Decurity Logo

Time-to-Hack: How fast vulnerable smart contracts get exploited?

Knowing the answer to this question is crucial for understanding smart contract security. Vulnerabilities in contracts can often go unnoticed during development or audits, but once deployed, how quickly do attackers find and exploit them?

Key Insight
Our research reveals that of vulnerable smart contracts are exploited within the first 30 days after deployment, with many hacks occurring within just 7 days.
However, some vulnerabilities remain untouched for years before being exploited.

Through analysis of real-world examples (excluding MEV-bot hacks and rug pulls), we identified several significant trends that reveal just how quickly attackers react to vulnerabilities.

The goal of this research is simple: to give the blockchain security community a clearer picture of exploit timing, highlight patterns in attack behavior, and help teams implement stronger security measures before it's too late.

Vulnerability Exploitation Timeline

We usually think that vulnerable smart contracts get hacked quickly, but that's not always true. Some stay live and operational for years before being attacked. Why? Because exploitation isn't always about speed—sometimes, it's about strategy.

Let's examine how long these contracts actually remain unhacked before exploitation.

This visualization shows how long vulnerable contracts remain untouched before getting hacked. The x-axis represents the number of incidents, while the y-axis categorizes the time elapsed before a hack into four ranges:

≤7 days, 8-30 days, 31-90 days, >90 days

The data reveals a clear pattern:
The >90-day range accounts for the highest number of exploits —vulnerabilities remain untouched for months or even years, only to be exploited when least expected.

Following closely is the ≤7 days range with, indicating that attackers actively monitor new contracts and exploit vulnerabilities immediately. While the frequency of attacks decreases after the first week, a significant number still occur within the first month.

Two Distinct Attacker Profiles
  • Speed-driven attackers: These individuals leverage automated tools and monitoring systems to swiftly identify vulnerable contracts, often exploiting them within hours of deployment. They prioritize quick gains over maximum value extraction.
  • Strategic attackers:These actors are more patient, focusing on high-value systems and waiting for the right moment, like when liquidity is highest. They can observe weak contracts for extended periods before taking advantage of them

...But what about the extremes?

While many smart contract hacks happen within days or weeks, our dataset uncovers some striking outliers that reveal just how unpredictable these attacks can be.

One of the quickest attacks we observed happened just 10 minutes after deployment. The victim was YON, which suffered an instant exploit due to a critically flawed transferFrom function. This function lacked proper permission validation, allowing an attacker's contract to drain tokens directly from the liquidity pool almost immediately after deployment.

Fastest Exploitation
10 minutes
Name:YON
Incident Date: May 22, 2024
Amount Lost: $ 118,000

On the other side, some vulnerabilities can remain unexploited for more than 2 years before being discovered and exploited. A notable example is the 1inch Settlement contract vulnerability, which remained dormant for years before exploitation.

This case demonstrates that even well-established protocols with significant usage can harbor long-term vulnerabilities. For a detailed analysis of this incident, check out our comprehensive postmortem report.

Longest Time to Exploit
2+ years
Name: 1inch: Settlement
Incident Date: March 5, 2025
Amount Lost: $5,000,000

Annual Trend Analysis of Smart Contract Exploits

Let's dig deeper into the annual trend analysis of smart contract exploit times, focusing on the median and mean values from 2020 to 2024. These values represent the time from the deployment of a vulnerable contract to its exploitation, providing key insights into how attacker behavior and exploit dynamics have evolved over time.

Exploit Trends from 2020 to 2024

As we examine the data, both the median and mean exploit times show a clear shift. From 2020 to 2024, both values steadily decreased, revealing a trend where vulnerabilities are increasingly exploited faster over the years. This shift likely reflects the growing sophistication of attackers, aided by improved tools, techniques, and increased market attention to smart contract vulnerabilities. It's a sign that vulnerabilities are being identified and exploited more quickly than ever before.

