation

These attacks target systems that move assets between different blockchains. Hackers take advantage of weaknesses in how chains communicate, allowing them to manipulate transactions or steal funds during transfers. 

Technique Primary Risk Category % of Crypto Losses
Cross-Chain Data Manipulation Infrastructure 19%
Admin Compromise + Token Manipulation* Smart Contract 18%
Spoof Token Exploit Smart Contract 14%
Private Key Compromised Custody 11%
Liquidity Pool Exploit Smart Contract 8%
Hot Wallet Hack Custody 6%
Re-Entrancy Exploit Smart Contract 3%
Third-Party API Compromise Infrastructure 3%
Bonding Curve Exploit Smart Contract 2%
Price Oracle Manipulation Smart Contract 2%
Other N/A 14%

* Involves both custody and smart contract risks. Source: DeFiLlama based on losses from hacks between May 1, 2025 and April 30, 2026.

Attacks on code within smart contracts make up five of the top 10 most costly methods. In these cases, hackers are exploiting flaws in the rules that automatically move, price, or manage assets. 

To make the ranking easier to understand, here’s what each remaining hacking method means in plain English.

Admin Compromise + Token Manipulation

Hackers gain access to privileged admin controls where they can then exploit the code to approve fake assets as collateral from the inside.

Spoof Token Exploit

Attackers use code to create fake or misleading tokens that trick users or platforms into treating them as real. This can be used to trigger fraudulent trades or drain funds.

Private Key Compromised

A private key functions like the password to a crypto wallet. If hackers steal it, they can gain full access to the wallet and transfer funds out instantly. Often, hackers use phishing or other forms of social engineering to trick victims into handing over sensitive credentials.

Liquidity Pool Exploit

Hackers target the pools of assets that power decentralized trading platforms. These code attacks often exploit flaws in pricing, trading, or withdrawal logic.

Hot Wallet Hack

Hot wallets are connected to the internet, making them convenient but more exposed. If attackers gain access, they can quickly transfer funds out.

Re-Entrancy Exploit

These attacks trick a smart contract into sending funds repeatedly before it updates its balance. It is one of the best-known examples of a bug hidden in crypto code.

Third-Party API Compromise

Crypto platforms often rely on outside software connections to send or receive data. If those connections are compromised, attackers may be able to manipulate transactions or platform behavior.

Bonding Curve Exploit

Some crypto projects use automated formulas to set token prices. Hackers exploit weaknesses in those formulas to manipulate prices for profit.

Price Oracle Manipulation

Price oracles feed market prices into apps. If hackers manipulate that price data, they can trigger profitable trades, loans, or liquidations.

The Biggest Crypto Risks Are Evolving

As crypto platforms become more complex, many of the industry’s biggest security threats are shifting away from stolen credentials and toward vulnerabilities embedded in the systems themselves. Staying aware of emerging attack methods—and continuing to strengthen platform security—will be critical as the industry evolves.

In 2026, turning insight into action will define who stays ahead of fraud. Explore a data-driven view of risk at Inigo’s insights hub.

You may also like

  • Crime2 days ago

    The Largest Employee Fraud Cases in 2025–2026

    Employee embezzlement schemes stole tens of millions before being detected. See the biggest fraud cases from May 2025 to April 2026.

  • Crime5 days ago

    The New Face of Fraud: Five Scams Costing Companies Millions

    From deepfakes to phishing, these social engineering scams are becoming more convincing—and more expensive.

  • Crime1 week ago

    Mapped: Fraud Vulnerability by Country in 2025

    Which countries face the highest fraud risk in 2025? Explore global fraud vulnerability rankings to see how economies compare.

  • Geopolitics1 month ago

    Ranked: Top 10 Countries With the Most U.S. Troops in 2025

    The global footprint of U.S. troops remains extensive with deployments concentrated across a small group of strategic host countries.

  • Geopolitics2 months ago

    Countries Losing Trust in the U.S.

    Global perceptions of trust in the United States are shifting, reflecting a broader reassessment of alliances in a more uncertain world.

  • Real Estate3 months ago

    Mapped: The U.S. Cities at Risk of Sinking

    Across the U.S., the ground beneath many major cities is gradually subsiding. 25 out of America’s 28 largest cities are slowly sinking.

