시가 총액
24시간 볼륨
10071
암호화폐
58.26%
Bitcoin 공유

Looking Beyond Multisig and How the Recent Bybit Incident Is Reshaping Cryptos’ Security Ethos

Looking Beyond Multisig and How the Recent Bybit Incident Is Reshaping Cryptos’ Security Ethos


Crypto Daily
2025-04-03 13:12:38

Owing to the crypto market’s immense dynamism, security practices that were once considered gold standards have tended to become outdated quite quickly, especially as miscreants have continued to devise increasingly sophisticated infiltration techniques. To this point, February 2025 marked a pivotal moment in the industry's security evolution as Bybit, one of the world's largest cryptocurrency exchanges, experienced a $1.5 billion heist — making it one of the largest digital asset thefts in history. However, what made this incident particularly significant was not just its unprecedented scale, but how it seemed to challenge many of the fundamental assumptions most experts held about crypto security. For example, the combination of cold wallets and multi-signature (multisig) protocols has historically been viewed as an impenetrable pairing. However, considering Bybit was using the same standard has prompted a necessary industry-wide reassessment of security practices, ushering in what many experts call "the next generation" of digital asset protection. The situation, explained, in detail! Prior to February 2025, the crypto industry operated under a widely accepted security framework of cold wallets (offline storage) combined with multisig protection (requiring multiple authorizations for transactions) — an approach that for many years had successfully protected billions in digital assets. But on Feb 21, as Bybit CEO Ben Zhou handled what appeared to be a routine transaction, North Korean hackers compromised the exchange using a ruse that manipulated what the exchange’s operators could see rather than breaking the platform’s encryption or exploiting its code vulnerabilities. Subsequently, Zhous acknowledged that they should have “upgraded and moved away from Safe," referencing the free storage software that hackers manipulated to execute their plan. That being said, what distinguished Bybit's response from other scenarios of a similar nature was their remarkable operational resilience such that despite the substantial breach, the exchange promptly processed over 350,000 withdrawal requests (all within just 12 hours of the compromise). Not only that, within 24 hours of the incident, Safe too had implemented enhanced security measures including stricter transaction validation protocols, AI-driven monitoring systems for real-time threat detection, and additional verification steps for transaction hashes, data, and signatures. Are we witnessing the emergence of a new security frontier? From the outside looking in, the Bybit incident seems to have accelerated the adoption of advanced security technologies that go beyond traditional multisig approaches as evidenced by the fact that security experts are now emphasizing that crypto exchanges handling billions in customer assets require specialized enterprise-grade solutions rather than general-purpose tools. In this context, the industry now seems to be moving toward a new digital frontier known as Multi-Party Computation (MPC) wallets wherein cryptographic keys are distributed across multiple secure environments, significantly reducing single points of failure. To elaborate, these systems are specifically designed to withstand sophisticated social engineering attempts and user interface manipulations — which were precisely the vulnerabilities exploited in the Bybit attack. Another crucial development has been the adoption of " clear signing " technology that is designed to ensure that transaction signers have complete visibility into the details of what they're authorizing, thereby providing additional verification channels to flag any potential discrepancies. Last but not least, security firms are starting to recommend a zero-trust security model wherein companies treat every device and interface as a potential point of compromise, thus requiring independent verification channels (alongside air-gapped signing devices dedicated exclusively to authorization processes). Growing and learning without playing the blame game One thing that has been particularly eye opening about the entire episode is how even the most technically competent organizations can sometimes fall victim to well-orchestrated attacks that exploit the human element of security systems. Therefore, rather than linking this failure specifically to Bybit, security experts have largely viewed the incident as one that has revealed industry-wide vulnerabilities that had previously gone unaddressed. Moreover, it also seems to have shone a light on the camaraderie shared between the industry’s largest players as within just hours of the compromise, several popular exchanges offered to extend immediate liquidity support — with Bitget CEO Gracy Chen going as far as extending a $100 million loan requiring no collateral or interest-based repayments. Thus, looking ahead it appears as though the events of the last few months will most likely usher in the adoption of comprehensive end-to-end security frameworks that can address both the technical and human vulnerabilities exposed by this episode. Interesting times ahead!! Disclaimer: This article is provided for informational purposes only. It is not offered or intended to be used as legal, tax, investment, financial, or other advice.


면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.