Expert Speak
What the Bybit Hack Reveals About the Future of Crypto Security

Written by Oded Vanunu, Chief Technologist & Head of Product Vulnerability Research at Check Point
The crypto universe has just received another wake-up call. A recent high-profile breach has revealed deep cracks in the security protocols of the industry, reminding us that even the most sophisticated defenses can be compromised. This time, the hackers were able to breach a multisig cold wallet, stealing about $1.5 billion worth of Ethereum tokens.
This attack is especially troubling because it wasn’t a conventional vulnerability that looked for a flaw in the blockchain system or a smart contract. Rather, Security researchers have determined that hackers injected malicious JavaScript directly into Safe’s online infrastructure hosted on AWS. The code was specifically designed to activate only when interacting with Bybit’s contract address, allowing it to remain undetected by regular users.
The JavaScript manipulation modified transaction data behind the scenes:
- When Bybit signers accessed the interface, the code identified target addresses
- It silently modified critical transaction parameters including recipient address and operation type
- It preserved the appearance of legitimacy by displaying the original transaction details to signers
This finding confirms our assessment that this attack sets a new precedent in crypto security by bypassing a multisig cold wallet through sophisticated UI manipulation, further proving that multisigs and cold wallets are not automatically secure when the interface layer can be compromised. Attackers used social engineering and user interface (UI) deception to carefully manipulate human behavior. The presence of human error compromises even the most robust systems.
This event highlights the pressing need for more robust security models, specifically in how transactions are authenticated and how signers verify transactions. The increasing complexity of UI-based attacks necessitates a change of strategy—moving beyond traditional cryptographic security toward comprehensive risk mitigation.
Why This Attack Changes Everything
For years, multisig wallets and cold storage have been considered the gold standard for securing crypto assets. But this breach shattered that assumption, revealing three major weaknesses:
- Multisig is not infallible—if signers can be deceived, multiple approvals do not guarantee safety.
- Cold wallets are not immune—an attacker does not need to breach the storage itself if they can manipulate what a signer sees.
- Supply chain and UI-based attacks are evolving rapidly, making them difficult to detect with traditional security measures.
With this shift in attack strategies, crypto institutions, exchanges and custodians must rethink how they authenticate and verify transactions.
How Crypto Security Must Evolve
Given the increasing complexity of attacks, securing digital assets requires a multi-layered approach that goes beyond cryptographic security. Here’s what needs to change:
- Real-Time Preventive Threat Monitoring
- A prevention-first approach, securing every step of a transaction
- Developing advanced anomaly detection systems that can flag unusual transaction patterns.
- Leveraging AI and behavioral analysis to detect and prevent social engineering attempts.
- Strengthening Human-Centric Security Measures
- Educating users and institutional signers on UI-based manipulation techniques.
- Implementing multi-factor verification processes that include independent transaction confirmation.
- Enhancing Transaction Verification Protocols
- Introducing secondary verification mechanisms to confirm transaction details before execution.
- Using independent, air-gapped devices for transaction approvals to reduce UI-based risks.
- Adopting a Zero-Trust Security Model
- Treating every device and signer as potentially compromised.
- Implementing strict access controls and segregating signing authority across multiple verification channels.
Looking Ahead: The Future of Crypto Security
This attack proves that a prevention-first approach, securing every step of a transaction, is the only way to stop cybercriminals from carrying out similar high-impact attacks in the future. We cannot afford to rely solely on conventional cryptographic models as attacks become increasingly complex. Rather, we need a comprehensive strategy that addresses social engineering tactics, UI manipulation risks and human vulnerabilities. Crypto institutions can better safeguard their assets in an increasingly complex threat landscape by enforcing real-time threat monitoring, educating users and bolstering transaction verification.
Although no security system is entirely foolproof, staying ahead of cybercriminals will require a proactive and flexible approach. The sector needs to move toward multi-layered defense tactics that combine stringent verification procedures, education and technology. As digital assets become more mainstream, security practices must evolve just as rapidly. Trust, transparency and protection should be at the forefront of the crypto ecosystem—because, at the end of the day, security isn’t just about code. It’s about people.
Artificial Intelligence
How AI is Reinventing Cybersecurity for the Automotive Industry

Written by Alain Penel, VP of Middle East, CIS & Turkey at Fortinet (more…)
Cyber Security
Positive Technologies Study Reveals Successful Cyberattacks Nett 5X Profits

