Today, a new era is dawning, one dominated by the active growth of institutional participation. Furthermore, global regulations and standards are being implemented, and attackers are becoming increasingly sophisticated in their use of artificial intelligence. In this environment, a fundamental rethink and a new approach are required for exchanges, which must ensure the protection of assets and client data to maintain the trust of their audiences.
North Korea ranked first in
digital asset theft by 2025. The largest loss was to the crypto exchange Bybit, with over $1.5 billion stolen.
$17 billion worth of Bitcoin was lost to fraud and deception in the cryptoasset market, primarily due to the use of artificial intelligence (AI) for impersonation, phishing, and automated social engineering attacks.
<>
Source:
Chainalysis
Security systems of the early 2020s were not designed for this level of automatic adaptation by attackers.
Risks related to insider threats and supply chains are now critical.
According to research, the growing attack surface beyond external hackers has exposed significant gaps in perimeter-centric security systems.
The influx of institutional capital into cryptocurrency markets over the past few years has not only increased trading volumes but also changed the rules governing exchanges.
Thus, the implementation of
MiCA ensures robust governance, disclosure, and operational standards for EU exchanges. Over 65% of European exchanges comply with MiCA requirements. Experts estimate that by the end of 2025, these platforms will already process over 90% of all cryptocurrency transactions in the EU. In our work, we see an increasing number of requests for the development of crypto exchanges that comply with US and European jurisdictions. We have already implemented an additional audit option to ensure compliance with all regulatory requirements.
<>
Source:
Coherent Market Insights
Regulatory clarity is a catalyst for institutional participation. Analysts estimate that regulated financial institutions in approximately
80% of major jurisdictions have initiated digital asset projects. This indicates the deeper integration of digital assets into traditional finance.
<>
Source:
TRM
will drive a 253% increase in payouts in 2025 compared to 2024.
By 2026, the security situation for cryptocurrency exchanges will have changed dramatically compared to 2020-2024. We at the company see that traditional security measures are no longer effective. Simple perimeter protection and static multi-factor authentication, unfortunately, are insufficient to address modern cyberthreats.
What technologies and system mechanisms will shape the security architecture of crypto exchanges in the coming years? Let's take a closer look.
Architectural safety
As we recently discussed in our feature According to The Street, today, the security of a cryptocurrency exchange increasingly depends on how it architecturally protects signature keys, asset storage, and the very nature of trading. This means that the order matching mechanism is crucial.
Multi-party computation (MPC) vs. multi-signature: Why distributed signature is more efficient
Cryptocurrency storage is based on private key management. Multi-party computing (MPC) is replacing the traditional multi-signature approach and becoming the leading model for institutional storage.
Key benefits of MPC for crypto exchanges:
- No single point of compromise – even successful hacks of individual fragments do not reveal the full keys. This means attackers need to compromise multiple independent environments to forge a transaction;
- Blockchain -independent flexibility – MPC is independent of blockchain support for multi-signatures, allowing the same storage protocol to be used for Bitcoin, Ethereum, Solana, and new L2s without re-deploying wallets. This provides a strategic advantage for crypto exchanges that operate across multiple blockchains;
- Lower execution costs and improved user experience – signatures are created off-chain and appear on the blockchain as a single standard transaction. This means gas costs are lower than with multi-signatures.
- Operational management – thresholds and participant sets can be dynamically updated without changing wallet addresses, which is critical in institutional settings.
<>
Comparison of cold wallets, multi-signature, and MPC. Source:
CCN
Multi-signature wallets require multiple complete private keys in predetermined combinations before executing a transaction. The MPC mechanism, however, splits the cryptographic key into fragments stored by different parties or devices, so the complete private key never exists in a single location.
At Merhead, we choose MPC custody to protect corporate crypto assets. In this case, the private key isn't stored in its entirety anywhere; it's divided into shares, and the signature is assembled together, eliminating single-signature issues. point of Failure. In this case, even if one node is compromised, the attacker doesn't obtain the key and can't withdraw funds. MPC is also convenient for production: you can configure thresholds/ approvals, withdrawal limits, and roles, maintaining transaction speeds comparable to those of a "hot" wallet.