The Mean vs. Median Gap: What It Reveals About Exploits

When examining how long vulnerable smart contracts last before being hacked, a clear trend appears: the mean exploit time is always higher than the median. This means that while most hacks happen quickly, some contracts remain untouched for much longer.

Over time, the median exploit time has dropped, showing that attackers are moving faster than ever. Meanwhile, the higher mean points to outliers—contracts that stay vulnerable for months or even years before being exploited.

These delays aren't random; they often indicate carefully planned attacks, where hackers wait for the right moment to strike.

Mean Time to Exploit
Highly affected by outliers
Median Time to Exploit
Typical exploit timing

Between 2020 and 2024, both median and mean exploit times have decreased, meaning that vulnerabilities are being exploited sooner. What used to take weeks now happens in days or hours. However, the ongoing gap between mean and median suggests that slow, strategic attacks still occur, reinforcing the need for continuous security monitoring even for contracts that have been running without issues for extended periods.

Not All Networks Are Equal: How Exploit Timelines Vary

As we've seen from the annual trend analysis—where exploit timelines have generally shortened from 2020 to 2024—the landscape of smart contract vulnerabilities is evolving at a rapid pace.

But what happens when we break this down further? How do these patterns shift across different blockchain networks like Ethereum, Binance Smart Chain, and others?

When examining mean and median exploit times across various networks, it becomes clear that not all networks are experiencing the same trends. The differences are significant, and they shed light on the unique challenges each platform faces in securing smart contracts.

Mean Time to Hack

Ethereum
Binance

Median Time to Hack



The Mean Time to Hack reveals how long, on average, a contract survives before being exploited. A high mean suggests some contracts remain vulnerable for long periods before being targeted, possibly due to strategic waiting by attackers or overlooked vulnerabilities.

Meanwhile, the Median Time to Hack gives a clearer picture of what's typical—half of the attacks occur before this point, half after. If the median is low, it means most hacks happen quickly, even if a few outliers extend the mean.


Exploit Timelines: Ethereum vs. Binance Smart Chain

Ethereum, with its complex and high-value contracts, tends to have a longer time to exploit. While some contracts are hacked almost immediately, others remain vulnerable for extended periods, as attackers often take their time analyzing high-value targets before striking.

On the other side, Binance Smart Chain often sees a lower exploit time, meaning attacks happen sooner on average. The reasons? Several factors contribute to this difference:

  • BSC's lower transaction fees and shorter block times encourage the rapid deployment of smart contracts, often with minimal auditing
  • This creates an environment where a high volume of contracts enters the market quickly, making it easier for attackers to identify and exploit vulnerabilities
  • The lower barrier to entry on BSC can lead developers to prioritize speed over comprehensive security measures
  • Tracking the Lifespan of Vulnerable Smart Contracts

    Now that we've explored how exploit timelines have changed over the years, let's dive into the details of individual smart contracts. We know the timelines are getting shorter, but what's really happening with these contracts? Do some get hacked right away, or do others survive much longer?

    To answer this, we've built a chart using our own database. It shows when each hack happened and how long the contract lasted before getting exploited. Each point represents a hacked protocol, with the x-axis marking the time of the attack and the y-axis showing how long the contract was active before it was targeted.

    It's interesting to see the variety—some contracts are compromised almost immediately, while others last for years.

    The Role of Stat-analyzer Tools in Changing Exploit Timelines

    You've probably noticed the red dashed vertical lines on this chart. These lines mark the release dates of key static analyzer tools designed to identify vulnerabilities in smart contracts.

    These tools have definitely had an impact. Though we can't say with certainty whether attackers are using them, the data suggests the automatic detection and exploitation of access control vulnerabilities straight after the deployment is becoming more common.


    Why Some Vulnerabilities Stay Hidden for Years

    But here's where things get even more interesting: despite the rise in quick exploits, some contracts remain vulnerable for months or even years before getting hacked. This raises an important question—why do some security flaws remain undiscovered for so long?

    One possibility is that certain vulnerabilities are too complex or obscure to be easily spotted, even by skilled attackers or automated scanners. Another explanation is that some contracts simply aren't valuable enough to attract immediate attention.

    Attackers tend to prioritize high-value targets, leaving lower-profile contracts untouched until circumstances change—such as a sudden surge in user activity or total value locked (TVL).

    This mix of immediate and delayed exploits shows that blockchain security isn't just about catching vulnerabilities early—it's also about continuous monitoring and adapting to new threats as they emerge. Even if a contract has been running without issues for years, it doesn't mean it's safe.

    How Soon After a Proxy Upgrade Do Attacks Happen?

    After diving into the lifespan of vulnerable smart contracts, we decided to focus on a specific aspect: hacks that involve proxy patterns.

    Proxy Upgrade Pattern are essential for smart contracts because they let developers update and change contract logic without starting over. The proxy contract maintains the state and storage while delegating function calls to a separate implementation contract that can be replaced. While this is incredibly useful for flexibility and scalability, it also opens the door to potential vulnerabilities if the updates aren't thoroughly tested and validated before deployment.

    We focused specifically on how quickly vulnerabilities introduced by implementation upgrades are exploited. After analyzing several cases of attacks that occurred after implementation upgrades, we created a timeline to track how long it took for vulnerabilities to be exploited.

    The chart below represents this timeline. On the x-axis, we have the implementation update date, and on the y-axis, we're tracking how long it took until a hack happened—ranging from hours to months. Each white dot on the chart represents a case where a vulnerability turned into an exploit after the update.

    It's important to note that the dataset we analyzed is relatively small, meaning the conclusions we draw come with the limitation of a limited sample size.

    However, even with this limitation, the trends we observed were strongly clear. On average, it takes around for a vulnerability to be exploited after an update, highlighting how quickly attackers can target newly exposed weaknesses.

    If we look at the density of exploits in more detail, we can see how attacks cluster within specific timeframes after an update. The x-axis of the density chart shows the number of days since the update, while the y-axis represents the frequency of exploits within that period.

    of implementations are exploited within 30 days, with a significant concentration occurring in the first week

    Timeline: From Proxy Deployment to Hack

    To better understand the timeline of attacks, we mapped out the lifecycle of smart contract protocols—tracking the timeline from deployment and updates to when they get exploited.

    The visualization below tracks three key events in each protocol's lifecycle:

    • Proxy Deployment - Initial deployment of the proxy contract
    • Last Implementation Update - Most recent update to the implementation contract
    • Exploitation - When the vulnerability was successfully exploited

    The dotted lines connect events for the same protocol, showing each project's timeline from deployment to exploitation. Above each line, you'll see exactly how long it took for attackers to discover and exploit the vulnerability after proxy deployment—ranging from mere minutes to hundreds of days.

    The pattern is clear: attacks are much more likely to occur soon after a new implementation is deployed. One notable case, the Li.Fi exploit, follows this exact pattern, with an attack occurring shortly after the implementation update. More details on this hack can be found in our post, which points to the specifics of the hack.

    This data not only highlights the risks tied to proxy updates but also underscores the need for continuous monitoring and proactive security measures right after any changes are made. In this fast-paced environment, the sooner vulnerabilities are addressed, the less likely they are to be exploited.

    Security Recommendation
    To help stay ahead of potential threats, our Telegram bot provides real-time alerts on proxy upgrades, security events, and other critical smart contract changes.
    Stay informed and take action before it's too late—Join the bot here.

    The Fastest Exploits of Each Year

    While our research has shown that many vulnerable contracts get exploited within days or weeks of deployment, some attacks happen with astonishing speed. This section highlights the fastest exploits from 2020 to 2025, showcasing just how quickly attackers can identify and exploit vulnerabilities.

    Fastest Exploit of 2020
    4 days 23 hours
    Protocol: Value DeFi
    Network: Ethereum
    +
    Fastest Exploit of 2021
    16 hours
    Protocol: Wault Finance
    Network: Binance
    +
    Fastest Exploit of 2022
    54 hours
    Protocol: Deus Finance
    Network: Fantom
    +
    Fastest Exploit of 2023
    12 hours
    Protocol: ARA
    Network: Binance
    +
    Fastest Exploit of 2024
    10 minutes
    Protocol: YON
    Network: Binance
    +
    Fastest Exploit of 2025
    52 minutes
    Protocol: Zoth
    Network: Ethereum
    +

    The Evolution of Exploit Speed

    Looking at the data from 2020 to 2025, we can observe a clear trend: exploit times have been getting dramatically shorter. In 2021, the fastest exploit took over 16 hours, while by 2024, attackers were able to compromise vulnerable contracts in just 10 minutes after deployment.

    This acceleration in exploit speed can be attributed to several factors:

    • Advancement of blockchain monitoring infrastructure: Sophisticated monitoring systems now scan all new contract deployments in real-time, flagging potential vulnerabilities within seconds. What once required manual code review can now be automated with pattern matching algorithms that identify risky code patterns.
    • Evolution of MEV infrastructure: Maximal Extractable Value (MEV) infrastructure has matured significantly, with sophisticated bots constantly monitoring the mempool for profitable opportunities. These systems can automatically detect and exploit vulnerabilities with minimal human intervention.
    Binance Smart Chain: The Speed Champion

    It's worth noting that three fastest exploits occurred on Binance Smart Chain. This aligns with our earlier findings that BSC tends to see faster exploits compared to Ethereum Mainnet. The BSC ecosystem's lower transaction fees, higher throughput, and larger proportion of unaudited contracts creates an environment where exploitation can happen with remarkable speed.

    Security Implications

    The trend toward increasingly rapid exploits has profound implications for smart contract security:

    1. Pre-deployment security is critical: With exploits happening in minutes, there's virtually no time to fix vulnerabilities after deployment. Thorough testing and auditing before deployment is essential.
    2. Monitoring solutions: Implement real-time monitoring systems that can alert teams to suspicious activities immediately after deployment.
    3. Time-locked admin functions: Critical functions that could potentially be exploited should include time-locks to provide a window for intervention.

    As we move forward, we can expect this trend to continue, with exploit times potentially decreasing even further. This underscores the importance of proactive security measures and the need for developers to assume that any vulnerability will be discovered and exploited almost immediately after deployment.

    What Time Do Attacks Happen?

    The most active hour for attacks? UTC , happens during mid-morning in Europe when developers are starting their workday.

    A visualization of attack patterns shows clusters aligning with regional working hours, indicating that attacks occur in sync with the daily routines of different regions.

    As shown in the chart, attacks cluster into distinct phases:

  • Morning (UTC 0-6): incidents, likely linked to late-night activity in North and South America.
  • Midday (UTC 6-12): incidents—the highest frequency—coinciding with early workday hours in European countries.
  • Afternoon (UTC 12-18): incidents, aligning with peak activity in Asia-Pacific regions.
  • Evening (UTC 18-24): incidents, potentially tied to post-work hours in the Americas and Europe.
  • Based on these trends, it looks like attackers might decide to attack when developers are online and working, possibly to avoid detection in the noise of regular contract activity. But attacks that happen at night may suggest that they were planned ahead of time, where exploits are executed at times when security monitoring may be weaker.

    Understanding these timing trends can help teams improve monitoring and response strategies. If most attacks happen during work hours, security teams should focus on real-time anomaly detection and immediate response. If certain networks experience more overnight attacks, automated defense mechanisms should be strengthened during those windows.

    Final Thoughts

    In conclusion, the data highlights a dual reality: while of attacks happen within 30 days of a vulnerable contract being deployed, a significant number of more complex vulnerabilities go unnoticed for years. Modern attackers are moving quickly, leveraging automated tools to exploit vulnerabilities within minutes of deployment. Attack methods are becoming more advanced, so should security measures.

    Stay safe onchain!