The encryption penetration is an invitation to wake up to Defi.
Opinion
Benbit in February broke the record for the largest penetration on the date of encryption. More than $ 1.4 billion was stolen by North Korean criminals in the blink of an eye, with a bold theft that creates news news around the world.
Now, as TRM LABS mentioned, $ 2.1 billion of encryption has been lost for attacks in the first half of 2025. This is a high amount of money, however, it seems that the infiltrators are continuing.
While close attention was paid to these rudeft, there was not enough checking on how these infiltrators were able to wash encryption possessions. Central stock exchanges (CEXS) and Defi protocols contain learning lessons from these destructive incidents – for various reasons.
CEXS must make changes
For trading platforms on which millions of users depend on all over the world, major changes must be made on how to sign transactions. Depending on the user interface summary it is no longer good enough; Instead, it is very important to decode the contact data manually. Only then, CEOs can be confident that the money that is transmitted from a cold wallet will reach their intended destination.
Other advanced solutions include “smart participants” who verify the validity of the transaction and signatures. This guarantees the rejection of suspicious requests automatically, even if all the required approvals are present.
Transactions can now be simulated before the signatures, as well as the intelligence of the threat in the actual time that suspends high risk contact data. The concerted transformation into a multi-party account-where special keys are divided into multiple fragments and cannot be fully assembled-can be a convincing alternative to smart contracts.
In recent encryption breakthroughs, facades were manipulated. The bad actors have deceived the executives in the error by mistake. More than 80 % of stolen encryption has been taken across 75 penetrations so far this year in the so -called infrastructure exploits, which, on average, with more than 10 times of other types of attack.
Obviously, the pattern has started to form, and it is not acceptable to adapt CEXs in response to this fixed threat.
Defi must challenge infiltrators
The first step is to make it difficult for infiltrators to deal with stock exchanges like their PC, with strong guarantees that close the attack tankers. In the next step of the journey of infiltrators, when they try to transfer illegal funds through decentralized platforms, basic improvements must be made.
Ben Zhou CEO of Ben Zhou’s CEO was frustrated when he was trying to freeze the huge quantities of ETH passed from his platform in February. Blockchain analyzes showed that money was spread across many portfolios in hundreds of transactions – dividing $ 1.4 billion into countless small fragments. on When the shift occurs Podcast, is Described In an attempt to contact the platforms where the encryption was transferred, but by the time when it received a response, the money was transferred to another place.
This is why Defi protocols need to increase efforts to prevent infiltrators from taking advantage of their infrastructure. It can play a combination of risk intelligence, monitoring of transactions, wallet examination and risk management a role here – without compromising decentralization.
Related to: Crypto Seed, Hacks Drives Fronts in 2025: TRM LABS
Some solutions use in actual time around the clock throughout the week, while others integrate human -based intelligence to quickly respond to accidents during their development. When associating with a multi -task -task -task -task dashboard specifically designed for Defi, this technology can examine interactions and transactions for banned headlines, appoint governors to monitoring areas, and apply the actual time records of the addresses.
This approach allows classes to detect harmful activity within seconds, enabling security teams to explain abnormal behavioral cases, cooperation with external intelligence providers, and take quick measures in complex or mysterious situations where human rule is necessary. Suspicious portfolios and IP connections can be banned before money is lost.
There is nothing wrong with health competition between exchanges and Defi protocols. Customers deserve the choice. However, penetration must be treated against one platform as an attack against them all.
Close cooperation is not just an exercise in good public relations; It is an opportunity to form a unified front against thieves who endanger the future of this industry. All consumer confidence penetration, and if they continue to occur, the organizers may be left without any option except for imposing restrictions that also punishes encryption users and developers committed to law.
Self -organization is the future
Depending on the design, Defi protocols are open to all users and do not supervise, manage or “police” like a central alternative. The unsuccessful approach means that Defi developers cannot freeze the illegal money that passes through their platform. Long legislators may not fully appreciate how Defi platforms work, and as a result, developers are often accused of the activity of others, although they were not personally responsible for these transactions.
The last encryption penetration needs to be an invitation to wake up. Defi developers should be gathered together to create sound governance and safety models to keep pace with technological developments. The design of a precise protocol, class defense systems and continuous security reviews has the ability to make encryption breakthroughs not be worth it on opportunistic thieves.
The most deeper truth is clear. If Crypto fails to organize, one of the most persuaded anti -arguments may become the most persuaded free market.
Despite its faults, traditional financing (Trafi) works under a clear set of forced rules established by the organizers – a form of central planning that works as a temporary store against systemic risks and crime. On the other hand, Defi is proud to get rid of brokers and adopt the dynamics of pure market. Continuous events show that absolute freedom may not be sustainable without even a thin layer of coordination or guarantees.
Perhaps the ideal is not a 100 % free market but it is 85 %, as it works by 15 % remaining as a programmable base designed to support security, prevent abuse and confidence. Not to repeat the tradfi bureaucracy, but to implement automatic and transparent standards and the lowest time for things such as anti -money laundering, fraud and risk assignment.
Think about it is not like a control element from top to bottom, but as studies at the protocol level: smart layers units that allow Defi to keep openness while ensuring accountability. These standards that depend on society and the open source can be directly included in the protocols, decentralized applications and facades-a collective effort to reduce regular threats without prejudice to decentralization.
Defi does not need a tradfi imitation of maturity, but freedom may be invited without chaos. The goal is to restrict innovation but in resisting the future through common standards, moral design and flexibility.
Yes, it will take some time. Yes, it will take the investment. And yes, this will require experimentation and some wrong beginnings. But in the long run, the stock profits will be enormous.
Opinion: Orest Gavryliak, Senior Legal officials, 1inch Labs.
This article is intended for general information purposes and does not aim to be and should not be considered legal or investment advice. The opinions, ideas and opinions expressed here are alone and do not necessarily reflect or represent the views and opinions of Cointelegraph.