Categories: Industry Knowledge, Technology

Top 5 Crypto Exchange Hacks & Incidents: Could They Have Been Prevented with Vaultody’s Custody Solutions?

Published: Feb 26, 2025 · Reading time: 5 minutes

AI summary: This article reviews five landmark crypto exchange failures — FTX, Mt. Gox, Bybit, Coincheck, and KuCoin. For each case it explains what went wrong (governance breakdown, hot‑wallet compromise, insecure migrations) and shows how an institutional custody stack based on multi‑party computation (MPC), hardware enclaves, and strict governance like Vaultody’s would have cut off the attack paths or blocked misuse of customer funds.

Why Exchange Hacks Keep Happening

Crypto markets have matured, but the largest losses still come from the same pattern: weak custody architecture, opaque governance, and brittle operational processes. When a single private key, a single admin account, or a single unreviewed transfer can move billions, attackers and insiders only need to succeed once.

Below we revisit five defining exchange incidents and examine how modern institutional custody — specifically Vaultody’s MPC-based custody, hardware enclaves, and policy-driven approvals — would have changed the risk profile.

1. FTX Collapse (2022)

Once considered one of the safest and most liquid global venues, FTX imploded in 2022. The failure was less about an external hack and more about misuse of client assets and inadequate internal controls.

  • What went wrong: Customer deposits were reportedly routed into affiliated trading activities and high‑risk positions. When confidence evaporated and users rushed to withdraw, the exchange did not have the assets to honour redemptions.
  • Impact: Billions of dollars of customer value disappeared, the exchange entered bankruptcy, and global confidence in centralised platforms was severely damaged. Regulators responded with far stricter expectations for segregation of client assets and proof of reserves.

Even though FTX was not a classic cyberattack, it proves a critical point: if governance and policy enforcement are weak, even sound cryptography cannot protect customers.

2. Mt. Gox Hack (2011–2014)

The Mt. Gox incident remains the archetypal crypto exchange hack. At its peak, Mt. Gox processed roughly 70% of global Bitcoin volume, but its infrastructure was not built for that responsibility.

  • What went wrong: Over several years, attackers exploited poor wallet segregation, weak internal processes, and software flaws. Around 650,000 BTC was ultimately lost, most of it from hot wallets that were insufficiently isolated and monitored.
  • Impact: The exchange collapsed into bankruptcy. Tens of thousands of users spent years in recovery proceedings, and the industry learned that “just an exchange wallet” is not a substitute for institution‑grade custody.

3. Bybit Hack (2025)

In a later generation of the market, Bybit showed that even large, sophisticated platforms can be vulnerable during operational processes such as rebalancing.

  • What went wrong: During a scheduled cold‑to‑warm wallet transfer, attackers blended social engineering with technical exploits targeting the transfer flow. They intercepted and redirected assets in motion, taking advantage of a process that temporarily concentrated large balances in a less protected environment.
  • Impact: An estimated $1.5 billion in digital assets was stolen, setting a new benchmark for single‑event losses. Although Bybit worked to compensate users and tighten security, the hack demonstrated the danger of operational single points of failure.

4. Coincheck Hack (2018)

In 2018, Japanese exchange Coincheck lost roughly $530 million in NEM (XEM) tokens.

  • What went wrong: A large volume of NEM was held in a single Internet‑connected hot wallet without multi‑signature protection or robust policy enforcement. When attackers compromised the environment, they could drain the wallet in one shot.
  • Impact: The exchange was forced into emergency measures, regulatory scrutiny intensified, and the case became a textbook example of why large balances should rarely reside in unprotected hot wallets.

5. KuCoin Hack (2020)

In 2020, Singapore‑based KuCoin suffered a compromise of multiple hot wallets, losing about $281 million in BTC, ETH, and ERC‑20 tokens.

  • What went wrong: Attackers gained access to internal infrastructure with sufficient privileges to sign and broadcast withdrawals from hot wallets. Once in, they could move funds quickly across many assets.
  • Impact: A substantial share of the funds was later traced and frozen with the help of other exchanges and issuers, but the episode showed that large, reputable exchanges are still exposed when hot‑wallet governance is weak.

How Vaultody’s Custody Architecture Breaks the Attack Chain

These five events differ in detail, but they share a common root cause: concentrated control over private keys and transaction authority. Vaultody’s custody platform is designed explicitly to eliminate these choke points.

Vaultody combines multi‑party computation (MPC), hardware enclaves, and governance tooling (such as Vaultody Approver, roles, and policies) so that:

  • no single server or human can move funds unilaterally,
  • keys never exist in a single, reconstructable form, and
  • operational and governance rules are enforced by the custody layer itself.

