1/11
Series A Pitch

Web3 Security SaaS

to make Web3 a safer place

The Problem
Hacken Logo

Breaches caused by compliance and security failure

Hackers are targeting Web3 as a major source of revenue

Regulators are racing to formalize crypto’s rules of the road

Web3 builders need to meet rising security standards

Running Total by Year chart showing cryptocurrency funds stolen from 2022 to 2025
$1.96B
Total 2025 Q1 loss
$2.24B
Entire 2024 stolen figure
$1.46B
Bybit hack: signers were tricked into authorising a malicious transaction via a compromised Safe{Wallet}

Access Control -- for the third straight quarter it's the reason for the largest exploits

What's Causing the Problem?

🏦🙈
Hidden Reserves

Exchanges can still mask holes in their balance sheets; regulators now demand real-time on-chain proof collateral exists.

🔓
Loose Controls

Bridges and DeFi apps often launch with single-sig keys; one compromised key can drain every user wallet.

📄
One-Time Checks

Audits stop at launch; configs drift, keys rotate, new code ships un-reviewed--fresh attack surface every week.

💸
Bleeding Continues

Without always-on, regulator-grade compliance the sector is on track to lose $2 billion+ each quarter.

Why now
Hacken Logo

Regulators are enforcing high Web3 Security and Compliance standards

Collage of crypto regulation news headlines
Regulators are bringing the wind--MiCA, DORA, and global copycats are pushing compliance onto exchanges, DeFi, and wallets.
Hacken acts as a diffuser--its shield breaks down complex rules into clear actions that teams can follow with confidence.
🌟
With clearer rules and stronger defenses, fewer funds get stolen--so trust grows, and the industry moves forward.
The Solution
Hacken Logo

Risk management and Federated service arm

Delivering code to deployment security via a comprehensive platform centered around Extractor risk management and audit service.

Compliance Failure Why it matters Hacken solutions that fix it
🏦🙈 Hidden Reserves Users & regulators need live proof assets ≥ liabilities. Real-time transparency prevents insolvency.
Proof of Reserves Logo
Proof of Reserves Audits
-- on-chain verification
CER.live Logo
CER.live Ratings
-- continuous transparency scoring
🔓 Loose Controls Single-key compromises allow entire protocols to be drained. RBAC & multi-sig are critical.
Hacken Logo
Smart-Contract & L1 Audits
HackenProof Logo
HackenProof
-- crowdsourced vuln discovery
📄 One-Time Checks Code, keys & configs drift after launch; audits age out. Continuous monitoring required.
Extractor Logo
Extractor Risk Management
-- AI real-time code and operation security
A3 Compliance Logo
A3 Compliance Dashboard
Trust Army Logo
Trust Army Research
The Flywheel
Hacken Logo

Bug bounty and security rating

to crowdsource and contribute to the community which in turn helps products and services

Hacken's Security Flywheel Diagram showing Risk Management, Services, Bug Bounties, and Security Ratings as pillars.

How the Pillars Reinforce Each Other

Hacken's ecosystem forms a continuous security loop:

• Services uncover vulnerabilities & compliance gaps → feed Bug-Bounty scopes & Risk dashboards.

• Bug Bounties crowd-source exploit discovery → sharpen future audits & enrich threat-intel for Extractor.

• Risk Management runs 24/7 checks → auto-triggers tasks for auditors and hunters.

• Security Ratings make all of this transparent -- rewarding strong security and pushing weaker teams back into the loop.

The Federation GTM
Hacken Logo

Federated service arm to ensure end customer experience and GTM efficiency

We deploy and maintain software through wholly-owned subsidiaries in core markets and JV in new markets.

🏢

Wholly-Owned Subsidiaries

Direct control and consistent service delivery in core markets

  • Europe
  • North America
  • MENA (Middle East & North Africa)
🤝

Joint Ventures

Strategic partnerships for market expansion and localization

  • Turkey
  • Hong Kong
  • Singapore
  • Korea
  • More to come...

Revenue: Software licenses + 20% revenue sharing

👥

Local Partner Profiles

Diverse federation potential with specialized expertise

📦
Cybersecurity teams
Spin-offs from leading blockchain CEXs, L1s-L2s
🏗️
Existing web3 cybersecurity
Small and medium companies
🌐
Local entrepreneurs
Tight connections to regulators
🛡️
Local web2 cybersecurity
Companies
💰
Tier 1-2 crypto VCs
Private Equity firms
Current Alternatives
Hacken Logo

Web3 Security - No Comprehensive Software Yet

Current vendors focus on service, not software products.

Our competitors focus on some key areas however they do not provide a holistic solution to comprehensive regulatory & compliance services for the Web3 sector.
Vendor Hacken CertiK Elliptic Chainalysis Hypernative Chainalysis
Product Extractor SkyInsights Elliptic Chainalysis Hypernative Hexagate
Compliance Monitoring
AML Transaction Screening
Cross-Jurisdictional Compliance
Community Sentiment Monitoring
Real-Time Threat Detection
Cross-Chain Security Monitoring
Risk Assessment and Scoring
Dynamic Risk Scoring Based on External Events
Incident Response and Mitigation
Automated Risk Mitigation Actions

Extractor is uniquely positioned as a one-stop platform to fully meet customer needs in this niche

Market opportunity
Hacken Logo

Total Addressable Market

Web3 represents a massive growth opportunity in the cybersecurity space

Statista Market Forecast

According to Statista, the cybersecurity market is forecasted to reach 272 billion USD by 2029.

Institutional Adoption Drive

The current market growth phase (from 2023) is driven by institutional companies entering the digital asset space.

They allocate a higher share of their IT budgets (ca. 11%) to cybersecurity compared to the existing crypto companies (less than 5%).

Web3 Security Opportunity

This new market shift and the influx of traditional institutions present a new opportunity worth $4.5 billion in the Web3 cybersecurity market, with a forecasted growth rate (CAGR) of 44.9%.

Hacken's Positioning

Extractor is well-positioned to become the leading provider of SaaS infrastructure and services for the Web3 Security & Compliance market.

$272B
Global Cybersecurity Market
$4.5B
Web3 market share
Financial projections
Hacken Logo

A balanced and sustainable growth through diversified revenue streams to achieve $70M revenue target in 2029

$0 $20 mln $40 mln $60 mln $80 mln 2024 2025 2026 2027 2028 2029
Services for CASP Institutions
Subscription for Regulators
Investors and Digital Asset Managers

Revenue Breakdown

SaaS Revenue includes:

Extractor

CER.Live

HackenProof

AI Audit Automation

Service Revenue includes:

Core existing audit services (Smart Contract Audit, PenTest, L1, dApps)

Consulting (Tokenomics, Cybersecurity Strategy & Implementation, Post-Implementation Certifications and Education for Enterprises)

Cap table & Use of funds
Hacken Logo

$9M for $90M post-money valuation

Cap table

Dyma Budorin53%
Fiat Lux Investments20%
Yev Broshevan5%
Andriy Matiukhin5%
Denys Ivanov2%
Mike Boxmining2%
Hacken community1.5%
Others1.5%
Employees equity options10%

Use of funds

Extractor & A3 -- 4 M
AI tooling -- 2 M
Global ops -- 2 M
Tokenisation -- 1 M
The Team
Hacken Logo

Meet our team

Hacken Team Members