Skip to content

Fortis · By Totemic Investors

Over $610 million in crypto was stolen in the last 12 months. How exposed is your portfolio?

We help crypto investors understand and reduce the risks hidden in their holdings — the exchanges they trust, the protocols they use, the wallets they sign from.

RecentApr 19, 2026Kelp DAO$293.0M

Why this matters to you.

Last 30 days
$573.1M
3 incidents reported
Year to date
$605.1M
5 incidents reported
Most common this month
Bridge & cross-chain attack
33% of incidents

If you hold tokens in a hot wallet, use a centralized exchange, interact with DeFi, or have ever signed a token approval — at least one of these incidents involved a risk that applies to you.

The losses are happening right now.

Recent significant incidents across the industry, newest first.

Apr 19, 2026
$293.0M
Kelp DAO
Multi-chain · Bridge & cross-chain attack

Attackers exploited a single point of trust in the cross-chain messaging infrastructure used by a major liquid-staking protocol, minting unbacked tokens and draining hundreds of millions in collateral.

Cointelegraph coverage
Apr 15, 2026
$100K
Zerion
Off-chain · AI-powered social engineering

Attackers used AI-driven social engineering in a long-running campaign to steal roughly $100K from the wallet provider's hot wallets — an early example of AI-augmented phishing succeeding against a security-aware team.

Zerion disclosure coverage
Apr 15, 2026
$280.0M
Drift Protocol
Solana · Protocol exploit

A decentralized trading platform was drained of roughly $280M in an exploit linked to North Korean threat actors.

Crypto.news coverage
Mar 22, 2026
$25.0M
Resolv Labs
Ethereum · Private-key compromise

An off-chain service holding a privileged private key was compromised, letting an attacker mint $25M of unbacked stablecoins.

OWASP SC Top 10 commentary
Jan 21, 2026
$7.0M
SagaEVM bridge
Multi-chain · Bridge & cross-chain attack

An integer boundary bug in cross-chain message handling let an attacker manipulate transferred values and extract $7M.

Dev.to writeup
Sep 1, 2025
$5.3M
Symbiosis
Multi-chain · Bridge & cross-chain attack

Source-chain event leakage enabled MEV bots to sandwich cross-chain transactions on the destination chain, extracting $5.27M from users.

OWASP commentary
Sep 3, 2024
$27.0M
Penpie
Ethereum · Protocol exploit

A flaw in a staking contract let an attacker repeatedly call back into it mid-transaction and drain $27M in ETH from the DeFi protocol.

TechTarget summary
Mar 28, 2024
$11.6M
PrismaFi
Ethereum · Protocol exploit

A flash loan was used to manipulate the price of an asset within the protocol, letting the attacker artificially inflate collateral and extract funds.

Nethermind writeup
Mar 25, 2024
$13.0M
Abracadabra Money
Ethereum · Protocol exploit

Attackers used a flash loan to exploit logic flaws in the lending platform and steal roughly $13M in ETH.

TechTarget summary
Mar 13, 2023
$197.0M
Euler Finance
Ethereum · Protocol exploit

An attacker chained flash loans with collateral-calculation flaws to drain $197M from a major lending protocol — funds were later largely returned after negotiation.

SecureDApp writeup
Feb 2, 2023
$3.0M
Orion Protocol
Multi-chain · Protocol exploit

A flaw in a token-swap function let an attacker repeatedly re-enter the contract and drain liquidity from the trading platform.

ChainSec timeline
Dec 25, 2022
$1.4M
Rubic
Multi-chain · Private-key compromise

Attackers gained access to an admin's private keys and drained the cross-chain swap service of $1.4M.

ChainSec timeline
Oct 6, 2022
$100.0M
BNB Chain bridge
BNB Chain · Bridge & cross-chain attack

An exploit in the cross-chain bridge let attackers mint roughly $100M in unauthorized tokens; the chain itself was paused as an emergency response.

