Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Crypto lost $482M in Q1 2026 to hacks and exploits.
I just went through @hackenclub's Q1 Security & Compliance report, so you don't have to.
Here are the most important insights ↓
——————————
1️⃣ Audited VS unaudited protocols exploit amounts
Six audited protocols were exploited in Q1.
Average loss:
• $6.3M for audited projects
• $4.3M for unaudited
Audited projects hold more value, which makes them bigger targets.
Attackers also tend to target what falls outside the audit scope.
2️⃣ The biggest incident so far in 2026
In January, someone posing as IT support convinced an individual to hand over their hardware wallet recovery credentials.
The attacker walked away with $282M in BTC and LTC, immediately swapping into $XMR to make tracing nearly impossible.
Definitely the unluckiest individual in 2026.
3️⃣ Hackers are moving fast... or are they?
In 76% of cases, hackers move funds before the team is aware of the hit.
Average hack report time is ~1.5 days.
Makes you wonder whether some teams were genuinely unaware or if delaying the announcement was convenient for them.
4️⃣ Smart contract exploit trend
Total Q1 2026 losses were lower than Q1 2025, but only because there was no catastrophic exchange hack this quarter.
Smart contract exploit losses are actually up 213% YOY, reaching $86.2M across 28 incidents.
Not really an improvement if you look at it from this angle.
5️⃣ North Korean hackers keep draining the crypto space
They were responsible for $2.04B in theft in 2025, accounting for 52% of all annual losses.
None of it happened through smart contract exploits.
Every single incident used social engineering.
The fake VC call that took down @StepFinance_ is the same playbook they've been running, and it keeps working because of the human layer.
6️⃣ RWA protocols became the most vulnerable sector to audit findings
In Q1, RWA and TradFi protocols averaged 22.4 audit issues per review, more than any other sector.
Most of the risk isn't in the token logic itself.
It's in the compliance controls that are built correctly on paper but don't work how they're supposed to in practice.
7️⃣ Patching code introduces new vulnerabilities
1 in 3 attempts to fix a vulnerability accidentally introduced a new one in Q1 this year.
Projects need to treat code review after every patch as standard procedure if they don't want this to become a trend.
8️⃣ The @VenusProtocol extraction
The attacker spent nine months quietly accumulating 84% of the token's supply before triggering the exploit.
The whole thing was visible on-chain for the entire duration.
Nobody caught it.
9️⃣ AI-written code is prone to exploits
In February, @MoonwellDeFi lost $1.78M to what might be the first exploit of AI-authored code.
Using AI to code opens projects up to unforeseen vulnerabilities.
That's the defining security risk of 2026.
🔟 The most audited protocol in Q1 still got drained for $25M
Not even 18 audits stopped @ResolvLabs from getting drained.
The attacker compromised their AWS infrastructure to steal the key that authorized USR minting.
Two transactions later, 80 million unbacked USR tokens were minted from $200K in collateral, extracting $25M before the team paused operations.
——————————
With everything that's happening, it's clear that security in crypto is taken very lightly.
Teams should rethink their approach to this problem before focusing on anything else.
Otherwise, we could see a lot more victims featured in reports.