
Published
27 minutes ago
on
May 20, 2026
| 14 views
-->
By
Jenna Ross
Graphics & Design
- Howard Zack







Most Crypto Hacks Don’t Start With Stolen Wallets—They Start in the Code
Early crypto hacks often focused on stealing wallet credentials. Today, many of the industry’s biggest losses stem from vulnerabilities hidden in platform software.
This graphic, created in partnership with Inigo, breaks down the top 10 ways hackers steal crypto.
Ranking the Top 10 Crypto Hacking Methods
From May 2025 to April 2026, the most costly method was a type of infrastructure attack known as cross-chain data manipulation.
These attacks target systems that move assets between different blockchains. Hackers take advantage of weaknesses in how chains communicate, allowing them to manipulate transactions or steal funds during transfers.
| Technique | Primary Risk Category | % of Crypto Losses |
|---|---|---|
| Cross-Chain Data Manipulation | Infrastructure | 19% |
| Admin Compromise + Token Manipulation* | Smart Contract | 18% |
| Spoof Token Exploit | Smart Contract | 14% |
| Private Key Compromised | Custody | 11% |
| Liquidity Pool Exploit | Smart Contract | 8% |
| Hot Wallet Hack | Custody | 6% |
| Re-Entrancy Exploit | Smart Contract | 3% |
| Third-Party API Compromise | Infrastructure | 3% |
| Bonding Curve Exploit | Smart Contract | 2% |
| Price Oracle Manipulation | Smart Contract | 2% |
| Other | N/A | 14% |
* Involves both custody and smart contract risks. Source: DeFiLlama based on losses from hacks between May 1, 2025 and April 30, 2026.
Attacks on code within smart contracts make up five of the top 10 most costly methods. In these cases, hackers are exploiting flaws in the rules that automatically move, price, or manage assets.
To make the ranking easier to understand, here’s what each remaining hacking method means in plain English.
Admin Compromise + Token Manipulation
Hackers gain access to privileged admin controls where they can then exploit the code to approve fake assets as collateral from the inside.
Spoof Token Exploit
Attackers use code to create fake or misleading tokens that trick users or platforms into treating them as real. This can be used to trigger fraudulent trades or drain funds.
Private Key Compromised
A private key functions like the password to a crypto wallet. If hackers steal it, they can gain full access to the wallet and transfer funds out instantly. Often, hackers use phishing or other forms of social engineering to trick victims into handing over sensitive credentials.
Liquidity Pool Exploit
Hackers target the pools of assets that power decentralized trading platforms. These code attacks often exploit flaws in pricing, trading, or withdrawal logic.
Hot Wallet Hack
Hot wallets are connected to the internet, making them convenient but more exposed. If attackers gain access, they can quickly transfer funds out.
Re-Entrancy Exploit
These attacks trick a smart contract into sending funds repeatedly before it updates its balance. It is one of the best-known examples of a bug hidden in crypto code.
Third-Party API Compromise
Crypto platforms often rely on outside software connections to send or receive data. If those connections are compromised, attackers may be able to manipulate transactions or platform behavior.
Bonding Curve Exploit
Some crypto projects use automated formulas to set token prices. Hackers exploit weaknesses in those formulas to manipulate prices for profit.
Price Oracle Manipulation
Price oracles feed market prices into apps. If hackers manipulate that price data, they can trigger profitable trades, loans, or liquidations.
The Biggest Crypto Risks Are Evolving
As crypto platforms become more complex, many of the industry’s biggest security threats are shifting away from stolen credentials and toward vulnerabilities embedded in the systems themselves. Staying aware of emerging attack methods—and continuing to strengthen platform security—will be critical as the industry evolves.

In 2026, turning insight into action will define who stays ahead of fraud. Explore a data-driven view of risk at Inigo’s insights hub.
You may also like
-

Crime2 days ago
The Largest Employee Fraud Cases in 2025–2026
Employee embezzlement schemes stole tens of millions before being detected. See the biggest fraud cases from May 2025 to April 2026.
-

Crime5 days ago
The New Face of Fraud: Five Scams Costing Companies Millions
From deepfakes to phishing, these social engineering scams are becoming more convincing—and more expensive.
-

Crime1 week ago
Mapped: Fraud Vulnerability by Country in 2025
Which countries face the highest fraud risk in 2025? Explore global fraud vulnerability rankings to see how economies compare.
-

Geopolitics1 month ago
Ranked: Top 10 Countries With the Most U.S. Troops in 2025
The global footprint of U.S. troops remains extensive with deployments concentrated across a small group of strategic host countries.
-

