Asset Tokenization in Financial Markets 2025
Page 52 of 63 · WEF_Asset_Tokenization_in_Financial_Markets_2025.pdf
Contents52
7.1 Cybersecurity
Cybersecurity is paramount in safeguarding
digital assets, as many crypto-related
breaches still arise from conventional threats
rather than lost or compromised private keys.
Recent high-profile incidents demonstrate that
phishing, malware and insider attacks remain
the most prevalent risks.
For example, in 2025 the Dubai-based crypto-
exchange Bybit was hacked, leading to a loss
of nearly $1.5 billion in ETH – it is regarded as
the largest crypto-asset theft to date.158 This
attack showed that even industry-accepted
security measures such as multi-signature
wallets and cold storage are susceptible when
linked to operational processes and third-party
services. While specific to crypto-assets, this
highlights that regulated digital assets using
the same technology must thwart
cybersecurity risks by harmonizing
cybersecurity measures in congruence with
traditional financial markets.
Although institutional private key security has
improved through advanced methods such as
multi-party computation (MPC) and hardware
security modules (HSM), robust threat
modelling and protection strategies remain
vital. Effective private key management
practices, including secure storage and strict
access controls, can mitigate fallout even when other defences fail. Addressing
traditional vulnerabilities and novel
cryptographic threats is essential to protect
users and institutions.
Quantum computers represents a key threat to
financial systems, and the risk increases with
tokenized assets as quantum computing can
render widely used encryption methods
insecure. Many programmable ledgers are
prioritizing quantum-resistance on their
roadmaps; however, a trade-off is introduced
with the efficiency of encryptions versus their
quantum resistance. There are three types of
quantum attacks: network interception,
identity impersonation and “harvest now,
decrypt later”.159 Design choices can thwart
this risk, such as cross-chain protocol security,
secure token transfer mechanisms and
cryptographic agility.160Considerations
Ask AI what this page says about a topic: