Strictly Confidential — Material Disclosure Under Executed Mutual NDA Only
SECTOR / 05 · CRYPTOCURRENCY & DIGITAL ASSETS

Cryptocurrency & Digital Assets. The credential is the asset. The credential cannot be re-issued.

USD 2.2 billion stolen from cryptocurrency platforms in 2024. The fifth year in the past decade to exceed USD 1 billion. 43.8% of that loss came through private-key compromise — the structurally inevitable failure mode of an architecture that requires the key to exist. PULSE engineers digital-assets infrastructure in which the private key never exists in any form recoverable by the platform operator.

Cryptocurrency & Digital Assets — 2024 Threat Profile

In 2024, USD 2.2 billion was stolen from cryptocurrency platforms — the fifth year in the past decade exceeding USD 1 billion in stolen funds.

USD 2.2B
Total cryptocurrency stolen from platforms in 2024 — a 21% year-on-year increase across 303 hacking incidents (up from 282 in 2023). The figure does not include funds stolen via off-chain compromise of holders.
Chainalysis 2025 Crypto Crime Report
43.8%
Proportion of stolen cryptocurrency in 2024 attributed to private-key compromise — the largest single attack vector in the year. Centralised services were the most targeted in Q2 and Q3.
Chainalysis 2025 Crypto Crime Report
USD 1.34B
Cryptocurrency stolen by North-Korea-affiliated threat actors across 47 incidents in 2024 — 61% of total stolen funds. Funds reportedly support DPRK ballistic-missile programs.
Chainalysis 2025 Crypto Crime Report
USD 305M
Cryptocurrency stolen from Japanese exchange DMM Bitcoin in May 2024 — laundered via Bitcoin CoinJoin mixing and ultimately routed through Cambodia-based Huione Guarantee. DMM Bitcoin shut down in December 2024.
Chainalysis 2025 Crypto Crime Report
Threat Landscape

Cryptocurrency platforms exhibit a structural defensive failure: the asset itself is its own access credential.

The cryptocurrency-platform threat profile differs from every other financial-sector profile in one crucial respect: the asset that is being protected is itself the cryptographic-key material that authorises its movement. There is no equivalent in traditional finance. A bank wire instruction can be cancelled if the wire instruction is later determined to be fraudulent. A blockchain transaction signed with a private key cannot be reversed. The private key is the asset.

This makes private-key compromise the defining threat. Chainalysis' 2025 Crypto Crime Report found that in 2024, 43.8% of all stolen cryptocurrency was attributable to private-key compromise — by orders of magnitude the largest single category, eclipsing smart-contract exploitation, governance attacks, and bridge attacks. The vector is structurally amplified by the fact that an attacker who acquires a private key needs to do nothing else; the key is sufficient. [01]

Every cryptocurrency platform protecting customer holdings holds a key vault. The key vault is the platform. The architectural question is whether the key vault has to exist as a key vault.

The 2024 hack landscape reads as a catalogue of high-value private-key compromises: DMM Bitcoin (USD 305M, May 2024), WazirX (USD 235M, July 2024), and others. Chainalysis attributes USD 1.34 billion of total 2024 cryptocurrency theft to North-Korean-affiliated groups across 47 incidents — a 103% increase over 2023. The DPRK's reliance on cryptocurrency theft for sanctions-evasion finance has grown the threat-actor sophistication exponentially. [02]

The intersection of off-chain and on-chain is itself a vector. Chainalysis describes the increasing infiltration of crypto-related companies by North-Korean-affiliated IT workers — operatives who pass technical interviews, gain employment, and exfiltrate access credentials and source code, sometimes for months before activation.

Common Attack Vectors

Cryptocurrency-platform attacks concentrate in vectors not seen elsewhere.

The DeFi-vs-CeFi target distribution shifted in 2024 — centralised exchanges were the most-targeted in Q2 and Q3. Both deployment models share the underlying architectural commitment that creates the attack surface.

VECTOR / 01

Private-Key Compromise

Direct compromise of the private cryptographic keys that authorise on-chain transactions. Sources include compromise of operational infrastructure (hot wallets), key-ceremony failures (multi-signature schemes), insider exfiltration, and supply-chain compromise of key-management software.

43.8% of 2024 stolen funds — Chainalysis 2025
VECTOR / 02

North-Korean Aligned Sophisticated Actor

DPRK-affiliated threat actors (Lazarus, APT38, Reconnaissance General Bureau-linked groups) target both decentralised and centralised platforms. Tactics range from sophisticated multi-stage technical exploitation (Radiant Capital) to long-tail social-engineering and infiltration (DPRK IT-worker programmes).

USD 1.34B stolen by DPRK-affiliated groups in 2024 — Chainalysis 2025
VECTOR / 03

Smart Contract Exploitation

Decentralised finance protocols hold their custodial logic in publicly auditable smart contracts. Auditing is necessary but not sufficient: subtle reentrancy, oracle manipulation, and economic-logic flaws have produced losses of USD 100M+ at single protocols (Euler Finance, Curve Finance, Radiant Capital).

