Despite the escalating threat of cybercrime, the underlying value of digital assets continues its upward trajectory. Bitcoin, Ethereum, and stablecoins have solidified their positions as critical financial instruments, consistently demonstrating rising values, even amidst inherent market volatility. By October 2025, the combined valuation of cryptocurrencies and other digital assets surpassed an astounding $4 trillion, underscoring their growing significance in the global financial landscape. This burgeoning value and liquidity, however, have inevitably attracted the attention of malicious actors. Charles Guillemet, Chief Technology Officer at Ledger, a leading provider of secure signer platforms, emphasizes that the Bybit attack exemplifies the intense focus of sophisticated attackers on breaching the security measures that underpin the crypto ecosystem. "The attackers were very well organized, they have plenty of money, and they are spending a lot of time and resources trying to attack big stuff, because they can," Guillemet stated. He further elaborated on the economic rationale behind such high-stakes operations: "In terms of opportunity costs, it’s a big investment, but if at the end they earn $1.4 billion it makes sense to do this investment."
The Bybit incident also highlights the multifaceted nature of the crypto threat landscape, posing risks not only to the uninitiated but also to those with technical expertise. Cybercriminals are employing a dual strategy: utilizing social engineering tactics to target individual users while simultaneously seeking out systemic vulnerabilities within the cryptocurrency infrastructure itself. Historically, individuals have borne the brunt of defending their digital assets alone. However, the landscape is shifting, with cybersecurity firms and cryptocurrency solution providers now offering advanced defenses powered by extensive threat intelligence.
A fundamental advantage of cryptocurrency is the concept of self-custody, empowering users to safeguard their private keys—the alphanumeric codes that authenticate ownership and grant absolute control over digital assets—by storing them in either software or hardware wallets. This approach necessitates a profound trust in the security of the chosen wallet technology. Crucially, in the realm of digital assets, where data itself represents value, the loss or forgetting of private keys equates to the irrecoverable loss of wealth. Vincent Bouzon, head of Ledger’s Donjon research team, draws a stark contrast with traditional finance: "If I hack your credit card, what is the issue? You will call your bank, and they will manage to revert the operations. The problem with crypto is, if something happens, it’s too late. So we must eliminate the possibility of vulnerabilities and give users security."
A growing area of focus for attackers is stablecoins, a class of cryptocurrencies designed to maintain a stable value by being pegged to a hard asset like gold or a fiat currency such as the US dollar. Stablecoins often rely on smart contracts, which are self-executing digital agreements encoded on a blockchain that automate issuance, value maintenance, and rule enforcement. These smart contracts, while efficient, can be susceptible to various attack vectors, frequently exploiting user credulity or a lack of awareness regarding potential threats. While post-theft countermeasures like freezing transfers and blacklisting addresses can mitigate some risks, the underlying vulnerabilities remain a concern.
Understanding these vulnerabilities is paramount for effective protection. Software-based wallets, commonly referred to as "hot wallets," which operate as applications on computers, phones, or web browsers, represent a frequent weak point. Their inherent internet connectivity, while convenient for users, simultaneously renders them more accessible to hackers. Guillemet explains, "If you are using a software wallet, by design it’s vulnerable because your keys are stored inside your computer or inside your phone. And unfortunately, a phone or a computer is not designed for security." The rewards for exploiting such weaknesses can be substantial. The 2022 attack on the encrypted password manager LastPass, which involved the theft of credentials, enabled hackers to subsequently transfer millions of dollars worth of cryptocurrency from victims over a period of two years.
Even hardware-based wallets, typically resembling USB drives or key fobs and offering superior security due to their offline nature, are not entirely impervious to diligent attackers. Sophisticated tactics such as side-channel attacks, where adversaries analyze a system’s physical emanations like power consumption, timing, or electromagnetic emissions to glean information about algorithmic implementations, can be employed. Guillemet stresses that cybersecurity providers developing digital asset solutions, including wallets, have a responsibility to alleviate the user’s security burden by integrating robust security features and disseminating educational resources on enhancing defenses. For businesses seeking to protect cryptocurrency, tokens, critical documents, and other digital assets, multi-stakeholder custody and governance platforms that support both software and hardware protections, coupled with transparent asset and transaction visibility through Web3 checks, are becoming increasingly vital.
As the threat landscape evolves at an unprecedented pace, continuous, in-depth research conducted by specialized attack laboratories, such as Ledger Donjon, is crucial for cybersecurity firms to remain ahead of emerging threats. The Ledger Donjon team is dedicated to understanding and proactively securing the digital asset ecosystem, aiming to establish global security standards. Their offensive security research initiatives, which involve ethical hacking to simulate attacks and identify weaknesses in hardware wallets, cryptographic systems, and infrastructure, are central to this mission.
A notable discovery by the Donjon team occurred in November 2022, when they identified a significant vulnerability in Trust Wallet, a Web3 wallet platform acquired by Binance. They found that the seed phrase generation process lacked sufficient randomness, enabling them to compute potential private keys and potentially compromising up to $30 million held in Trust Wallet accounts. "The entropy was not high enough, the entropy was only 4 billion. It was huge, but not enough," Bouzon stated, highlighting the critical importance of robust cryptographic principles.
To bolster overall security, Bouzon outlines three fundamental principles that digital-asset protection platforms should adhere to. Firstly, security providers must develop highly secure algorithms for generating private key seed phrases and conduct rigorous security audits of their software. Secondly, users should prioritize hardware wallets equipped with secure screens over software wallets. Finally, all smart contract transactions should offer clear visibility into the details of what is being signed, thereby preventing blind signing attacks.
Ultimately, the responsibility for safeguarding these valuable digital assets is shared between digital asset solution providers and the users themselves. As the value of cryptocurrencies continues to escalate, so too will the sophistication and prevalence of threats, with hackers relentlessly seeking to circumvent new security measures. While digital asset providers, security firms, and wallet solutions must strive to build robust and user-friendly protections to support the cryptocurrency ecosystem, users also bear the responsibility of seeking out the necessary information and education to proactively defend themselves and their holdings.
For those seeking to deepen their understanding of securing digital assets, the Ledger Academy offers a comprehensive resource library. This content was produced by Insights, the custom content division of MIT Technology Review, and was not written by the publication’s editorial staff. The creation of this content involved human writers, editors, analysts, and illustrators, with any AI tools used limited to secondary production processes that underwent thorough human review.

