The cryptocurrency industry is once again confronting deep-seated security failures after a whale-linked multisignature wallet was drained of approximately $27.3 million following a private key compromise earlier today.
According to PeckShield the attacker has already laundered about $12.6 million, roughly 4,100 ETH, and still held around $2 million in liquid assets. The security firm show the drainer routing a large chunk of the haul through Tornado Cash, a privacy mixer often used to break transaction links.
$27.3M Multisig Breach Exposes Persistent Operational Risks
The incident stemmed from a compromised private key tied to a whale’s multisig wallet, allowing attackers to siphon off roughly $27.3 million.
While multisignature wallets are widely viewed as an institutional-grade security standard, the breach shows how operational weaknesses — rather than smart contract flaws — remain one of the ecosystem’s most dangerous attack vectors. Private key mismanagement, phishing, and insider risk continue to undermine even sophisticated custody structures.
Crypto Losses Approach $90B as 2025 Attacks Accelerate
After more than 15 years of security efforts, the crypto industry has now lost nearly $90 billion to hacks and exploits. The pace of theft has accelerated sharply in recent months, reports Immunefi.
In November alone, more than $276 million was stolen, pushing total losses for 2025 beyond $9.1 billion. That means roughly 10% of all historical crypto losses have occurred within the past 12 months, highlighting a rapidly deteriorating threat landscape.
Immunefi CEO Says ‘Willful Negligence’ Is Fueling Web3 Hacks
Mitchell Amador, founder and CEO of Immunefi, a crowdsourced security platform safeguarding over $180 billion in digital assets, said the sector’s biggest vulnerability is not technical complexity but willful negligence.
“Crypto is facing a security reckoning,” Amador said. “As ecosystems scale, surging on-chain activity is colliding with shrinking post-deployment security budgets and an expanding, fast-moving attack surface.”
Amador notes that 99% of Web3 projects operate without basic firewalls while fewer than 10% deploy modern AI-driven security tools, leaving most protocols dangerously exposed after launch.
Post-Launch Vulnerabilities Drive Majority of 2025 Exploits
According to Amador, the majority of high-impact hacks this year did not result from failed audits. “Most hacks this year haven’t occurred due to poor audits,” he said. “They’ve happened after launch, during protocol upgrades, or through integration vulnerabilities — blind spots that audits alone can’t catch.”
The pattern reflects a broader shift in attacker behavior, targeting operational transitions rather than initial
Why Real-Time Lifecycle Security Must Replace Audit-Only Models
Amador argues the industry must abandon static, audit-centric security approaches in favor of continuous, automated, lifecycle security.
“On-chain security is simply not mature enough,” he said. “It’s still predicated on manual reviews and fragmented systems that prevent organizations from adapting their security posture in real time.”
While the technical solutions already exist, Amador explains adoption has lagged — a gap that continues to expose billions of dollars in user and institutional funds.
As crypto scales into mainstream finance, the latest $27 million multisig breach may serve less as an isolated incident and more as a warning: without a fundamental shift in security culture, losses are likely to keep mounting faster than the industry’s defenses can evolve.
The post ‘Willful Negligence’ Is Fueling Web3 Hacks, Says Immunefi CEO After $27M Multisig Breach appeared first on Cryptonews.
