![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
Articles d’actualité sur les crypto-monnaies
Bybit hack serves as a wake-up call for complacent crypto exchanges
May 01, 2025 at 11:17 pm
The Bybit hack, which saw cyber hackers walk away with the largest loss of funds from a cryptocurrency exchange in history, has served as a wake-up call for those who had grown complacent about the state of security threats in the digital assets space.
As we learn the lesson of this heist — that enterprise-grade custody solutions require tech to be accompanied by transparency — we must also recall how this incident unfolded.
Unlike many previous instances, this loss of funds was not due to a faulty smart contract, lost/mismanaged keys or deliberate mismanagement or rehypothecation of user funds, but rather a sophisticated social engineering attack that exploited vulnerabilities in operational security.
This hack differs from earlier eras because it befell a major global exchange that takes security and compliance seriously. It’s a reminder that, in crypto, there’s no such thing as “good enough” security.
The anatomy of a heist
A technical overview of the Bybit attack is key for understanding how companies can proactively strengthen their security against such incidents. Initially, a developer machine belonging to Safe, an asset management platform offering multisig Ethereum wallets used by Bybit, was compromised. This initial breach granted the attackers unauthorized access to Safe’s Amazon Web Services (AWS) environment, including its S3 storage bucket.
The attackers then pushed a malicious JavaScript file into this bucket, which was subsequently distributed to users via access to the Safe UI. The JS code manipulated the transaction content displayed to the user during the signing process, effectively tricking them into authorizing transfers to the attackers’ wallets while believing they were confirming legitimate transactions.
Recent: CertiK exec explains how to keep crypto safe after Bybit hack
This highlights how even highly robust security at the technical level, like multisig, can be vulnerable if not implemented correctly. They can lull users into a false sense of security that can be fatal.
Layered security
While multisignature security setups have long been considered the gold standard in digital asset security, the Bybit hack underscores the need for further analysis and transparency on the implementation of these systems, including the layers of security that exist to mitigate attacks that exploit operational security and the human layer in addition to verification of the smart contracts themselves.
A robust security framework for safeguarding digital assets should prioritize multi-layered verification and restrict the scope of potential interactions. Such a framework demonstrably enhances protection against attacks.
A well-designed system implements a thorough verification process for all transactions. For example, a triple-check verification system involves the mobile application verifying the server’s data, the server checking the mobile application’s data, and the hardware wallet verifying the server’s data. If any of these checks fail, the transaction will not be signed. This multi-layered approach contrasts with systems that directly interface with onchain contracts, potentially lacking critical server-side checks. These checks are essential for fault tolerance, especially if the user’s interface is compromised.
A secure framework should also limit the scope of possible interactions with digital asset vaults. Restricting actions to a minimal set, like sending, receiving and managing signers, reduces potential attack vectors associated with complex smart contract modifications.
Using a dedicated mobile application for sensitive operations, like transaction creation and display, adds another security layer. Mobile platforms often offer better resistance to compromise and spoofing compared to browser-based wallets or multisig interfaces. This reliance on a dedicated application enhances the overall security posture.
Transparency upgrades
To bolster transparency, businesses can leverage the capabilities of proof-of-reserve software. These can defend multisignature custody setups from UI-targeted attacks by providing an independent, self-auditable view of chain state/ownership and verifying that the correct set of keys is available to spend funds in a given address/contract (akin to a health check).
As institutional adoption of Bitcoin (BTC) and digital assets continues, custody providers must transparently communicate such details on the security models of their systems in addition to the design decisions behind them: This is the true “gold standard” of crypto security.
Transparency should extend to how the nature of the underlying protocols alters the attack surface of custody setups, including multisignature wallets. Bitcoin has prioritized human-verifiable transfers where signers confirm destination addresses directly rather than confirm engagement in complex smart contracts, which require additional steps/dependencies to reveal the flow of funds.
