Last Updated on February 5, 2026
Crypto hacks caused significantly lower losses in 2023 compared to previous years, signaling measurable progress in protocol security. However, this decline does not mean that risks disappear for you as a crypto user. Attackers increasingly focus on supply chains instead of direct protocol exploits. These attacks target software libraries, development tools, and infrastructure providers that many projects rely on at the same time. As a result, even trusted platforms can expose users to risk through compromised dependencies. The shift changes how you should assess crypto security today.
A Measurable Decline in Traditional Crypto Hacks
Data analyzed by security firms and reviewed by Cointelegraph shows that total losses from crypto hacks dropped sharply in 2023. Losses fell to approximately $1.8 billion, down from more than $3.7 billion in 2022. Improved smart contract audits, better testing standards, and increased security awareness contributed to this decline. For you, this trend confirms that core protocol security continues to mature. Direct exploits against smart contracts now occur less frequently than in previous years.
Why Supply Chain Attacks Gain Momentum
While overall hack volumes decrease, supply chain attacks grow in relevance. These attacks allow hackers to compromise multiple projects through a single weak point. Attackers infiltrate update servers, code repositories, or third-party software packages. Once malicious code enters the supply chain, it spreads automatically to users through legitimate updates. This approach increases efficiency and scale for attackers while reducing technical effort. You may interact with a wallet or app that appears secure, yet still face risk through its dependencies.
The Strategic Advantage for Attackers
Supply chain attacks offer a higher return for criminals compared to traditional exploits. CertiK data cited by Cointelegraph indicates that supply chain incidents accounted for a significant share of losses in 2023. Attackers deliberately choose infrastructure components with many downstream users. This strategy allows them to affect multiple protocols, wallets, and services at once. For you, this means that security depends not only on the protocol you choose, but also on the entire ecosystem behind it.
What the Shift Means for You as a User
The decline in classic crypto hacks marks progress, but it does not eliminate risk. You now need to consider infrastructure trust alongside protocol audits. Using well-maintained software, avoiding unofficial updates, and paying attention to security disclosures reduces exposure. Reportings show that both retail and institutional users face the consequences of supply chain failures. As the industry adapts, informed users gain an important advantage by understanding where risks truly originate.
More Insights
Crypto Cards Reach Crucial $1.5B Monthly Volume: Redefining Real-World Crypto Payments
Crypto-linked card payments have reached a major new scale, with monthly transaction volume climbing to...
Stablecoins and Merchant Adoption: What’s Next
payments haven’t really changed much for merchants in decades. Credit cards still dominate, fees are still...
5 Practical Tips to Avoid Scams in the Crypto Space
Let’s be honest—crypto is exciting. Fast money, cutting-edge tech, global access. But wherever opportunity...



