Profiting from disaster: Firms look to capitalize on Bybit hack

While some propose meaningful security improvements, others are opportunistically using the breach to push tangentially related products

article-image

Iryna Minhirova/Shutterstock modified by Blockworks

share


This is a segment from the 0xResearch newsletter. To read full editions, subscribe.


The Bybit $1.4 billion exploit triggered a predictable response: an influx of security and infrastructure firms each claiming that their technology could have prevented the attack.

The FBI has confirmed the hack was the work of North Korea’s Lazarus Group, which targeted Bybit’s Safe{Wallet} setup. A key detail disclosed yesterday is that it was a Safe developer’s machine — and not Bybit’s infrastructure — that was compromised, allowing attackers to inject malicious code into the transaction signing interface.

The deception resulted in Bybit’s signers blindly approving a fraudulent transaction, draining its largest Ethereum wallet.

Security researcher Taylor Monahan emphasized that this attack was entirely predictable given the crypto industry’s long-standing blind-signing problem. As she noted: “There is NO org in this space that is taking security seriously enough to protect against a dedicated, persistent, motivated adversary like Lazarus.”

Key findings include:

Safe{Wallet}’s UI was compromised — Bybit’s interface showed an expected transaction, but signers unknowingly approved a completely different transaction.

Blind signing on Ledger devices was the final failure — Bybit’s final signer, Ben Zhou, admitted he didn’t verify the transaction fully on his Ledger hardware wallet before approving it.

The attack targeted human oversight — Lazarus didn’t need to exploit smart contracts or break cryptographic security; it simply took advantage of trust in the UI.

Former Binance CEO CZ criticized Safe’s response, raising critical questions like why did a single developer’s machine have access to Bybit’s transaction process? How did Ledger’s signing process fail to prevent this? And what security lessons should the industry take away?

These are all good questions which will take some time to fully address.

A wave of companies rushes in

With every high-profile hack, companies flood the space claiming their product would have stopped it. Some address the specific issue — secure transaction verification — while others hijack the narrative for marketing.

  • OISY (Dfinity-backed onchain wallet)

Claim: Browser extensions and private key management are the weak links. OISY eliminates them by running fully onchain.

Reality: The attack had nothing to do with browser extensions or private key exposure — it was blind signing. OISY’s architecture might be novel, but it doesn’t solve the problem that caused this hack.

  • Impossible Cloud Network (decentralized cloud storage)

Claim: Centralized cloud services (like AWS) were the root cause of the exploit.

Reality: While decentralized cloud storage can reduce attack surfaces, Bybit wasn’t hacked through AWS. The issue was Safe’s UI manipulation and blind signing — not the particular choice of cloud hosting provider.

  • Cubist (hardware-backed signing security)

Claim: Enforcing strict signing policies, such as pre-approved addresses, governance delays and multi-factor authentication would have blocked this exploit.

Reality: This is actually relevant. If Bybit had enforced signing restrictions, Lazarus wouldn’t have been able to trick it into blind-signing a malicious transaction.

  • Fireblocks (MPC-based security and transaction policy enforcement)

Claim: Bybit’s security model was fundamentally flawed — Ledger’s blind-signing requirement combined with Safe’s UI vulnerability left it open to attack. Fireblocks argues that its MPC-based infrastructure, policy engines and real-time transaction verification would have mitigated this risk.

Reality: This claim is one of the more valid responses. Fireblocks’ policy enforcement would have prevented arbitrary approvals, requiring predefined transaction rules that block unexpected transactions — even if signers get tricked.

However, there’s also a risk, as Taylor Monahan put it in her characteristically sassy style. “Fancy multisig, semi-custodial, MPC, blah blah blah product…make your attack surface LARGER, not smaller.” 

The real lesson is UI trust is the biggest security hole. Bybit’s attack wasn’t about smart contracts, decentralization or private key security — it was about blind trust in a compromised UI.

In crypto, don’t trust, verify. Otherwise, you defeat the purpose of using hardware wallets in the first place. Every solution that ignores this reality is missing the point.

For all the noise about decentralized cloud storage, onchain wallets and browserless interfaces, when billions of dollars are at stake, none of this matters if you don’t have:

  • Strict transaction signing policies
  • Mandatory transaction verification on hardware wallets
  • Governance delays and multi-layer approvals

As Lazarus continues evolving, the crypto industry must stop chasing trendy fixes and focus instead on hardening transaction security — because apparently the next $1.4 billion hack is just one blind signature away.


Get the news in your inbox. Explore Blockworks newsletters:

  • Blockworks Daily: The newsletter that helps thousands of investors understand crypto and the markets, by Byron Gilliam.
  • Empire: Start your day with top crypto insights from David Canellis and Katherine Ross.
  • Forward Guidance: Explore the growing intersection between crypto, macroeconomics, policy and finance with Ben Strack, Casey Wagner and Felix Jauvin.
  • 0xResearch: Get alpha directly in your inbox — market highlights, charts, degen trade ideas, governance updates, and more.
  • Lightspeed: All things Solana, in your inbox, every day from Jack Kubinec and Jeff Albus.
  • The Drop: The newsletter for crypto collectors and traders, covering games, tokens, apps, memes and more.
Tags

Upcoming Events

Javits Center North | 445 11th Ave

Tues - Thurs, March 18 - 20, 2025

Blockworks’ Digital Asset Summit (DAS) will feature conversations between the builders, allocators, and legislators who will shape the trajectory of the digital asset ecosystem in the US and abroad.

Brooklyn, NY

TUES - THURS, JUNE 24 - 26, 2025

Permissionless IV serves as the definitive gathering for crypto’s technical founders, developers, and builders to come together and create the future.If you’re ready to shape the future of crypto, Permissionless IV is where it happens.

Old Billingsgate

Mon - Wed, October 13 - 15, 2025

Blockworks’ Digital Asset Summit (DAS) will feature conversations between the builders, allocators, and legislators who will shape the trajectory of the digital asset ecosystem in the US and abroad.

recent research

monad ecosystem report graphic.png

Research

Monad's testnet launch has shown promise with 57 geographically distributed validators and over 20 live applications on day one. However, the ecosystem's true test will come with mainnet as it transitions from testing to real economic activity alongside the launch of the native gas token.

article-image

President Trump yesterday threw markets another tariff-related curveball

article-image

The memecoin token frenzy suggests mid-cycle speculation, aligning with 2020-2021 patterns: 21Shares exec

article-image

Bitcoin’s dip, surging ETF outflows and Bybit’s $1.5 billion hack shakes investor confidence. What’s next?

article-image

Benefits of rebranding your coin include a brand-new price chart

article-image

Despite the recent downturn, K33 analysts think that there are still some winners out there, like Aave

article-image

SEC closes its investigation into Uniswap, following ditched probes into Robinhood, OpenSea and Coinbase