Table of Contents
A new report by the Swiss blockchain analytics company Global Laser said that in the first half of 2025, the 119 crypto hack was stolen by more than $ 3.01 billion, crossing the total for all of 2024. The alarm is a trend beyond increasing volume: speed.
The report analyzed onchain data associated with each exploitation, and tracked funds through the mixer, bridge and centralized exchange so quickly. By mapping the time between the early phenomena and the final laundering and opin, research found that the laundering now occurs in minutes, often revealed even before it is a hacked.
For the report, the laundering was fully completed before 23% of cases of Breach McM. In many others, the stolen funds were already at speed when the victims realized what was happy. In such cases, as long as a hack is reported, it can be too late.
Connected: Logan Paul cannot blame the co-founders of Cryptozu for collapse, says Judge
How fast is it fast?
Since hackers get more professions in laundering the stolen crypto, they are struggling to maintain anti-mani laundering (AML) system and virtual asset service provisions (VASPS).
In some cases, laundering occurs almost immediately. In the fastest incident, Mohammad Mohammed was four seconds after exploitation, which completed the complete laundering within three minutes.
Overall, 31.1% of the laundering was completed with 24 hours, which is a 37 -hour announcement of the hack. With the attacker typing 15 hours after a break, they begin before the 20-hour begins with the head of the head, an accident for the report.
In 10 out of seven events (68.1%), hack was in money before the press release, social media or A) system before it was publicly deported. And in four cases in a process (22.7%), the laundering process was completely completed before investing any internal or public disclosure.
As a result, only 4.2% stolen funds were repeated in the first half of 2025.
Connected: Arizona Woman Sencked North Korea coders to help us in crypto jobs
New rules, new responsibilities for CEX
The report also showed that in the first six months of 2025, 15.1% of all laundered crypto passed through centralized exchanges (CEXS), and that computer teams often have only 10–15 minutes to block suspect transactions.
CEX remains the most targeted entry points for attackers, which are responsible for 54.26%of the total loss in 2025, more than the token contract feats (17.2%) and individual wallet violations (11.67%)).
As hackers improve, ticket-based compliance processes that often use are no longer enough. Instituted, reports show that exchanges should adopt real -time, automatic monitoring and respected systems that detect and prevent illegal activity before looting funds completely.
In other words, speed should be matched with speed. If the laundering is completed with minutes, CEX detection and response system is required that operates rapidly.
On July 18, the new law suit as the Genius Act signed by US President Trump in the law, pressed further on exchanges and other VASPs to follow the requirements of strict AML expectations and rapid reactions.
Roman Storm trial highlights rising expectations: stop crime before this happens
How the tomb of tornado cash developer Roman Storm sees the responsibilities in Crypto, underlining a growing innings. The question in the heart of the case is: Should developers and platforms be counted to prevent illegal activity
Many people believe that they should be. US prosecutors informed the test, saying that “the storm had the ability to control that the couch had previewed illegal use, but not chosen.”
Storm is facing several allegations, one of which is a conspiracy to comment on money laundering. The prosecutors allege that his platform, Tornado Cash, helped more than $ 1 billion in illegal transactions, including funds associated with North Korea’s Lazarus Group. If he can believe in, he can withstand a prison of up to 45 years.
The storm can change in a watershed wax for open-source growth and personal equipment. Many argue that the prosecution is a developer to write the code, especially for decentralized protocols such as Tornado Cash, sets a dangerous example that can cool innovation and reduce software freedom.
Magazine: Coinbase hack shows that the law probably protects you – why is it here