Cold Storage 2.0: Asset Isolation with HSMs and Advanced Storage Controls
Cold storage has long been considered the most secure method in the cryptocurrency world. Hardware wallets or network-isolated machines are used for this purpose. Today, this concept is being refined into "Cold Storage 2.0," a mechanism based on the integration of hardware security modules (HSMs) with enhanced operational isolation.
HSMs are specialized cryptographic devices that generate and store private keys in tamper-proof hardware. This mechanism ensures that the key itself never leaves the secure environment during signing operations.
Features of the Cold Storage 2.0 architecture:
- HSMs enable offline signature operations for the vast majority (often 95–98%) of stored assets;
- Private keys are stored exclusively in physically isolated modules, which reduces the risk even in the event of a hack of the server infrastructure;
- Frequent key rotation, audit logs, and breach alerts ensure compliance, transparency, and recovery workflows required by MiCA and U.S. regulations.
Modern crypto exchange security architectures employ a hybrid approach, combining HSM modules with MPCs. This achieves hardware security and the flexibility of distributed signatures.
Security of the order matching mechanism
If crypto wallets are meant to protect assets, then an order matching mechanism is necessary to ensure the integrity of the entire market.
The order matching engine is an ultra-low-latency core that continuously matches buy and sell orders. It then executes trades in real time. Trade processing amounts to hundreds of thousands of orders per second on major crypto exchanges.
Key security considerations for order matching mechanisms:
- Algorithmic consistency and fairness. Matching algorithms must be executed deterministically and without manipulation, maintaining equal access for all market participants.
- Real-time anomaly detection. High-frequency trading (HFT) and algorithmic participants require millisecond performance. This speed also creates attack vectors. Modern systems use machine learning-based anomaly detection, which identifies suspicious order patterns and instant attack activity before they distort market data.
- Adaptive regulation and circuit breakers. To counter coordinated manipulation or extreme volatility, order matching systems use circuit breakers and dynamic regulators. They pause or adjust order execution when systemic risk thresholds are exceeded.
- Secure architecture and logging. Comprehensive audit trails, tamper-proof logs, and cryptographically guaranteed system integrity are essential to confirming reliable order execution in accordance with MiCA regulations and US law.
<>
Comparison of the main features of HSM and MPC. Source: IdeaSoft
API Security and Open Banking
According to our security analysis shared with According to Cybersecurity News, API security and Open Banking integration are becoming key priorities in cryptocurrency exchange trust models. APIs are no longer on the periphery of the architecture. They form the infrastructure that enables trading, data exchange, fiat currency transfers, integration with third-party services, and regulatory compliance.
This makes them targets for targeted attacks in modern financial systems. An
Akamai report indicates that by 2024, over 84% of financial companies will have experienced API security incidents.
<>
Source:
Akamai
Our experience shows that almost all crypto exchanges we launch experience API attacks within the first three months. Typically, attackers first identify all available API endpoints and conduct probing DDoS attacks to find the most vulnerable point. They then concentrate the load on a selected endpoint, attempting to bring down the system or disable a specific module, which is especially critical for the trading module.
To reduce the risk of such attacks, we use secret tokens in requests and limit the frequency of requests ( rate limiting ). This approach allowed us to reduce the number of successful attacks to 95%.
Protecting REST/ WebSocket APIs from Unauthorized Access
APIs enable critical functions such as order placement, market data feeds, and account management on cryptocurrency exchanges. Their role in security architecture is crucial, yet also poses significant risks.
In
their forecasts for the coming years, experts highlight API vulnerabilities as the biggest threat to the fintech sector and the crypto exchange market.
<>
Source: PTsecurity
Common API security threats:
- Authentication and authorization breaches – attackers can exploit weak or absent customer verification to gain unauthorized access to an account;
- Payload injection and manipulation – Without strict verification, attackers can inject commands or manipulate request parameters to leak sensitive data;
- Excessive data leakage – APIs may unintentionally return more information than necessary;
- Request rate abuse and DoS attacks – APIs without request rate limits lead to resource exhaustion and denial of service.
To prevent such threats, security is
integrated at the design stage using the following solutions:
- Mutual TLS (mTLS) for secure identity-based access control;
- token lifecycle management to reduce the impact of credential theft;
- Forced gateway management and continuous monitoring with anomaly detection to identify suspicious behavior.
<>
Source:
Akamai
Zero Trust Architecture: Why No One Is Trusted by Default
Zero Trust Architecture (ZTA) is now widely recognized as essential for API and fintech security. It ensures seamless authentication and authorization for every request, regardless of network location or historical trust level.
that no one and nothing is trusted by default. Every API request, interaction between microservices, or callback from third parties is verified based on identity, context, and the principles of least privilege.
According to
Forbes 2025 analysis, implementing zero-trust principles in financial infrastructure (including blockchain technology and API layers) significantly reduces the risks associated with insider activity and unauthorized network movement. This is especially important for cryptocurrency exchanges, which handle sensitive transaction data and private keys.
According to our security analysis shared with Cybersecurity News, in real-world crypto exchange practice, the ZTA model includes:
- authentication and authorization for each API call, including internal calls;
- least privilege and role-based access control tied to specific API areas;
- continuous verification using behavioral analytics, threat context, and real-time telemetry.
Risks of third-party integration in open banking
The development of open banking and open finance is driven by regulatory frameworks such as
PSD2 in Europe and similar initiatives around the world. Therefore, financial institutions (and exchanges with fiat currency integration) are required to provide API access to third parties. This stimulates innovation and expands consumer choice. However, the downside is that the risk of attacks significantly increases.
Open Banking technology was developed to enable consumers to securely share their financial data with licensed third parties. This enables a wide range of use cases, from personalized fintech apps to integrated wallets.
However, some APIs do not provide strong authentication and data minimization. This creates a high risk of unauthorized access to account data, fraudulent transactions, or large-scale data collection.
In addition to direct API vulnerabilities, third-party partners pose a significant risk, namely:
- A security breach at one partner can spread throughout the ecosystem if credentials or tokens are reused or have insufficient scope;
- Overly broad permissions granted to third parties may reveal sensitive fields beyond what is necessary.
According to statistical reports,
over 88% of companies in the financial services sector have experienced API security incidents in recent years. The average cost of a single incident exceeded $830,000 due to remediation, fines, and reputational damage.
To reduce all these risks, the following actions are necessary:
- Thoroughly vet partners and ensure compliance with strict API standards (e.g. OAuth, mTLS, FAPI);
- least privilege access with detailed configuration tied to explicit user consent;
- Continuous monitoring and detection of anomalies in partner API calls.
<>
Source:
Raidiam
Protection against market manipulation
As we recently discussed in our feature As The Street points out, in today's rapidly developing cryptocurrency markets, protection against market manipulation is becoming a central element of exchange security. This directly impacts profit-making methods such as MEV and maintaining liquidity integrity across blockchains.
MEV Defense: Preventing Preemptive and Sandwich Attacks
Maximum extractable value ( MEV) describes the amount of benefit that can be extracted by reordering, inserting, or censoring transactions during the block production process, beyond the standard fees and rewards. It has historically been implemented by miners, and now also by validators and sequencers in Proof-of-Stake and modular blockchain environments.
Key exploitation strategies include front-running attacks and sandwich attacks, where bots profit at the expense of regular traders by inserting transactions before and after the target's order.
These attacks directly impact execution quality. A sandwich attack involves an attacker discovering an unfinished transaction (often in the public mempool) and then:
- pre-purchases before it is executed, raising the price;
- allows the user's order to be executed at this inflated price;
- sells immediately, taking the profit created by the price movement.