Positive Technologies has released a study on the dark web market, analysing prices for illegal cybersecurity services and products, as well as the costs incurred by cybercriminals to carry out attacks. The most expensive type of malware is ransomware, with a median cost of $7,500. Zero-day exploits are particularly valuable, often being sold for millions of dollars. However, the net profit from a successful cyberattack can be five times the cost of organizing it.
Experts estimate that performing a popular phishing attack involving ransomware costs novice cybercriminals at least $20,000. First, hackers rent dedicated servers, subscribe to VPN services, and acquire other tools to build a secure and anonymous IT infrastructure to manage the attack. Attackers also need to acquire the source code of malicious software or subscribe to ready-to-use malware, as well as tools for infiltrating the victim’s system and evading detection by security measures. Moreover, cybercriminals can consult with seasoned experts, purchase access to targeted infrastructures and company data, and escalate privileges within a compromised system. Products and tools are readily available for purchase on the dark web, catering to beginners. The darknet also offers leaked malware along with detailed instructions, making it easier for novice cybercriminals to carry out attacks.
Malware is one of the primary tools in a hacker’s arsenal, with 53% of malware-related ads focused on sales. In 19% of all posts, infostealers designed to steal data are offered. Crypters and code obfuscation tools, used to help attackers hide malware from security tools, are featured in 17% of cases. Additionally, loaders are mentioned in 16% of ads. The median cost of these types of malware stands at $400, $70, and $500, respectively. The most expensive malware is ransomware: its median cost is $7,500, with some offers reaching up to $320,000. Ransomware is primarily distributed through affiliate programs, known as Ransomware-as-a-Service (RaaS), where participants in an attack typically receive 70–90% of the ransom. To become a partner, a criminal must make a contribution of 0.05 Bitcoin (approximately $5,000) and have a solid reputation on the dark web.
Another popular attack tool is exploits: 69% of exploit-related ads focus on sales, with zero-day vulnerability posts accounting for 32% of them. In 31% of cases, the cost of exploits exceeds $20,000 and can reach several million dollars. Access to corporate networks is relatively inexpensive, with 72% of such ads focused on sales, and 62% of them priced at under a thousand dollars. Among cybercriminal services, hacks are the most popular option, accounting for 49% of reports. For example, the price for compromising a personal email account starts at $100, while the cost for a corporate account begins at $200.
Dmitry Streltsov, Threat Analyst at Positive Technologies, says, “On dark web marketplaces, prices are typically determined in one of two ways: either sellers set a fixed price, or auctions are held. Auctions are often used for exclusive items, such as zero-day exploits. The platforms facilitating these deals also generate revenue, often through their own escrow services, which hold the buyer’s funds temporarily until the product or service is confirmed as delivered. On many platforms, these escrow services are managed by either administrators or trusted users with strong reputations. In return, they earn at least 4% of the transaction amount, with the forums setting the rates.”
Considering the cost of tools and services on the dark web, along with the median ransom amount, cybercriminals can achieve a net profit of $100,000–$130,000 from a successful attack—five times the cost of their preparation. For a company, such an incident can result not only in ransom costs but also in massive financial losses due to disrupted business processes. For example, in 2024, due to a ransomware attack, servers of CDK Global were down for two weeks. The company paid cybercriminals $25 million, while the financial losses of dealers due to system downtime exceeded $600 million.
Expert Speak
Quantum-Safe Encryption: Safeguarding Data for the Quantum Era

Written by Dr Carl Windsor, Chief Information Security Officer (CISO) at Fortinet (more…)
-
Cyber Security1 week ago
Dubai Hosts GISEC 2025, Driving Billion-Dollar Cyber Growth
-
Cyber Security6 days ago
GISEC 2025 Launches OT Security Conference Amid 49% Infrastructure Attack Surge
-
Cyber Security1 week ago
DESC to Highlight Dubai’s Cyber Defense Strategies as GISEC 2025 Government Partner
-
Cyber Security1 week ago
GISEC Global 2025: A Vital Platform to Connect With Customers and Partners in the Region
-
Artificial Intelligence6 days ago
CyberKnight Partners with Ridge Security for AI-Powered Security Validation
-
Cyber Security7 days ago
Huawei Experts Reiterate the Importance of a Unified Cybersecurity Foundation at GISEC Global 2025
-
Cyber Security1 week ago
Inside the Shadowy World of Investment Scams: How Fraudsters Use Facebook and Fake News
-
Cyber Security1 week ago
Rising Cyber Insurance Pressures Push UAE Firms to Fix Identity Silos and AI Vulnerabilities