In the case of the Bybit hack, this would enable the human signer to detect more easily that the address shown by the hardware wallet did not match the spoofed UI.
While expressive smart contracts expand the application design space, they increase the attack surface and make formal security audits more challenging. Bitcoin’s well-established multisignature standards, including a native multisig opcode, create additional security barriers against such attacks. The Bitcoin protocol has historically favored simplicity in its design, which reduces the attack surface not just at the smart contracting layer but also at the UX/human layer, including hardware wallet users.
Increasing regulatory acceptance shows how far Bitcoin has come since its early era of widespread hacks and frauds, but Bybit
Clause de non-responsabilité:info@kdj.com
Les informations fournies ne constituent pas des conseils commerciaux. kdj.com n’assume aucune responsabilité pour les investissements effectués sur la base des informations fournies dans cet article. Les crypto-monnaies sont très volatiles et il est fortement recommandé d’investir avec prudence après une recherche approfondie!
Si vous pensez que le contenu utilisé sur ce site Web porte atteinte à vos droits d’auteur, veuillez nous contacter immédiatement (info@kdj.com) et nous le supprimerons dans les plus brefs délais.
-
- PAX Gold (PAXG) : surfer sur la ruée vers l'or de la cryptographie à l'ère numérique
- Oct 18, 2025 at 07:43 am
- Découvrez comment PAXG fusionne l'investissement traditionnel en or avec la cryptographie, offrant ainsi une valeur refuge dans un contexte de volatilité des marchés et révolutionnant la finance numérique.
-
- La course folle du Bitcoin : le crash de la cryptographie efface 600 milliards de dollars !
- Oct 18, 2025 at 07:24 am
- Plongez dans le récent crash de la cryptographie, au cours duquel le statut de valeur refuge du Bitcoin a été testé et 600 milliards de dollars ont disparu. Découvrez les facteurs à l’origine de la crise et ce qu’elle signifie pour les investisseurs.
-
-
- Marque déposée de l'application Crypto de MrBeast : miser sur la renommée de YouTube ?
- Oct 18, 2025 at 06:09 am
- MrBeast, la sensation YouTube, fait des vagues avec le dépôt d'une marque pour « MrBeast Financial », une application de cryptographie. Mais la renommée d’Internet peut-elle se traduire par le succès de la fintech, en particulier au milieu des controverses passées sur la cryptographie ?
-
- HBAR sous pression : tensions géopolitiques et déclin hebdomadaire
- Oct 18, 2025 at 06:03 am
- HBAR fait face à un test critique à 0,16 $ au milieu de tensions géopolitiques et de préoccupations réglementaires, déclenchant une baisse hebdomadaire de 11 %. Est-ce que cela va tenir, ou y a-t-il d’autres baisses à venir ?
-
- Trades WIF, bandes de Bollinger et oscillation du Bitcoin : un tour d'horizon des crypto-monnaies
- Oct 18, 2025 at 06:02 am
- Dogwifhat (WIF) teste le support de Bollinger Band alors que le déclin de Bitcoin fait pression sur les jetons mème. De plus, un aperçu des mouvements de prix de l'INJ et de l'APT dans un contexte de volatilité du marché.
-
-
- BlockDAG, Litecoin, VeChain : naviguer dans le passé, le présent et l'avenir de la cryptographie
- Oct 18, 2025 at 06:00 am
- Explorez les trajectoires contrastées de BlockDAG, Litecoin et VeChain : de la technologie innovante de BlockDAG à la stabilité de Litecoin et aux solutions d'entreprise de VeChain.
-
- Pièces d'or, épaves espagnoles et découvertes de plongeurs : un trésor d'histoire
- Oct 18, 2025 at 05:45 am
- Les découvertes récentes de pièces d'or provenant d'épaves espagnoles révèlent des informations fascinantes sur le commerce colonial et l'histoire maritime. Les plongeurs découvrent des histoires d'empire, de travail et de commerce.