
Cybersecurity firms are widening their focus on digital assets as threat activity becomes more frequent, more sophisticated, and more intertwined with the infrastructure around crypto platforms.
The Treasury recently launched a cybersecurity information-sharing initiative for digital asset firms, saying cyber threats targeting these platforms are “growing in frequency and sophistication.”
That shift comes as major security names also move deeper into the space. Reuters reported that Anthropic’s “Project Glasswing” brings together CrowdStrike, Palo Alto Networks, Amazon, Microsoft, Apple, Google, Nvidia, and others to test defensive uses of its unreleased Claude Mythos model, which the company said identified thousands of significant software vulnerabilities.
The threat is no longer limited to wallet theft
The newest risk picture is broader than phishing emails or private-key theft. Chainalysis said total illicit transaction volume hit a record $154 billion, with state-driven sanctions evasion rising 694% as actors in Russia and Iran used crypto more systematically.
TRM Labs likewise said adjusted total incoming illicit cryptocurrency activity reached about $158 billion in 2025, the highest level it has observed in the past five years.
That matters because on-chain threats now touch more of the market structure. Crypto crime reports and enforcement updates increasingly reference exchanges, custodians, bridges, protocols, and other service providers rather than isolated user accounts. TRM explicitly includes those categories in its “hacks and exploits” framework, which underscores how attacks now reach across the infrastructure stack.
Security teams are moving from perimeter defense to systems defense
This is changing how firms think about protection. The World Economic Forum’s Global Cybersecurity Outlook 2026 says supply chain risk is now led by “inheritance risk,” meaning organizations often cannot fully assure the integrity of third-party software, hardware, and services they depend on. Visibility is the next major concern.
For crypto businesses, that translates into a different operating model. Security is no longer just about keeping custody keys safe. It now includes monitoring code dependencies, bridge integrations, oracle inputs, vendor tooling, and incident-response access across multiple systems.
Treasury’s new threat-sharing initiative reflects that same logic: the objective is to give digital asset firms actionable intelligence earlier, before weaknesses spread across a platform or vendor chain.

Why on-chain threats keep evolving
The pattern is familiar: as one defense improves, attackers adapt. Chainalysis said the preceding years’ illicit landscape was increasingly driven by sanctioned entities and state-linked actors, while Reuters has documented crypto-related hacks and cross-border movements tied to geopolitical stress. In March, Reuters reported that funds leaving Iranian crypto exchanges spiked during the start of strikes, showing how quickly digital asset flows can react to external shocks.
That means the next phase of defense is less about a single protection layer and more about layered controls. Firms are focusing on faster threat intelligence, tighter vendor oversight, better anomaly detection, and more realistic stress testing of wallets, bridges, and transaction flows. Security is becoming an operational discipline rather than a support function.
Evaluating Risk in Digital Market Infrastructure
For institutions, the key issue is not whether crypto threats exist. It is how those threats affect execution reliability, custody integrity, and platform resilience. As on-chain crime becomes more industrialized and third-party risk becomes harder to see, security posture starts to influence capital decisions just as much as market opportunity does.
Kenson Investments evaluates digital asset infrastructure through that lens, with attention to how cyber risk, operational dependencies, and system visibility affect market participation. The focus is on identifying where protection is strongest, where exposure is hidden, and how institutional oversight can better align with the realities of on-chain risk.
Invest smarter – Our digital asset management consultants  help institutions assess crypto security through an infrastructure-first framework built around risk visibility, operational control, and market integrity.
Disclaimer: The information provided on this page is for educational and informational purposes only and should not be construed as financial advice. Crypto currency assets involve inherent risks, and past performance is not indicative of future results. Always conduct thorough research and consult with a qualified financial advisor before making investment decisions.
“The crypto currency and digital asset space is an emerging asset class that has not yet been regulated by the SEC and the US Federal Government. None of the information provided by Kenson LLC should be considered as financial investment advice. Please consult your Registered Financial Advisor for guidance. Kenson LLC does not offer any products regulated by the SEC, including equities, registered securities, ETFs, stocks, bonds, or equivalents.”