Multi‑Party Computation (MPC): Removing Single‑Key Risk

In a traditional wallet, one private key controls an address; compromise that key and an attacker controls the funds. Vaultody’s MPC engine replaces this model.

Key protections provided by MPC

  • No single point of failure: The signing key is mathematically split into independent, encrypted fragments. These shards are distributed across isolated environments and organisational boundaries. Neither Vaultody nor the client ever holds a full key.
  • Threshold‑based signing: A transaction is signed only when a defined subset of shards participates according to pre‑set policies. A compromised shard or environment is not enough to move funds.
  • Hot‑wallet hardening: Even “hot” wallets benefit from MPC, because an attacker who compromises one node still cannot unilaterally drain balances. This directly addresses the weaknesses seen at Mt. Gox and KuCoin.

Applied to the historical incidents, MPC would have made the hot‑wallet keys stolen at Mt. Gox and KuCoin effectively useless by themselves. Any shard capture would still have required cooperation from other, uncompromised nodes.

Hardware Enclaves & Vaultody Approver: Securing Operations in Hardware

Vaultody further isolates risk by executing sensitive processes inside hardware enclaves and enforcing explicit approvals via Vaultody Approver.

Trusted execution and controlled approvals

  • Trusted Execution Environments (TEEs): Key fragments and signing logic run inside tamper‑resistant hardware. Even if an operating system or hypervisor is compromised, the attacker cannot extract keys or change transaction data inside the enclave.
  • Vaultody Approver workflow: High‑risk actions — such as large withdrawals, policy changes, cold‑to‑warm transfers, or new address whitelists — must be explicitly approved through a configurable workflow. Approvals are enforceable by the custody engine, not by convention.
  • Policy‑driven transaction rules: Organisations can define granular rules: daily spend limits, asset‑specific limits, destination‑address whitelists, geofencing, and velocity controls. Transactions outside policy are automatically blocked or escalated.

During the Bybit cold‑to‑warm transfer hack, such an architecture would have placed multiple hard barriers in the path of attackers: the signing process itself would be locked inside enclaves, and every large internal transfer would require policy‑compliant approvals recorded by Vaultody Approver.

Role Management, Approvals, and Monitoring: Governance That Actually Bites

Technology alone is not enough; governance must be enforced in a way that insiders cannot trivially bypass. Vaultody’s platform embeds this into the custody layer.

Governance controls built for institutions

  • Granular role‑based access: Teams can define fine‑grained roles (trader, operations, risk, compliance, auditor, admin) and assign explicit rights to each. Users only see and execute actions aligned with their responsibilities.
  • Multi‑signature and multi‑step approvals: High‑value or sensitive transactions require multiple, independent approvals, potentially across departments. This prevents a single privileged actor from misusing client assets.
  • System‑action approvals: Not just transfers but also policy edits, address‑book changes, and integration modifications are subject to review and immutable logging.
  • Real‑time alerts and dashboards: Suspicious activity — such as an unusual cluster of withdrawals, new destinations, or policy downgrades — can trigger instant alerts and optional automated blocks.

In a case like FTX, where alleged internal misappropriation was central, a custody platform with enforced separation of duties, mandatory approvals, and verifiable audit trails would have made unilateral fund transfers or quiet rehypothecation extremely difficult to execute or hide.

Practical Takeaways for Exchanges and Institutions

The FTX, Mt. Gox, Bybit, Coincheck, and KuCoin incidents are not just historical curiosities; they are concrete design failures that every institution can learn from. Common risk patterns include:

  • single‑key hot wallets with large balances,
  • weak segregation between client funds and internal trading activity,
  • unprotected operational workflows (like cold‑to‑warm rebalancing), and
  • governance processes that live on paper rather than in the custody layer.

Vaultody’s custody architecture is engineered specifically to neutralise these risks for exchanges, brokers, banks, neobanks, Web3 platforms, and other institutions that hold or process digital assets at scale.

Next Steps: Hardening Your Digital Asset Infrastructure

If you are responsible for a crypto exchange, brokerage, bank, or institutional trading operation, the lessons from these incidents are clear: custody design cannot be an afterthought.

To explore how Vaultody can help you avoid becoming the next headline:

With the right architecture, the kinds of failures seen at FTX, Mt. Gox, Bybit, Coincheck, and KuCoin are not inevitable. Partnering with a custody provider built for institutional risk standards gives you a realistic way to prevent them.

Disclaimer: All external incidents described here are based on publicly available information and are provided solely as illustrative examples. Vaultody does not claim direct involvement in, or inside knowledge of, the internal operations of the exchanges discussed.

Stay updated with Vaultody insights

Subscribe to receive research, case studies, and platform updates on institutional crypto custody and risk management.

Visit the Vaultody blog or contact us to learn more.