USD 197M Euler Finance loss — March 2023
VECTOR / 04

Cross-Chain Bridge Vulnerabilities

Bridges that move value between blockchains hold concentrated value across multiple cryptographic commitments simultaneously. The 2022 Ronin Bridge exploit (USD 624M) and Wormhole exploit (USD 320M) established the pattern. DeFi hack share has reduced in 2024 but the structural vulnerability persists.

USD 624M Ronin Bridge exploit — March 2022
Operational and Regulatory Impact

Cryptocurrency platforms operate under maximally divergent regulatory regimes simultaneously.

The cryptocurrency regulatory environment is fragmented across jurisdictions in a way that has no parallel in traditional finance. The European Union has implemented the Markets in Crypto-Assets Regulation (MiCA), which imposes specific operational, custody, and conduct requirements on crypto-asset service providers and brings them within EU financial supervision. The United States operates under a multi-agency regulatory regime in which the SEC, the CFTC, FinCEN, OFAC, and state regulators each assert jurisdiction over different aspects, with substantial scope contestation. Singapore, Switzerland, the UAE, and Hong Kong have implemented prescriptive licensing regimes. China and India have severely restricted activity.

The breach response in this environment is non-trivial. The DMM Bitcoin breach (May 2024) culminated in the company's closure and the transfer of remaining customer assets to SBI VC Trade — a sequence of events that would be regulatorily simpler in traditional finance but required cooperation between Japan's Financial Services Agency and a private acquirer. Cross-border laundering through services like Huione Guarantee complicated recovery: by the time funds reach high-risk laundering infrastructure, the recovery probability approaches zero.

For platforms operating in regulated jurisdictions, the cyber-incident notification regime is now substantial. EU MiCA imposes incident-reporting obligations consistent with DORA (effective January 2025). The US SEC's 2024 Reg S-P amendments apply to registered broker-dealers handling crypto assets (where applicable). The Singapore Monetary Authority's Notice on Cyber Hygiene applies to licensed Digital Payment Token Service Providers. The UK FCA's rules apply to FCA-registered firms.

Reframing

In every other financial sector, the asset can be re-issued if the credential is compromised. In cryptocurrency, the credential is the asset. The credential cannot be re-issued.

The PULSE Position

In a PULSE-substrate digital-assets environment, the private key never exists in any form recoverable by the platform operator.

The defining vulnerability of every cryptocurrency platform is the same: at some point, in some location, the private key that authorises an outbound transaction must exist in usable form for that transaction to be executed. Hot wallets reduce the exposure window. Multi-signature schemes distribute the exposure across parties. Hardware security modules constrain the locations. None of these eliminate the fundamental issue: the key, in usable form, exists.

PULSE proposes a different architectural commitment. In a PULSE-substrate digital-assets environment, the private key authorising any specific transaction is constructed only at the moment, and only for the location, and only with the authorisation profile, that the transaction requires. It does not exist before. It does not exist after. It does not exist at any single location during. It is not a thing the platform operator stores. It is not a thing the platform operator backs up. It is not a thing the platform operator can be coerced or socially engineered into producing.

An adversary infiltrating a PULSE-substrate platform — through every vector listed above — does not encounter a key vault to compromise. There is nothing of the form they came to extract. The means is the trade secret. We disclose it under executed NDA only.

Strategic Briefing — Available Under NDA

Digital-assets PULSE deployment, MiCA / DORA / Reg S-P alignment, and reference architectures for centralised and decentralised platforms.

Architectural-fit assessment for centralised exchange, custody, asset-management, and DeFi-protocol deployment models. Quantified residual-key-compromise model under PULSE substrate (independent of operator security posture). Cross-jurisdictional regulatory alignment matrix (EU MiCA / US Reg S-P / Singapore MAS PSN / UK FCA / Hong Kong VASP). Reference architecture for institutional-grade custody and high-throughput exchange operation.

Available under executed NDA →
Sources

All statistics on this page are drawn from publicly available reports issued by recognised industry bodies, regulators, and security research organisations. References are listed below for verification.

  1. [01]Chainalysis 2025 Crypto Crime Report — total stolen funds, North Korean state-affiliated hacking activity, and private-key compromise statistics for 2024.
  2. [02]Chainalysis 2024 Crypto Crime Mid-Year Update — analysis of cryptocurrency theft activity through July 2024.
  3. [03]European Union — Markets in Crypto-Assets Regulation (MiCA), Regulation (EU) 2023/1114.
  4. [04]US Securities and Exchange Commission — guidance on digital-asset broker-dealer custody.
  5. [05]US Department of the Treasury Office of Foreign Assets Control — sanctions guidance on cryptocurrency mixing services.
  6. [06]Singapore Monetary Authority of Singapore — Notice on Cyber Hygiene (PSN06).
  7. [07]Verizon 2024 Data Breach Investigations Report — analysis of 30,458 security incidents and 10,626 confirmed breaches across 94 countries.
  8. [08]IBM Cost of a Data Breach Report 2024 (Ponemon Institute, sponsored by IBM, July 2024) — covering 604 organisations across 16 countries and 17 industries between March 2023 and February 2024.

PULSE Digital Security cites these sources for context only. Citation does not imply endorsement of, or affiliation with, any cited organisation. All trademarks remain the property of their respective owners.