In one of the largest cryptocurrency breaches to date, hackers infiltrated an offline Ethereum wallet and stole approximately $1.5 billion in digital assets, primarily consisting of Ethereum tokens. The cyberattack targeted the cryptocurrency exchange Bybit, raising concerns over the security of even the most advanced storage methods. Despite cold wallets and multisignature (multisig) authentication being regarded as top-tier security measures for digital assets, the breach has demonstrated that human error and interface manipulation can still render these defenses ineffective.
The attack was identified on February 21 by Check Point’s Blockchain Threat Intelligence system, which flagged an unusual transaction within the Ethereum network logs. Researchers from Check Point determined that the breach resulted from an advanced attack that exploited vulnerabilities beyond the logic of smart contracts. Instead of directly targeting blockchain protocols, the attackers manipulated user interfaces and employed sophisticated social engineering tactics to deceive key custodians into approving fraudulent transactions.
Exploiting User Interfaces for Unauthorized Transfers
Check Point’s analysis indicated that the attack leveraged a technique initially identified in July 2024. Researchers had previously documented a pattern of exploits using the Safe Protocol’s execTransaction function, which is designed to facilitate secure multisig transactions. Attackers weaponized this function by subtly altering legitimate transaction requests, deceiving key signers who verified transactions through manipulated interfaces. This approach allowed them to gain authorization for transferring a substantial amount of funds without directly breaching security mechanisms.
Cybersecurity experts noted that the attack on Bybit mirrored vulnerabilities previously observed in similar incidents. Analysts emphasized that the most concerning aspect of this breach is the newfound exposure of cold wallets, once considered the most secure storage solution for digital assets. The attack has reinforced the argument that preventive security measures, which secure every step of the transaction process, are necessary to protect against increasingly sophisticated cyber threats.
A Shift in Crypto Security Strategies
This incident represents a major shift in the nature of cyber threats targeting digital assets. Previous high-profile cryptocurrency hacks typically exploited vulnerabilities within smart contract code or weaknesses in private key management. In contrast, the Bybit attack highlighted the evolution of social engineering tactics, which bypass traditional security layers by manipulating human oversight. Check Point’s findings suggest that even robust cryptographic security cannot fully prevent attacks when transaction signers are misled during the authorization process.
The repercussions of this attack extend beyond Bybit, as cybersecurity researchers warn that the growing trend of supply chain and UI manipulation attacks poses a critical threat to the broader digital asset landscape. As cybercriminals refine their techniques, organizations managing significant crypto holdings must reassess their security strategies. Experts recommend integrating traditional cybersecurity measures—such as endpoint threat detection, email security, and real-time transaction verification—into crypto asset protection frameworks.
The Future of Web3 Security
Check Point’s research underscores the necessity for a fundamental shift in Web3 security practices. Rather than relying solely on cold storage and smart contracts, organizations must implement zero-trust security principles. This approach involves independent transaction verification, the use of air-gapped signing devices, and enhanced scrutiny of authorization processes. Without these measures, even the most secure wallets remain vulnerable to sophisticated manipulation techniques.
As the Web3 ecosystem continues to evolve, security professionals stress the importance of proactive defense mechanisms that address not only technical vulnerabilities but also human-related risks. The Bybit hack serves as a reminder that no single security solution is foolproof, and a multi-layered approach remains essential in safeguarding digital assets against increasingly complex cyber threats.