This cycle reduces the value of a trader and can lead to multi-million dollar cumulative losses on decentralized trading platforms.
Over the past year, several ecosystems have responded to threats with anti-MEV mechanisms. These were designed to deny attackers visibility into transaction details or to incentivize reordering in favor of fair execution.
These mechanisms are implemented in the following ways:
- Private order flow and encrypted mempools. Platforms or relayers (e.g. Flashbots) Protect (private RPCs) hide transaction data from the public mempool until the order is executed, preventing bots from detecting and exploiting unfinished trades.
- Batch processing and fair ordering. Instead of executing each transaction in the order in which it arrives, batch processing groups transactions and applies fair ordering logic, minimizing the possibility of opportunistic reordering.
- Intent-based confirmation and disclosure models. Some decentralized protocols allow users to submit transaction intents (desired outcomes) rather than exact transactions, which can be resolved privately by matching mechanisms without revealing details.
Cryptocurrency exchanges and DeFi interfaces are increasingly implementing such protections by default to secure user orders and ensure fair execution.
Ensuring Liquidity Integrity in Cross-Chain Protocols
Liquidity integrity becomes another strategic layer of security when assets move between disparate networks. Cross-chain bridges and multi-chain liquidity pools ensure the seamless flow of capital. However, these systems also create new attack and manipulation vectors.
Modern
research has revealed Cross-chain sandwich attacks are variants of attacks in which attackers exploit events generated by the source chain. In this case, they can obtain advance information about transactions on the target chain. Using this information, hackers then place forward and reverse transactions, profiting before regular MEV bots even see the opportunity.
Between August and October 2025, the attackers earned over
$5.27 million in profits. This represents 1.28% of the bridge's transaction volume and demonstrates how cross-chain transparency can be highly vulnerable.
Cross-chain bridges themselves represent points of systemic risk.
A comprehensive security analysis identifies smart contract vulnerabilities, centralization threats, and oracle manipulation as key threats that could undermine liquidity guarantees and asset security when moving assets between blockchains.
To protect the integrity of liquidity between blockchains, the following come first:
- Atomic and trust-minimized bridge mechanisms – fault localization analysis, whereby the system degrades smoothly during an attack rather than completely collapses. This significantly reduces the risk of insolvency while preserving the majority of transaction throughput;
- Proofs of verification and finality – protocols employing lightweight zero-knowledge clients or cryptographic proofs for the finality of messages between blockchains are used. This ensures asset protection through verifiable consensus;
- Liquidity risk monitoring – real-time assessment of bridge status, TVL (total value locked), and event outliers. This helps effectively identify anomalies and intervene before exploitation vectors are realized.
Regulatory Security and Compliance Policy
As we recently discussed in our feature According to The Street, regulatory compliance for cryptocurrency exchanges today is a key component of systemic resilience, user trust, and institutional investor access. Regulators around the world are aligning their expectations regarding financial crime prevention, asset classification, and audit transparency. Therefore, exchanges must deeply integrate regulatory compliance into their operational and technical architecture.
Automate KYC/AML without compromising user experience
Know Your Customer (KYC) and Anti-Money Laundering (AML) controls are the foundation of regulated cryptocurrency trading environments today.
<>
Key Components of KYC. Source:
ChainUp
<>
Key components of AML. Source:
ChainUp
The US follows
FinCEN and
the SEC, while the EU follows MiCA and DORA regulations. This means crypto exchanges must identify their users, verify their identities, check for compliance with sanctions lists, and monitor transactions for suspicious activity before allowing trading or fiat deposits and withdrawals.
Unfortunately, strict compliance controls conflict with user experience (UX), leading to slower registration and re-verification, and transaction delays.
Today, leading crypto platforms are implementing automated compliance systems based on artificial intelligence and risk assessment:
- Automated identity verification. Advanced KYC service providers combine document scanning, biometric liveness verification, and global watchlist checks in under a minute, reducing registration rejections.
