Threat Landscape
Cryptocurrency platforms exhibit a structural defensive failure: the asset itself is its own access credential.
The cryptocurrency-platform threat profile differs from every other financial-sector profile in one crucial respect: the asset that is being protected is itself the cryptographic-key material that authorises its movement. There is no equivalent in traditional finance. A bank wire instruction can be cancelled if the wire instruction is later determined to be fraudulent. A blockchain transaction signed with a private key cannot be reversed. The private key is the asset.
This makes private-key compromise the defining threat. Chainalysis' 2025 Crypto Crime Report found that in 2024, 43.8% of all stolen cryptocurrency was attributable to private-key compromise — by orders of magnitude the largest single category, eclipsing smart-contract exploitation, governance attacks, and bridge attacks. The vector is structurally amplified by the fact that an attacker who acquires a private key needs to do nothing else; the key is sufficient. [01]
Every cryptocurrency platform protecting customer holdings holds a key vault. The key vault is the platform. The architectural question is whether the key vault has to exist as a key vault.
The 2024 hack landscape reads as a catalogue of high-value private-key compromises: DMM Bitcoin (USD 305M, May 2024), WazirX (USD 235M, July 2024), and others. Chainalysis attributes USD 1.34 billion of total 2024 cryptocurrency theft to North-Korean-affiliated groups across 47 incidents — a 103% increase over 2023. The DPRK's reliance on cryptocurrency theft for sanctions-evasion finance has grown the threat-actor sophistication exponentially. [02]
The intersection of off-chain and on-chain is itself a vector. Chainalysis describes the increasing infiltration of crypto-related companies by North-Korean-affiliated IT workers — operatives who pass technical interviews, gain employment, and exfiltrate access credentials and source code, sometimes for months before activation.