  • Real Estate3 months ago

    Charted: The Escalating Destruction of U.S. Wildfires

    Wildfires in the United States are becoming more destructive, with many of the most severe seasons occurring in the past decade.

  • Real Estate3 months ago

    Mapped: The U.S. States Building the Most Homes in the Fire Line

    As housing spreads into the fire line, exposure is rising sharply, compounding loss potential and challenging long-term insurability.

  • Real Estate3 months ago

    The Rising Costs of U.S. Construction Inputs

    Rising labor and material costs mean every insured dollar now rebuilds less, widening the recovery gap after disasters across the United States.

  • Real Estate3 months ago

    How Do Interest Rates Impact the Real Estate Market?

    Lower interest rates have often supported stronger real estate returns and improved valuations. Will that trend return in 2026?

  • Real Estate3 months ago

    6 Trends Reshaping U.S. Property Insurance

    From climate volatility to economic and technological shifts, a wide range of forces are reshaping property risk in the U.S.

  • Environment7 months ago

    Ranked: The 10 Most Powerful U.S. Hurricanes (1900-2025)

    Hurricanes are a defining force in the U.S. climate, capable of leaving behind profound environmental, social, and economic devastation.

  • Environment8 months ago

    Mapped: Which U.S. Cities Saw Record-Breaking Temperatures in 2024?

    Global temperatures are climbing—but how is this trend playing out across the United States, and which regions are being hit the hardest?

  • Environment9 months ago

    Ranked: The Most Expensive U.S. Wildfire Events, So Far

    Wildfire events are growing increasingly frequent and destructive around the world as human-driven climate impacts continue to escalate.

  • Environment9 months ago

    Mapped: The United States of Drought

    Drought grips much of the U.S., affecting over 60 million people today.

  • Healthcare10 months ago

    The $58B Weight Loss Drug Market in One Chart

    Weight loss drugs have surged in popularity in recent years, transforming the pharmaceutical landscape. Which brands are dominating this space?

  • Healthcare10 months ago

    Ranked: Which Areas Receive the Most Pharma R&D?

    The pharmaceutical industry has made enormous strides in treating—and even curing—a wide range of diseases and conditions. Which areas are seeing the most R&D in 2025?

  • Healthcare10 months ago

    The $5.6T Pharmaceutical Industry in One Chart

    Pharma giants don’t just make medicine—they shape the future of healthcare. Who are the world’s major players?

  • Crime10 months ago

    6 Fraud Trends Reshaping Risk in 2025

    The fraud and financial crime landscapes are evolving rapidly. What are the key threats shaping risk in 2025?

  • Cryptocurrency10 months ago

    Ranked: The 10 Biggest Digital Heists

    Some of the largest digital heists didn’t rely on brute-force hacking, they exploited the weakest link in security: human trust.

  • Crime10 months ago

    The Most Costly Financial Crimes in 2024

    As cybersecurity threats escalate, which financial crimes are causing the most harm? The FBI has the data.

  • Crime11 months ago

    Mapped: U.S. Financial Crime Activity by State

    Suspicious activity has been rising in the U.S., but is it spread evenly throughout all 50 states? Certainly not.

  • Crime11 months ago

    Ranked: America’s Most Common Financial Crimes

    As technology and AI become more widespread, fraud and other suspicious activity are rising across America. Which types are the most common?

  • Economy11 months ago

    Tracking the $3.1 Trillion Financial Crime Pandemic

    From money laundering to fraud, financial crime acts as a drain on the economy, totaling an incredible $3.1 trillion.

  • Politics12 months ago

    Which Types of Government Rule the World?

    Over half the global population is ruled by non-centrist types of government, including autocracies and left or right wing parties.

  • Politics12 months ago

    Breaking Down the $524 Billion Investment Needed to Rebuild Ukraine

    Ukraine will require an estimated $524B over the next decade to recover from the Russia-Ukraine war. Which sectors have been most impacted?

  • Politics1 year ago

    Are Tariffs Causing U.S. Inflation Fears?

    Amid tariff increases, consumers’ expectations for U.S. inflation in the next five years have reached their highest level since March 1991.

  • Politics1 year ago

    Ranked: Executive Orders by President in the First 100 Days

    In his first 100 days, President Trump has issued far more executive orders than any other president in history.

Subscribe

Please enable JavaScript in your browser to complete this form.Join 375,000+ email subscribers: *Sign Up