Cyvers published its interactive annual report focused on 2025 on-chain security incidents and fraud activity. The report is presented as a data-driven recap of how money moved, where defenses failed, and why “fraud plus hacks” should be treated as one combined threat surface rather than two separate problems.
The timing is also part of the story. When markets get volatile, incident risk goes up, but so does user urgency. A report that puts hard numbers next to attack patterns tends to travel well across exchanges, wallets, and compliance teams because it turns vague fear into measurable exposure.
Cyvers’ core framing is simple:
Coverage summarizing the report highlights two topline figures for 2025:
Fraud is not one tactic. It is a supply chain of persuasion, identity, and payout rails.
In the Cyvers framing, “fraud-linked” activity covers flows tied to social engineering and deception, including authorization scams where victims approve transactions or hand over control without realizing it.
Summaries of the report point to three scale signals that matter for platforms:
Those numbers support the “industrialized” narrative: fewer lone actors, more repeatable playbooks, more network effects.
Authorization scams beat many security stacks because the transaction looks legitimate.
The victim signs <-> The chain validates <-> The funds move.
This creates a gap between what compliance teams flag and what users perceive as “being hacked.” It also explains why pig butchering is called out so often: the fraud is slow, relationship-driven, and optimized for extracting large balances over time.
If fraud is the bigger number, hacks are the sharper lesson.
Report summaries highlight that the majority of hack losses in 2025 stem from access control failures: compromised keys, permission misconfigurations, and human error around privileged operations.
A common simplification is “smart contracts are insecure.” The report’s implied counterpoint is closer to: operational governance is the soft underbelly.
As covered in report roundups, the split is often described like this:
Access control failures are high leverage because they sit above everything else.
If an attacker gains signing authority or privileged permissions, they can:
That is why “basic” controls like key custody, multi-sig policies, and role-based access reviews can matter more than a marginally better audit.
The report coverage also leans into a trend that has been building for years: attackers increasingly target what sits around the contract, not just the contract.
Examples frequently cited include:
One reason this is underappreciated is that it does not look like an exploit. It looks like normal operations until the loss is already final.
Cyvers’ data points toward one clear prioritization: reduce the blast radius of “valid but unsafe” actions.
Fraud is scaling because it exploits human routines.
A simple user checklist still prevents a huge share of losses:
These steps do not make fraud impossible. They raise the cost and reduce the chance that one mistake becomes a total wipeout.
If Cyvers’ report framing holds, the next cycle of headlines will not be about new exploits. It will be about:
In other words, the industry’s security narrative shifts from “find the bug” to “protect the operations.”
Cyvers’ annual report puts a stark gap on the table: fraud-linked activity at roughly $16B versus hack losses at roughly $2.5B, with access control failures still doing most of the hack damage.
The takeaway is not that smart contracts do not matter. It is that the fastest-growing risk sits at the intersection of people, permissions, and signing authority.
The post Cyvers Flags $16B in Crypto Fraud and $2.5B in Hacks appeared first on Crypto Adventure.