- Continuous AML monitoring. Real-time blockchain analysis and behavioral risk assessment identify unusual transactions both on and off the blockchain, reducing false positives and providing a more user-friendly experience for legitimate activities.
- RegTech Integration. Embedding compliance logic directly into workflows means KYC/AML checks happen transparently before users encounter critical UX-impacting issues, not afterward.
Research shows that artificial intelligence systems improve detection accuracy and reduce false positives while maintaining client privacy and resource efficiency.
According to analysts, crypto exchanges that use automated KYC/AML processes report significantly fewer manual interventions, higher throughput, and greater readiness for regulatory audits. This gives them a significant competitive advantage in the global market.
Security Specifics for RWA: Tokenized Real Estate and Shares
The tokenization of real-world assets (RWAs) in real estate, stocks, and bonds opens up new opportunities for global finance. However, it also raises regulatory compliance challenges.
According to MiCA requirements, tokenized assets (real estate, investment funds, or corporate shares) must include AML/KYC checks, reserve and disclosure requirements, and consumer protection during issuance and secondary trading. Failure to comply with these requirements could completely limit access to over 450 million potential investors in the European Union.
Key compliance areas for RWA:
- Legal protection of token rights – tokenized structures must clearly demonstrate rights to the underlying assets, ownership, and cash flows in a legally compliant structure;
- Integrated KYC/AML workflows – investors in RWA instruments are required to verify their identity upon registration and undergo ongoing risk monitoring to comply with securities law requirements and anti-fraud obligations;
- Transfer control and reporting – Token transfers may require built-in compliance logic to automatically apply rules across countries.
Preparing for Technical Audits: SOC 2 and ISO 27001 Compliance
Technical compliance audits for certifications, namely SOC 2 and ISO 27001, are becoming the benchmark for operational integrity. These systems require documented, repeatable processes for risk management, access control, data protection, incident response, and ongoing monitoring.
SOC 2 (Systems and Organizational Control):
- focuses on operational controls related to security, availability, integrity of data processing, confidentiality and protection of personal data;
- requires documented policies, evidence of compliance, monitoring logs, and incident response procedures.
ISO 27001 (Information Security Management):
- establishes a formal information security management system (ISMS) that systematically identifies and mitigates risks;
- Successful certification demonstrates that the exchange continuously assesses threats, implements controls, and monitors their effectiveness.
Incident Response Plan (Standards 2026)
Today, crypto exchange security involves not only preventing attacks but also responding to them accurately, quickly, and transparently. A robust incident response plan (IRP) is essential for resilience, reputation management, and regulatory compliance.
Response time: from minutes to milliseconds (automatic blocking of withdrawals)
According to reports, crypto exchange losses in the first half of 2025 amounted to over $3 billion. The main causes were compromised access and key management errors.
Modern incident response systems integrate security orchestration, automation, and response (SOAR) mechanisms that trigger protective actions within milliseconds or seconds of detecting a threat.
For cryptocurrency exchanges, this is achieved through:
- Automatic withdrawal blocking – as soon as real-time analytics detect anomalous withdrawal patterns, systems automatically freeze outgoing transactions until the investigation is completed. This effectively neutralizes unauthorized access before it becomes irreversible;
- Instant session invalidation and key revocation – detection of a credential compromise results in the immediate invalidation of affected sessions and the revocation of active keys. This significantly reduces the attacker's time in the system;
- Integrated threat intelligence feeds – By correlating signals from blockchain analytics, endpoint monitoring, and internal threat indicators, crypto exchanges can identify complex attack patterns early and enhance defenses without human intervention.
Transparency and communication with users during crisis situations
Speed is crucial. But trust is earned by how a crypto exchange communicates when something goes wrong. For example, a major hack at BigOne in 2025 led to delays in account deposits and trading. But the platform's commitment to full transparency, accompanied by user updates and promises of compensation, attracted attention.