By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Bybit’s $1.5 Billion Crypto Heist Sparks Debate on Centralized Exchange Security | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Bybit’s $1.5 Billion Crypto Heist Sparks Debate on Centralized Exchange Security | HackerNoon
Computing

Bybit’s $1.5 Billion Crypto Heist Sparks Debate on Centralized Exchange Security | HackerNoon

News Room
Last updated: 2025/02/26 at 1:55 AM
News Room Published 26 February 2025
Share
SHARE

Security is something I have been dealing with for the past 15–17 years. No matter how much you know, there will always be someone smarter, faster, or stronger. Yet, there is a set of rules and principles that should never be violated.

The Bybit experience was particularly illustrative for me because the exchange’s employees neglected all major security approaches—from fundamental and abstract principles to concrete, detailed measures.

Thus, I will analyze several key aspects based on this hack.

The Zero Principle of Security

Years ago, I formulated this principle for myself: “Any system can be hacked. The only question is time, money, and effort.” If hacking your system yields $1M while costing the attacker only $10K, the system will definitely be hacked. However, if hacking requires $1.1M, then the question becomes: why bother? Unless, of course, the motive is to harm a competitor or conduct a state-sponsored cyberattack.

This principle was precisely what Bybit’s employees violated. According to initial interviews, they believed their system was invulnerable. But the $1.4B price tag changed everything.

Wherever you work, you must understand that anything can be hacked, anytime, and anyway. The only variables are money, time, and effort. Knowing this, let’s move forward…

Is a Hardware Wallet + Multisig Safe?

Yes and no. Hardware wallets have always been attacked—Ledger and Trezor are prime examples. Other brands fare even worse.

However, you can mitigate risks and reduce negative impacts when using hardware/multisig wallets.

Here are some recommendations compiled from researchers and personal experience:

  • Verify what you’re signing: Always ensure that what you see matches what you’re actually signing or transferring. If you notice discrepancies, stop, pause, and evaluate the situation carefully.
  • Browser-based wallet connections are safer than direct ones: Why? Browser wallets have extensive contract databases and can sometimes provide false positives, but they highlight interactions with new and, especially, unverified contracts (which was relevant in this case).
  • Update your wallet firmware: Install only official firmware, unless you’re into ethical hacking. You can verify this on the manufacturer’s website or via hash sums.
  • Simulate transactions before signing: Always check for unexpected changes. The key concepts here are pre-check and interrupt.
  • Use alternative verification sources: Some useful tools include:
  • Safe has also introduced alternative interfaces:
  • Add.:

These precautions are just a start. Now, let’s compare them with lessons learned from the Radiant hack:

  • Multilayer signature verification: Any anomaly, even minor, should trigger a security review.
  • Independent transaction verification device: Generates verification codes that match hardware wallet data.
  • Enhanced Ledger/Trezor security: Avoid blind signing for critical transactions.
  • Audit repeated transaction failures: Recurrent issues should trigger a full transaction audit.
  • Manual transaction data verification: Extract and decode transaction data before signing, ensuring functions and addresses match expectations.
  • Dual message hash confirmation: Use Gnosis’ guide to verify transactions on hardware wallets.

Did Bybit implement any of these? According to available data—no.

The Human Factor: The Weakest Link

Phishing, social engineering, and spam account for 80% of cyberattacks. The Bybit and Radiant cases prove this clearly.

To mitigate risks, implement role separation:

  • If you have multiple signers, they must have independent verification channels.
  • Ownership changes should be more complex than transaction approvals.
  • Cold wallets should never store more than acceptable loss thresholds (e.g., $1.5B is excessive for any exchange).
  • Any transaction discrepancies should default to cancellation, not approval.
  • Staff must receive ongoing security training—at least monthly.
  • Appoint at least one security verifier with expertise in multisig wallets and advanced security tools.

Again, public data does not confirm that Bybit followed any of these steps.

Researcher Opinions

Many experts have weighed in on this hack. Here are some key perspectives:

The key takeaway? While the attack appeared highly technical, it ultimately succeeded due to human error rather than technological vulnerabilities.

Therefore, I highly recommend studying the Radiant and WazirX cases as well. It’s clear that script kiddies are adopting these techniques, meaning that not only exchanges but a wider range of crypto projects will be targeted next.

Stay safe!

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Husband loses $80k in life savings after months of ‘gold’ calls and texts
Next Article Mass resignations at DOGE after staff refuse to be part of cutting public services – News
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Maximize Screen Space: Auto Hide Taskbar in Windows 11! | HackerNoon
Computing
Trump’s budget cuts could halt decades of progress in space science
News
Buy IPTV Subscription from the Best IPTV Provider in the USA – Top IPTV Service 2025
Gadget
AI PC shipments hit 8.8 million in Q2, accounting for 14% of total PC shipments · TechNode
Computing

You Might also Like

Computing

Maximize Screen Space: Auto Hide Taskbar in Windows 11! | HackerNoon

8 Min Read
Computing

AI PC shipments hit 8.8 million in Q2, accounting for 14% of total PC shipments · TechNode

1 Min Read
Computing

10 Best Image Analyzer AI Tools for Advanced Visual Insights

25 Min Read
Computing

The Startup Playbook Is a Lie. Ask Better Questions. | HackerNoon

6 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?