View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
August 31, 2022updated 12 Oct 2022 10:01am

Cybercriminals are targeting DeFi platforms to steal cryptocurrency, FBI warns

Decentralised finance platforms are an increasingly popular way for criminals to obtain funds from crypto wallets.

By Ryan Morrison

Cybercriminals are increasingly targeting decentralised finance (DeFi) platforms to steal cryptocurrency from investors, the FBI has warned. In an alert the agency says cybercriminals are exploiting vulnerabilities in smart contracts that govern these services.

Cybercriminals are increasingly targeting DeFi platforms to steal cryptocurrency from investors (Photo: ArtistGNDphotography/iStock)
Cybercriminals are increasingly targeting DeFi platforms to steal cryptocurrency from investors (Photo by ArtistGNDphotography/iStock)

Smart contracts contain the terms of any agreement between a buyer and seller written directly into lines of code and are self-executing. As the code controls the execution, they are trackable and irreversible once triggered. They allow for trusted transactions and agreements between anonymous parties without the need for a central authority.

The FBI warned that criminals were taking advantage of increased interest in cryptocurrencies, as well as the complexity of transactions and functionality of DeFi platforms.

This is a growing problem. A study by blockchain analysis company Chainalysis found that, between January and March this year, $1.3bn in cryptocurrencies was stolen and 97% of it came from DeFi platforms, compared with 72% in 2021 and 30% in 2020.

Flash loans were also a problem for DeFi platforms. This is where a scammer borrows a large amount of cryptocurrency for a short time and uses it to manipulate the value of a certain token, allowing them to then buy up all the governance tokens and vote to withdraw any money available for that DeFi project to their own crypto wallet.

In the past year the FBI has observed cybercriminals defraud DeFi platforms in a number of different ways, including one flash loan that triggered an exploit in a DeFi platform’s smart contracts resulting in the loss of about $3m worth of cryptocurrency.

DeFi projects a growing target for hackers

Beanstalk Farms became one of the largest victims of this type of attack in April this year. The decentralised finance project was hit by an attacker who mounted the hostile takeover by buying up enough tokens in the project to take control, then voting to transfer tokens worth $182m to their own crypto wallet.

Content from our partners
Scan and deliver
GenAI cybersecurity: "A super-human analyst, with a brain the size of a planet."
Cloud, AI, and cyber security – highlights from DTX Manchester

Another instance of a DeFi attack saw cybercriminals exploit a signature verification vulnerability in an unnamed DeFi platform’s token bridge and withdraw all of the investments, resulting in approximately $320m in losses.

Manipulating cryptocurrency price pairs by exploiting a series of vulnerabilities was another area of attack seen by FBI investigators. This included conducting leveraged trades that bypassed checks so that it benefited from price calculation errors as a result of the DeFi platform’s use of a single price oracle. This attack led to the loss of about $35m in cryptocurrency, according to the FBI.

In total web3 projects, including DeFi platforms are thought to have lost about $2b to hacks and scams since the start of this year. That is based on a report by web3 security company CertiK, finding that often these attacks are from nation state-backed groups.

DeFi: keeping crypto wallets safe

“Investors should make their own investment decisions based on their financial objectives and financial resources and, if in any doubt, should seek advice from a licensed financial adviser,” the FBI suggests, adding that its important to research the DeFi platform, its protocols and smart contracts before investing to be aware of any specific risks involved.

Agency officials also warn potential investors to check the platform has conducted one or more code audits and had that audit carried out by an independent auditor. These typically require a thorough review and analysis of its underlying code to look for vulnerabilities and weaknesses that could impact its performance.

It also warns to “be aware of the potential risk posed by crowdsourced solutions to vulnerability identification and patching. Open source code repositories allow unfettered access to all individuals, to include those with nefarious intentions”.

The FBI also recommended a number of precautions that DeFi platforms could take to reduce the risk of attacks and scams and protect investors.

This included a need to “institute real time analytics, monitoring, and rigorous testing of code in order to more quickly identify vulnerabilities and respond to indicators of suspicious activity” and “develop and implement an incident response plan that includes alerting investors when smart contract exploitation, vulnerabilities, or other suspicious activity is detected”.

Tech Monitor is hosting a roundtable in association with Intel vPro on how to integrate security into operations. For more information, visit

Read more: Can DAOs survive the onslaught of cybercrime?

Topics in this article : , ,
Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.