{"id":866860,"date":"2025-08-21T21:12:47","date_gmt":"2025-08-22T02:12:47","guid":{"rendered":"https:\/\/newsycanuse.com\/index.php\/2025\/08\/21\/rwa-protocol-exploits-reach-14-6m-in-h1-2025-surpassing-2024\/"},"modified":"2025-08-21T21:12:47","modified_gmt":"2025-08-22T02:12:47","slug":"rwa-protocol-exploits-reach-14-6m-in-h1-2025-surpassing-2024","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2025\/08\/21\/rwa-protocol-exploits-reach-14-6m-in-h1-2025-surpassing-2024\/","title":{"rendered":"RWA protocol exploits reach $14.6M in H1 2025, surpassing 2024"},"content":{"rendered":"<div data-v-43e640e6>\n<p>Cryptocurrency hackers are targeting real-world asset (RWA) tokenization protocols, posing a security threat to the increasing institutional demand for this emerging blockchain sector.<\/p>\n<p>Real-world asset <a data-ct-non-breakable=\"null\" href=\"https:\/\/cointelegraph.com\/learn\/articles\/asset-tokenization\" title=\"null\">tokenization<\/a> refers to financial and other tangible assets minted on the immutable blockchain ledger, increasing investor accessibility and trading opportunities for these assets.<\/p>\n<p>Hackers have started targeting RWA protocols, as losses from RWA-specific exploits reached $14.6 million during the first half of 2025, according to a report by blockchain security firm CertiK and shared with Cointelegraph.<\/p>\n<p>The $14.6 million is more than double the $6 million lost to RWA protocol exploits during 2024, and may rise above the $17.9 million lost in 2023.\u00a0<\/p>\n<p>These RWA exploits were defined \u201centirely by onchain and operational failures,\u201d signaling a \u201cclear transformation in the RWA threat landscape between 2023 and 2025,\u201d according to CertiK.<\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/s3.cointelegraph.com\/uploads\/2025-08\/0198cc61-cd52-727a-b0cf-64faf7c751e9\" title><figcaption><em>RWA exploits by blockchain networks. Source: CertiK<\/em><\/figcaption><\/figure>\n<p><em><strong>Related: <\/strong><\/em><a data-ct-non-breakable=\"null\" href=\"https:\/\/cointelegraph.com\/news\/tokenized-stocks-rise-220-of-early-defi-boom\" title=\"null\"><em><strong>Tokenized stocks rise 220% in July, reminiscent of \u2018early DeFi boom\u2019<\/strong><\/em><\/a><\/p>\n<p>The growing malicious activity around the sector comes as the <a data-ct-non-breakable=\"null\" href=\"https:\/\/cointelegraph.com\/news\/rwa-token-market-bitcoin-adoption-2025\" title=\"null\">RWA market surged<\/a> over 260% during the first half of 2025, surpassing $23 billion in total valuation by June 5, Cointelegraph reported.<\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/s3.cointelegraph.com\/uploads\/2025-06\/01973f40-5a23-7389-b65f-02527846708f\" title><figcaption><em>RWA market total value, all-time chart. Source: Binance Research<\/em><\/figcaption><\/figure>\n<p>Tokenized private credit led the RWA market boom, accounting for about 58% of the market share, followed by tokenized US Treasury debt, which accounted for 34%, driven by \u201cincreased participation from major industry players,\u201d as \u201cregulatory frameworks become clearer,\u201d according to a Binance Research report shared with Cointelegraph.<\/p>\n<p><em><strong>Related: <\/strong><\/em><a data-ct-non-breakable=\"null\" href=\"https:\/\/cointelegraph.com\/news\/2-1b-crypto-stolen-2025-hackers-human-psychology-certik\" title=\"null\"><em><strong>$2.1B crypto stolen in 2025 as hackers shift focus from code to users: CertiK<\/strong><\/em><\/a><\/p>\n<h2>RWA tokenization introduces \u201chybrid\u201d security risks due to offchain assets<\/h2>\n<p>RWA protocols present more complex, \u201chybrid\u201d security challenges, as an RWA token\u2019s value is a claim on an offchain asset, expanding the attack surface beyond just smart contracts.<\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/s3.cointelegraph.com\/uploads\/2025-08\/0198cc61-d3ac-71c6-a903-bfc9c4910fd7\" title><figcaption><em>RWA Tokenization Introduces Complex, Hybrid Security Risks. Source: CertiK<\/em><\/figcaption><\/figure>\n<p>Each component of this five-layer security stack can present a single point of vulnerability, according to CertiK\u2019s report, which states:<\/p>\n<blockquote data-ct-non-breakable=\"undefined\"><p>\u00a0\u201cKey risks emerge from this interaction because offchain processes involve human actors, are subject to legal interpretation, and follow operational workflows.\u201d<\/p><\/blockquote>\n<p>Risks include oracle manipulation, custodial and counterparty failures, the \u201cunenforceability of legal frameworks, and fraudulent proof of reserves attestations,\u201d added the report.<\/p>\n<p>RWA restaking protocol <a data-ct-non-breakable=\"null\" href=\"https:\/\/cointelegraph.com\/news\/zoth-exploit-admin-leak-causes-8m-losses\" title=\"null\">Zoth suffered<\/a> the largest exploit among RWA protocols in 2025, losing $8.5 million to a \u201cclassic operational security failure,\u201d a compromised private key on March 21, the same month a different attacker exploited a smart contract logic flaw to mint $385,000 worth of assets without sufficient collateral.<\/p>\n<p>Loopscale suffered the second-largest hack worth $5.8 million on April 26, caused by blockchain oracle price manipulation. Yet, in a positive turn of events, the protocol <a data-ct-non-breakable=\"null\" href=\"https:\/\/cointelegraph.com\/news\/loopscale-recovers-funds-after-defi-exploit-hacker-negotiations\" title=\"null\">recovered $2.8 million<\/a> worth of the stolen funds by April 29, Cointelegraph reported.<\/p>\n<p><iframe width=\"100%\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/kyNQ5YoFkWo?start=\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen loading=\"lazy\"><\/iframe><\/p>\n<p><a data-ct-non-breakable=\"null\" href=\"https:\/\/cointelegraph.com\/magazine\/tradfi-building-ethereum-l2s-tokenize-trillions-rwas-inside-story\/\" title=\"null\"><em><strong>Magazine: TradFi is building Ethereum L2s to tokenize trillions in RWAs \u2014 Inside story<\/strong><\/em><\/a><\/p>\n<p><template data-name=\"subscription_form\" data-type=\"defi_newsletter\" label=\"Subscription Form: DeFi Newsletter\"><\/template><\/div>\n<p><a href=\"https:\/\/cointelegraph.com\/news\/rwa-protocol-exploits-14-6m-in-h1-2025-surpassing-2024?utm_source=rss_feed&#038;utm_medium=rss&#038;utm_campaign=rss_partner_inbound\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Cointelegraph by Zoltan Vardai<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptocurrency hackers are targeting real-world asset (RWA) tokenization protocols, posing a security threat to the increasing institutional demand for this emerging blockchain sector. Real-world asset tokenization refers to financial and other tangible assets minted on the immutable blockchain ledger, increasing investor accessibility and trading opportunities for these assets. Hackers have started targeting RWA protocols, as<\/p>\n","protected":false},"author":1,"featured_media":866861,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29901,25880],"tags":[],"class_list":{"0":"post-866860","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-exploits","8":"category-protocol"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/866860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=866860"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/866860\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/866861"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=866860"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=866860"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=866860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}