Geopolitics2 months ago
Countries Losing Trust in the U.S.
Global perceptions of trust in the United States are shifting, reflecting a broader reassessment of alliances in a more uncertain world.
-

Real Estate3 months ago
Mapped: The U.S. Cities at Risk of Sinking
Across the U.S., the ground beneath many major cities is gradually subsiding. 25 out of America’s 28 largest cities are slowly sinking.
-

Real Estate3 months ago
Charted: The Escalating Destruction of U.S. Wildfires
Wildfires in the United States are becoming more destructive, with many of the most severe seasons occurring in the past decade.
-

Real Estate3 months ago
Mapped: The U.S. States Building the Most Homes in the Fire Line
As housing spreads into the fire line, exposure is rising sharply, compounding loss potential and challenging long-term insurability.
-

Real Estate3 months ago
The Rising Costs of U.S. Construction Inputs
Rising labor and material costs mean every insured dollar now rebuilds less, widening the recovery gap after disasters across the United States.
-

Real Estate3 months ago
How Do Interest Rates Impact the Real Estate Market?
Lower interest rates have often supported stronger real estate returns and improved valuations. Will that trend return in 2026?
-

Real Estate3 months ago
6 Trends Reshaping U.S. Property Insurance
From climate volatility to economic and technological shifts, a wide range of forces are reshaping property risk in the U.S.
-

Environment7 months ago
Ranked: The 10 Most Powerful U.S. Hurricanes (1900-2025)
Hurricanes are a defining force in the U.S. climate, capable of leaving behind profound environmental, social, and economic devastation.
-

Environment8 months ago
Mapped: Which U.S. Cities Saw Record-Breaking Temperatures in 2024?
Global temperatures are climbing—but how is this trend playing out across the United States, and which regions are being hit the hardest?
-

Environment9 months ago
Ranked: The Most Expensive U.S. Wildfire Events, So Far
Wildfire events are growing increasingly frequent and destructive around the world as human-driven climate impacts continue to escalate.
-

Environment9 months ago
Mapped: The United States of Drought
Drought grips much of the U.S., affecting over 60 million people today.
-

Healthcare10 months ago
The $58B Weight Loss Drug Market in One Chart
Weight loss drugs have surged in popularity in recent years, transforming the pharmaceutical landscape. Which brands are dominating this space?
-

Healthcare10 months ago
Ranked: Which Areas Receive the Most Pharma R&D?
The pharmaceutical industry has made enormous strides in treating—and even curing—a wide range of diseases and conditions. Which areas are seeing the most R&D in 2025?
-

Healthcare10 months ago
The $5.6T Pharmaceutical Industry in One Chart
Pharma giants don’t just make medicine—they shape the future of healthcare. Who are the world’s major players?
-

Crime10 months ago
6 Fraud Trends Reshaping Risk in 2025
The fraud and financial crime landscapes are evolving rapidly. What are the key threats shaping risk in 2025?
-

Cryptocurrency10 months ago
Ranked: The 10 Biggest Digital Heists
Some of the largest digital heists didn’t rely on brute-force hacking, they exploited the weakest link in security: human trust.
-

Crime10 months ago
The Most Costly Financial Crimes in 2024
As cybersecurity threats escalate, which financial crimes are causing the most harm? The FBI has the data.
-

Crime11 months ago
Mapped: U.S. Financial Crime Activity by State
Suspicious activity has been rising in the U.S., but is it spread evenly throughout all 50 states? Certainly not.
-

Crime11 months ago
Ranked: America’s Most Common Financial Crimes
As technology and AI become more widespread, fraud and other suspicious activity are rising across America. Which types are the most common?
-

Economy11 months ago
Tracking the $3.1 Trillion Financial Crime Pandemic
From money laundering to fraud, financial crime acts as a drain on the economy, totaling an incredible $3.1 trillion.
-

Politics12 months ago
Which Types of Government Rule the World?
Over half the global population is ruled by non-centrist types of government, including autocracies and left or right wing parties.
-

Politics12 months ago
Breaking Down the $524 Billion Investment Needed to Rebuild Ukraine
Ukraine will require an estimated $524B over the next decade to recover from the Russia-Ukraine war. Which sectors have been most impacted?
-

Politics1 year ago
Are Tariffs Causing U.S. Inflation Fears?
Amid tariff increases, consumers’ expectations for U.S. inflation in the next five years have reached their highest level since March 1991.
-

Politics1 year ago
Ranked: Executive Orders by President in the First 100 Days
In his first 100 days, President Trump has issued far more executive orders than any other president in history.
Subscribe
Please enable JavaScript in your browser to complete this form.Join 375,000+ email subscribers: *Sign Up