ChainSec timeline
Oct 1, 2022
$21.0M
Transit Swap
Multi-chain · Protocol exploit

An internal bug in a swap contract on a multichain DEX aggregator let attackers steal $21M; partial recovery followed.

ChainSec timeline
Apr 17, 2022
$182.0M
Beanstalk
Ethereum · Governance takeover

An attacker took a massive flash loan to gain a supermajority of governance votes and instantly passed a proposal that drained $182M from the protocol's treasury.

Hacken writeup
Dec 13, 2021
$140.0M
Vulcan Forged
Multi-chain · Private-key compromise

96 user private keys were stolen from a crypto gaming ecosystem, allowing the attacker to drain $140M from affected wallets.

ChainSec timeline
Dec 2, 2021
$120.0M
Badger DAO
Ethereum · Approval & permission scam

Attackers compromised the protocol's frontend to inject malicious approval requests, draining roughly $120M from users who unknowingly signed away wallet permissions.

ChainSec timeline
Oct 27, 2021
$130.0M
Cream Finance
Ethereum · Price-feed manipulation

Flash-loan-driven price manipulation on the lending protocol's collateral price feed let an attacker borrow $130M against artificially inflated collateral.

Industry recap
May 19, 2021
$45.0M
PancakeBunny
BNB Chain · Price-feed manipulation

An attacker used a series of flash loans to manipulate the protocol's pricing logic and mint massive quantities of the native token, dumping it for $45M.

Industry recap
Jun 17, 2016
$60.0M
The DAO
Ethereum · Protocol exploit

$60M was drained from the first major on-chain investment fund, forcing the Ethereum chain to split. Historical, but still the canonical case study.

Industry recap
Feed last updated: May 3, 2026.Data sourced from DefiLlama, DeFiHackLabs, Rekt News, and SlowMist.4 of 4 sources healthy.

The risk categories you’re probably exposed to.

Recognize yourself in any of these? Most investors are exposed to at least three.

Exchange & custodian failure

If your funds sit on an exchange or with a custodian, they're not yours during a breach, freeze, or insolvency. Recovery, when it happens, is partial and slow.

Recent example →
Phishing & wallet drainers

One bad signature can empty a wallet that took years to build. Drainer kits are sold off-the-shelf and target investors through fake airdrops, fake support, and lookalike sites.

Recent example →
Protocol exploits

Even audited protocols get drained. Audits are a snapshot in time, not a guarantee of safety. Funds in DeFi are exposed to bugs the protocol team itself didn't see.

Recent example →
Bridge & cross-chain attacks

Moving tokens between chains is one of the highest-risk things you can do. Bridges concentrate value and trust assumptions, and have produced some of the largest single-day losses in the industry.

Recent example →
AI-powered social engineering

In 2026, the “support agent” on your call may not be a person. Voice cloning and live deepfakes are reaching investors, founders, and signers — including ones who thought they’d recognize a fake.

Recent example →
Approval & permission scams

You may have already signed away access to tokens you still hold. Old approvals to dead apps and compromised contracts sit in your wallet until something on the other side calls them.

Recent example →

How we help.

Portfolio risk assessment

We map your holdings — exchanges, wallets, protocols, approvals — to the attack categories that actually apply to you.

Custody & operational review

Wallet setup, signing process, recovery plan. Where the single points of failure are, and how to remove them.

Ongoing monitoring & advisory

For portfolios above a threshold, we monitor exposure as the threat landscape shifts and your holdings change.

Not financial advice. Independent security advisory only.

Find out where you’re exposed.

Tell us a little about your portfolio and we’ll come back with where the real risks are. One business day, no obligation, no sales pressure.

We’ll respond within 1 business day. Your information is never shared or sold. Not financial, legal, or tax advice.

Not ready to talk yet? Get the monthly threat brief.

One email a month with the same incident data you see above — condensed, contextualized, no spam.

Data sourced from

DefiLlamaDeFiHackLabsRekt NewsSlowMist

Further reading: OWASP Smart Contract Top 10 · OWASP Top 10 Web3 Attack Vectors.

Get a free risk assessment