Back to Blog

Phalcon | Overview of the Web3 Security Landscape in 2023

Phalcon
January 15, 2024
4 min read

In 2023:

The Web3 space was rocked by a significant hack incident where Euler Finance was compromised, leading to nearly $200 million in asset lossesβ€”the most substantial financial impact recorded for the year.

The most common attack vector stemmed from business logic flaws, which accounted for 15 incidents with each incurring losses over $80,000, including notable hacks on Euler Finance and Platypus.

Precision loss emerged as a new type of exploited vulnerability, with the KyberSwap incident leading to approximately $46 million in losses due to precision loss during tick calculations.

As the Web3 ecosystem continues its rapid expansion, the lure of vast profits has led to an increase in hacking incidents. To combat this, Phalcon has introduced a "Security Incidents" dashboard that allows users to systematically track the latest security incidents.

You can click here to access the dashboard, or visit the homepage of our website, and then choose "Explore Transactions" to find this dashboard.

A Closer Look at 2023's Hacks and Their Exploits

You might be wondering: Isn't the Mixin Network incident the largest hack in 2023?

Indeed, that was significant, but our list focuses on hacks resulting from vulnerability exploits. Losses due to rug pulls, poor private key management, and other factors are not included in our statistics.

In Phalcon's "Security Incident" dashboard, we've compiled nearly 70 hacking incidents from 2023 resulting from vulnerability exploits, each with losses exceeding $100,000.

Take the Exactly Protocol Incident as an example:

You can learn about basic information such as the assets lost, the blockchain where the attack occurred, and the timing of the attack.

We also show the exploited vulnerability types for each incident, with a click-through option for in-depth root cause analysis. These analyses are provided by our dedicated security experts, who are consistently present to furnish the community with critical insights as soon as security incidents occur.

Additionally, this section includes PoC (proof of concept) codes compiled by our partner, DeFiHackLabs.

You can use Phalcon Fork to debug the PoC (Proof of Concept) code of security incidents and share the PoC code and transactions with the community.

Click the βž• next to the protocol name to expand and view each specific attack transaction. A simple click on the transaction hash allows you to examine the transaction's flow of funds, balance changes, and invocation flow via Phalcon Explorer.

Information βž” Insight

πŸ“Œ Want to know about attack incidents related to a specific protocol?

πŸ‘‰ Type the [protocol name] in the search box for instant results.

πŸ“Œ Curious about the most critical attack incidents of 2023?

πŸ‘‰ Choose [Loss - Descending] to quickly identify security incidents with the most significant losses.

πŸ“Œ Interested in the trend of attack incidents in 2023?

πŸ‘‰ Select [Date - Ascending] to track how attack frequencies and methodologies evolved throughout the year.

πŸ“Œ Looking for attack incidents caused by a specific type of vulnerability?

πŸ‘‰ Use the filter to select the [vulnerability type] to quickly locate relevant incidents.

πŸ“Œ If you want to compare and analyze multiple attack incidents

πŸ‘‰ Click on ⭐️ to bookmark the incident for easy reference later.

Start Exploring Now

Phalcon's "Security Incidents" dashboard not only provides Web3 security information to general users but also offers a platform for security researchers and developers to learn and review. By analyzing actual attack techniques and understanding how hackers exploit vulnerabilities, they can better identify and reinforce potential weak spots in their systems.

We'll keep our data up-to-date, ensuring you have access to the most recent hacking incident information and insights.

Explore Phalcon's "Security Incidents" dashboard now, and join us in building a more secure Web3 world.

Sign up for the latest updates
Newsletter - April 2026
Security Insights

Newsletter - April 2026

In April 2026, the DeFi ecosystem experienced three major security incidents. KelpDAO lost ~$290M due to an insecure 1-of-1 DVN bridge configuration exploited via RPC infrastructure compromise, Drift Protocol suffered ~$285M from a multisig governance takeover leveraging Solana's durable nonce mechanism, and Rhea Finance incurred ~$18.4M following a business logic flaw in its margin-trading module that allowed circular swap path manipulatio

~$7.04M Lost: GiddyDefi, Volo Vault & More | BlockSec Weekly
Security Insights

~$7.04M Lost: GiddyDefi, Volo Vault & More | BlockSec Weekly

This BlockSec weekly security report covers eight attack incidents detected between April 20 and April 26, 2026, across Ethereum, Avalanche, Sui, Base, HyperLiquid, and MegaETH, with total estimated losses of approximately $7.04M. The highlighted incident is the $1.3M GiddyDefi exploit, where the attacker did not break any cryptography or use a flash loan but simply replayed an existing on-chain EIP-712 signature with the unsigned `aggregator` and `fromToken` fields swapped out for a malicious contract, demonstrating how partial signature coverage turns any historical signature into a generic permit. Other incidents include a $3.5M Volo Vault operator key compromise on Sui, a $1.5M Purrlend privileged-role takeover, a $413K SingularityFinance oracle misconfiguration, a $142.7K Scallop cross-pool index injection, a $72.35K Kipseli Router decimal mismatch, a $50.7K REVLoans (Juicebox) accounting pollution, and a $64K Custom Rebalancer arbitrary-call exploit.

The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis
Security Insights

The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis

This BlockSec deep-dive analyzes the KelpDAO $290M rsETH cross-chain bridge exploit (April 18, 2026), attributed to the Lazarus Group, tracing a causal chain across three layers: how a single-point DVN dependency enabled the attack, how DeFi composability cascaded the damage through Aave V3 lending markets to freeze WETH liquidity exceeding $6.7B across Ethereum, Arbitrum, Base, Mantle, and Linea, and how the crisis forced decentralized governance to exercise centralized emergency powers. The article examines three parameters that shaped the cascade's severity (LTV, pool depth, and cross-chain deployment count) and provides an exclusive technical breakdown of Arbitrum Security Council's forced state transition, an atomic contract upgrade that moved 30,766 ETH without the holder's signature.