By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Could the ByBit Hack Have Been Prevented? Yes—Here’s How | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Could the ByBit Hack Have Been Prevented? Yes—Here’s How | HackerNoon
Computing

Could the ByBit Hack Have Been Prevented? Yes—Here’s How | HackerNoon

News Room
Last updated: 2025/03/02 at 2:59 PM
News Room Published 2 March 2025
Share
SHARE

I know everyone is talking about the ByBit attack, and this is probably the hundredth article you’ve read on the topic, but I still think it’s worth sharing a few thoughts on it.

What Happened?

In short, the North Korean Lazarus Group managed to steal $1.5 billion from ByBit’s cold wallet. The cold wallet was a Safe multisig wallet, and the transaction was signed by all authorized parties since, from the user interface, it appeared to be a completely valid transaction.

It later turned out that the Safe UI had been compromised. The attackers obtained AWS S3 credentials from a developer’s machine, which allowed them to modify the UI.

That’s the story in a nutshell. I don’t think pointing fingers or assigning blame is particularly useful. Instead, it makes much more sense to focus on the key takeaways and how this technology can be even more secure.

I understand hindsight is always 20/20, and I’m not claiming I would have done any better. The Safe team does excellent work, and everything I’ll discuss here concerns components outside of Safe itself (the smart contract-based multisig wallet).

I tweeted my thoughts after the incident. In this article, I’d like to elaborate on them in more detail.

Modules and Guards

One of the best features of a Safe wallet is that its capabilities can be extended using modules and guards. Modules add new functionalities to the wallet, while guards perform checks before a transaction is executed. These features make the wallet highly customizable and significantly enhance its security.

For example, it’s possible to restrict the wallet to only allow ERC-20 transactions (in this case, the malicious transaction was executed via a delegatecall). It’s also easy to implement a rule requiring additional signatures for transactions above a certain threshold—similar to how banks allow users to set limits for high-value transactions.

Even the proper use of just this one feature could prevent many attacks or at least minimize potential losses.

Immutable UI

Every system is only as strong as its weakest component. In this case, the weakest link wasn’t the developer whose S3 credentials were stolen—it was something much deeper. No matter how secure Web3 technology is (blockchain and smart contracts), if the Web2-based UI is vulnerable, the entire system remains at risk.

The obvious solution is to use an immutable Web3 UI. Technologies like IPFS, Ethereum Swarm, or other Web3 storage solutions can provide this. The simplest implementation is to store the UI content hash as a constant variable in the smart contract, ensuring that any UI change requires modifying the smart contract itself.

This approach fully binds the UI to the smart contract, making it impossible to alter the interface without first hacking the contract itself. With this simple solution, UI-based attacks can be effectively prevented.

Separate Device

Even if the smart contract is secure and the UI is immutable, the system remains vulnerable if the signers’ devices can be compromised. If an attacker gains access to a signer’s device, they can still replace the UI on the client side.

For this reason, anyone holding large amounts in a cold wallet should use a dedicated device—for example, an iPad—exclusively for signing transactions. This device should serve only this purpose: no other applications installed, no email or web browsing, only the necessary environment for signing transactions.

If someone is managing billions of dollars, spending a few hundred dollars on a dedicated signing device is hardly a significant expense.

External Transaction Auditing Oracle

An external auditor can be added to the wallet as an additional signer, a module, or a guard to review transactions and block them if they appear suspicious. Detecting such suspicious transactions can be done using relatively simple patterns—for example, moving an unusually large amount of funds or executing a delegatecall.

In case of a suspicious transaction, the external auditing system can notify the signers, prompting them to manually review the transaction. If they still deem it legitimate, they can re-sign it as a confirmation, adding an extra layer of security.

Conclusion

There is no such thing as an unbreakable system, but the simple solutions outlined above can make an attack significantly more difficult. If someone is managing billions of dollars, it’s well worth investing some time and effort into implementing these straightforward security measures.

I cannot emphasize enough that all these solutions build upon Safe’s brilliant architecture, and features like modules and guards.

As the saying goes, what doesn’t kill you makes you stronger. And today, Safe is stronger than ever!

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Inject AI directly into your PC with Windows 11 Pro and Copilot, now A$24
Next Article Friday Briefing: Trump Met With Britain’s Leader
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

AWS Default IAM Roles Found to Enable al Movement and Cross-Service Exploitation
Computing
Heston 120 soundbar is Marshall’s first entry into the home audio market
News
Acer’s newest release was a total surprise – you’ll never guess what it is | Stuff
Gadget
The Razr Ultra proves flip phones are almost ready
News

You Might also Like

Computing

AWS Default IAM Roles Found to Enable al Movement and Cross-Service Exploitation

5 Min Read
Computing

South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware

3 Min Read
Computing

LibreOffice 25.8 Alpha 1 Released With Performance Optimizations

2 Min Read
Computing

China to set up new government department to drive “low-altitude economy” · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?