Asset Tokenization in Financial Markets 2025

Page 52 of 63 · WEF_Asset_Tokenization_in_Financial_Markets_2025.pdf

Contents52 7.1 Cybersecurity Cybersecurity is paramount in safeguarding digital assets, as many crypto-related breaches still arise from conventional threats rather than lost or compromised private keys. Recent high-profile incidents demonstrate that phishing, malware and insider attacks remain the most prevalent risks. For example, in 2025 the Dubai-based crypto- exchange Bybit was hacked, leading to a loss of nearly $1.5 billion in ETH – it is regarded as the largest crypto-asset theft to date.158 This attack showed that even industry-accepted security measures such as multi-signature wallets and cold storage are susceptible when linked to operational processes and third-party services. While specific to crypto-assets, this highlights that regulated digital assets using the same technology must thwart cybersecurity risks by harmonizing cybersecurity measures in congruence with traditional financial markets. Although institutional private key security has improved through advanced methods such as multi-party computation (MPC) and hardware security modules (HSM), robust threat modelling and protection strategies remain vital. Effective private key management practices, including secure storage and strict access controls, can mitigate fallout even when other defences fail. Addressing traditional vulnerabilities and novel cryptographic threats is essential to protect users and institutions. Quantum computers represents a key threat to financial systems, and the risk increases with tokenized assets as quantum computing can render widely used encryption methods insecure. Many programmable ledgers are prioritizing quantum-resistance on their roadmaps; however, a trade-off is introduced with the efficiency of encryptions versus their quantum resistance. There are three types of quantum attacks: network interception, identity impersonation and “harvest now, decrypt later”.159 Design choices can thwart this risk, such as cross-chain protocol security, secure token transfer mechanisms and cryptographic agility.160Considerations
Ask AI what this page says about a topic: