DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Opinion and Analysis

What the Bybit Hack Means for Crypto Security and the Future of Multisig Protection

DigitalCIO Bureau by DigitalCIO Bureau
March 10, 2025
in Opinion and Analysis, Tech News
0
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

By Oded Vanunu, Chief Technologist & Head of Product Vulnerability Research at Check Point.

The crypto universe has just received another wake-up call. A recent high-profile breach has revealed deep cracks in the security protocols of the industry, reminding us that even the most sophisticated defenses can be compromised. This time, the hackers were able to breach a multisig cold wallet, stealing about $1.5 billion worth of Ethereum tokens.

This attack is especially troubling because it wasn’t a conventional vulnerability that looked for a flaw in the blockchain system or a smart contract. Rather,  Security researchers have determined that hackers injected malicious JavaScript directly into Safe’s online infrastructure hosted on AWS. The code was specifically designed to activate only when interacting with Bybit’s contract address, allowing it to remain undetected by regular users.

The JavaScript manipulation modified transaction data behind the scenes:

  • When Bybit signers accessed the interface, the code identified target addresses
  • It silently modified critical transaction parameters including recipient address and operation type
  • It preserved the appearance of legitimacy by displaying the original transaction details to signers

This finding confirms our assessment that this attack sets a new precedent in crypto security by bypassing a multisig cold wallet through sophisticated UI manipulation, further proving that multisigs and cold wallets are not automatically secure when the interface layer can be compromised.

Attackers used social engineering and user interface (UI) deception to carefully manipulate human behavior. The presence of human error compromises even the most robust systems.

This event highlights the pressing need for more robust security models, specifically in how transactions are authenticated and how signers verify transactions. The increasing complexity of UI-based attacks necessitates a change of strategy—moving beyond traditional cryptographic security toward comprehensive risk mitigation.

Why This Attack Changes Everything
For years, multisig wallets and cold storage have been considered the gold standard for securing crypto assets. But this breach shattered that assumption, revealing three major weaknesses: 

  • Multisig is not infallible—if signers can be deceived, multiple approvals do not guarantee safety.
  • Cold wallets are not immune—an attacker does not need to breach the storage itself if they can manipulate what a signer sees.
  • Supply chain and UI-based attacks are evolving rapidly, making them difficult to detect with traditional security measures.

With this shift in attack strategies, crypto institutions, exchanges and custodians must rethink how they authenticate and verify transactions. 

How Crypto Security Must Evolve
Given the increasing complexity of attacks, securing digital assets requires a multi-layered approach that goes beyond cryptographic security. Here’s what needs to change: 

  1. Real-Time Preventive Threat Monitoring 
  • A prevention-first approach, securing every step of a transaction
  • Developing advanced anomaly detection systems that can flag unusual transaction patterns.
  • Leveraging AI and behavioral analysis to detect and prevent social engineering attempts.
  1. Strengthening Human-Centric Security Measures
  • Educating users and institutional signers on UI-based manipulation techniques.
  • Implementing multi-factor verification processes that include independent transaction confirmation.
  1. Enhancing Transaction Verification Protocols 
  • Introducing secondary verification mechanisms to confirm transaction details before execution.
  • Using independent, air-gapped devices for transaction approvals to reduce UI-based risks.
  1. Adopting a Zero-Trust Security Model 
  • Treating every device and signer as potentially compromised.
  • Implementing strict access controls and segregating signing authority across multiple verification channels.

Looking Ahead: The Future of Crypto Security
This attack proves that a prevention-first approach, securing every step of a transaction, is the only way to stop cybercriminals from carrying out similar high-impact attacks in the future. We cannot afford to rely solely on conventional cryptographic models as attacks become increasingly complex. Rather, we need a comprehensive strategy that addresses social engineering tactics, UI manipulation risks and human vulnerabilities. Crypto institutions can better safeguard their assets in an increasingly complex threat landscape by enforcing real-time threat monitoring, educating users and bolstering transaction verification.

Although no security system is entirely foolproof, staying ahead of cybercriminals will require a proactive and flexible approach. The sector needs to move toward multi-layered defense tactics that combine stringent verification procedures, education and technology.

As digital assets become more mainstream, security practices must evolve just as rapidly. Trust, transparency and protection should be at the forefront of the crypto ecosystem—because, at the end of the day, security isn’t just about code. It’s about people.

Key Takeaways

✔Multisig and cold wallets are not immune to sophisticated social engineering and UI manipulation.
✔ The human factor remains one of the biggest security risks in crypto transactions.
✔ Organizations must integrate real-time preventive threat monitoring, secondary verification and zero-trust security models.
✔ The industry needs a paradigm shift in transaction security, moving beyond cryptographic trust toward comprehensive risk mitigation frameworks.

Tags: Check Point
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Freshworks Appoints Ian Tickle as Chief of Global Field Operations

by DigitalCIO Bureau
June 20, 2025
0
Freshworks Appoints Ian Tickle as Chief of Global Field Operations

Freshworks has announced the appointment of Ian Tickle as Chief of Global Field Operations (CGFO). Tickle, who has served in this capacity on an interim basis since April, while maintaining...

Read moreDetails

C-Suite misalignment over GenAI adoption

by DigitalCIO Bureau
June 20, 2025
0

NTT DATA has launched its new report, “The AI Security Balancing Act: From Risk to Innovation,” highlighting the opportunities and risks AI presents in cybersecurity. The findings show...

Read moreDetails

HCLSoftware Unveils XDO Framework In Dubai

by DigitalCIO Bureau
June 19, 2025
0
HCLSoftware Unveils XDO Framework In Dubai

HCLSoftware, the enterprise software division of HCLTech, kicked off its high-octane Executive Summit at Madinat Jumeirah on June 3. The invitation-only event blended Formula 1 energy with enterprise...

Read moreDetails

GerriScary: Hacking the Supply Chain Of Popular Google Products

by DigitalCIO Bureau
June 19, 2025
0
Tenable Reveals Vulnerability dubbed ConfusedFunction in Google Cloud Platform

Tenable has identified a vulnerability in Google's open-source code review system, Gerrit, dubbed GerriScary. The vulnerability allowed unauthorised code submission to at least 18 major Google projects, including...

Read moreDetails

Proofpoint And Wiz Integrate Security Solutions

by DigitalCIO Bureau
June 18, 2025
0
Proofpoint And Wiz Integrate Security Solutions

Proofpoint has announced the general availability of an integration between its Data Security Posture Management (DSPM) solution and Wiz, a leader in cloud security. As part of the Wiz...

Read moreDetails
Next Post
CRISIL To Acquire Bridge To India Energy

Qualcomm Boosts AI & IoT Capabilities with Edge Impulse Acquisition

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Orange Business and Cisco Sign MoU to Accelerate GHG Emissions Reduction

Orange Business and Cisco Sign MoU to Accelerate GHG Emissions Reduction

February 27, 2024
Schneider Electric Partners With One Click LCA

Schneider Electric Partners With One Click LCA

April 7, 2025
Strong Relationship Between Privacy Awareness and Trust in AI

Cisco’s 2025 Data Privacy Benchmark Study: Privacy landscape grows increasingly complex in the age of AI

April 3, 2025

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Dell Technologies Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud HCLTech Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?