Bybit loses $1.5B in hack
How the “cold wallet” was compromised
- Commenters dispute whether the hacked wallet was truly “cold”: it was a Gnosis Safe multisig smart‑contract wallet used by the exchange, not an air‑gapped hardware vault.
- The CEO’s description suggests all multisig signers’ machines were compromised and shown a spoofed Safe UI (“masked”) that looked like a normal internal transfer.
- Instead of a transfer, they apparently signed a contract upgrade that handed control of the Safe to the attacker, who then drained the ETH.
- Hardware wallets likely did “blind signing” of opaque EVM data, so signers couldn’t verify what they were really authorizing.
Security architecture & operational failures
- Many see no “protocol bug,” only human/OPSEC failure: signers “clicked through” without understanding the transaction.
- Criticisms:
- Too much value in a single wallet.
- “Cold” wallets that are regularly used and reachable via normal workflows are effectively “warm.”
- No extra controls for billion‑dollar movements (e.g., multiple tiers, airlock wallets, different signer sets, time delays).
- Others note this type of attack (UI manipulation + blind signing) has been seen before and is a systemic weakness of EVM tooling.
“Code is law”, reversibility, and ethics
- Some argue this is exactly what decentralized finance permits: whoever controls the key “owns” the assets; the system itself doesn’t distinguish theft.
- Others push back, noting prior chain interventions (Bitcoin overflow rollback, Ethereum DAO fork) as evidence that “code is law” is selectively applied when losses are big enough.
- Ideas floated: protocol‑level safeguards for known exchange cold wallets, multi‑stage/escrow‑like transactions, or on‑chain bureaucracy (delays, voting) for large moves—critics say this just recreates banks.
Tainted coins, law, and liquidation
- Debate over whether stolen coins can be sold cleanly:
- Some expect exchanges to blacklist addresses and say large‑scale off‑ramping will be hard.
- Others point out mixers, bridges, and decentralized exchanges, and note the hacker has already started liquidating staked ETH.
- A subthread discusses UCC Article 12 in some U.S. states: a good‑faith purchaser who gains “control” of a digital asset may take it free of prior property claims, unlike a stolen car.
Exchanges, solvency, and trust
- Commenters note Bybit’s huge trading volumes and the extreme profitability of crypto exchanges; some think covering $1.5B over time is plausible, possibly via loans.
- Many distrust the CEO’s assurances and suggest withdrawing funds immediately; past “we were hacked” episodes (Mt Gox, FTX, others) are cited.
- There’s recurring skepticism about custodial exchanges at all: if “professional” firms can’t keep keys safe, individuals are even less likely to do so, yet self‑custody is also unforgiving.
Broader crypto sentiment
- Strong anti‑crypto voices frame the space as a casino and Ponzi‑like system that keeps “speedrunning” the worst parts of traditional finance without its protections.
- Pro‑crypto commenters mostly emphasize censorship‑resistant cross‑border payments and usefulness in countries with capital controls or inflation, but acknowledge that security and user protection are severely lacking.