Monday, April 28, 2025
HomeCyber Security NewsGrowth of Web3 Fuled New Opportunities for Threat Actors to Attack Finance...

Growth of Web3 Fuled New Opportunities for Threat Actors to Attack Finance Sectors

Published on

SIEM as a Service

Follow Us on Google News

Web3 and DeFi have been appealing to many threat actors, and there has been a significant boost in heists that have become larger than any they have experienced in more traditional finance.

Mandiant’s investigation into the 2016 Bangladesh Bank heist revealed that the North Korean hackers managed to steal $81 million, which highlights the scale of cybercrime.

Cybersecurity analysts at Mandiant recently identified that the rapid growth of Web3 has significantly fueled up new opportunities for threat actors to attack the finance sector.

- Advertisement - Google News

However, the 2022 Sky Mavis’ Ronin Blockchain hack enables threat actors to steal $600 million, indicating the escalating danger in DeFi.

Not only that even, more than $12 billion worth of digital currencies has been lost to hackers since 2020.

Web3 Fuled New Opportunities

Threat actors often target crypto exchanges and use sophisticated methods to steal huge amounts of digital assets.

The prominent cases of theft are the Bitcoin Exchange hack of Mt. Gox, which took over 350 million worth of Bitcoins in 2014, and the DMM Bitcoin hack, which led to $300 million of losses in 2024. 

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

While all these attacks often involve a series of coordinated steps known as the “Targeted Attack Lifecycle.”

Fake job opportunity (Source - Mandiant)
Fake job opportunity (Source – Mandiant)

Hackers frequently employ social engineering to trick developers into downloading malware disguised as coding challenges or job descriptions. 

Once the malware, like COVERTCATCH or RUSTBUCKET, infiltrates a system, it persists through the following mechanisms:-

  • Launch Agents
  • Enabling attackers to steal credentials
  • Access sensitive environments

In most such cases, they completely drain the cryptocurrency wallets using all these credentials. Madiant’s report also states that smart contracts, which are operational on blockchain technology, are not safe.

These contracts are mainly written in languages like Solidity for Ethereum or Rust for Solana, and can be exploited through flaws in their logic.

Among the many significant events are the DAO hack, carried out in 2016 and using the so-called “reentrancy attack” method to steal $55 million in Ether coins, and the 2023 hack of Curve Finance, which inflicted losses of $70 due to programming faults in the Vyper programming language.

Another standard method of such malicious actors is a “flash loan attack,” where attackers manipulate the pricing oracle and take out an unsecured loan for profit.

The 2023 Euler Finance hack is a prime example, where $200 million was stolen by exploiting a flaw in the donateToReserves function, allowing the attacker to manipulate the collateral and trigger self-liquidation. 

These incidents highlight the need for enhanced security measures and threat detection to protect digital assets in the rapidly evolving crypto landscape.

The DAOs have been known to apply permissionless token-based voting for project marketing, where holders of such tokens get to vote on the project’s future decisions.

Such a system, especially during voting, can be subjected to a takeover, known as a governance attack, in which some people buy out a large percentage of the tokens and take over the whole system.

For instance, there was the Tornado Cash case from May 2023, in which the threat actors bought out the project and stole over TORN 10,000 ($67,056 worth) in less than a week.

Cybersecurity researchers urged users to protect against these evolving threats, and organizations must enhance their security measures.

What Does MITRE ATT&CK Expose About Your Enterprise Security? - Watch Free Webinar!

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...