On February 27, Bybit released a hacker forensics report, which pointed out that the theft of funds was caused by a vulnerability in Safe’s infrastructure, but it seems that Safe is unwilling to accept this accusation.On February 27, Bybit released a hacker forensics report, which pointed out that the theft of funds was caused by a vulnerability in Safe’s infrastructure, but it seems that Safe is unwilling to accept this accusation.

Bybit security investigation reveals the truth: SAFE front-end cloud service was attacked, how to ensure the safety of hundreds of billions of assets carried by multi-signature wallets

2025/02/27 15:22
7 min read

Author: Frank, PANews

On February 21, 2025, the cryptocurrency exchange Bybit suffered an epic hacker attack, and assets worth $1.46 billion were stolen by the North Korean hacker group Lazarus. In addition to recovering the assets, it is more important to identify the attack path to avoid new attacks. On February 27, Bybit released a hacker forensics report, and the investigation directly pointed out that the theft of funds was caused by a vulnerability in Safe's infrastructure. But it seems that Safe is unwilling to accept this accusation. In the statement, it admitted that the developer was hacked, but attributed the main reason to the clever methods of North Korean hackers and Bybit's operational errors. The "Rashomon" was staged in the discussion of who is more responsible, which also triggered a big debate in the industry on infrastructure trust, security paradigms and human nature.

The attack originated from the attack on Safe{Wallet} front-end cloud service

According to two investigation reports released by Bybit (Bybit Incident Preliminary Report and Bybit Interim Investigation Report), further analysis of Safe{Wallet} resources found two JavaScript resource snapshots taken on February 19, 2025. Review of these snapshots showed that the first snapshot contained the original, legitimate Safe{Wallet} code, while the second snapshot contained resources with malicious JavaScript code. This suggests that the malicious code that created the malicious transaction originated directly from Safe{Wallet}'s AWS infrastructure.

Bybit security investigation reveals the truth: SAFE front-end cloud service was attacked, how to ensure the safety of hundreds of billions of assets carried by multi-signature wallets

The report's conclusion reads: Based on our findings on Bybit's signer machines and the cached malicious JavaScript payloads found in the Wayback Archive, we strongly conclude that Safe.Global's AWS S3 or CloudFront account/API keys may have been compromised.

To summarize briefly, the initial source of this attack was that hackers attacked the Safe{Wallet} developer's device, tampered with the front-end JavaScript file in the AWS S3 bucket, and implanted targeted malicious code targeting the Bybit cold wallet address. Previously, Safe also released a simple investigation report, stating that no code vulnerabilities and malicious dependencies (i.e., supply chain attacks) were found. Safe then conducted a comprehensive review and suspended the Safe{Wallet} function. The results of this investigation seem to overturn Safe's previous investigation results.

Safe's evasive statement raises more questions

Bybit has not yet stated what responsibility Safe should bear in this incident, but after the report was released, people on social media began to discuss Safe's security vulnerability and some believed that Safe should be held responsible and make compensation.

Safe's official attitude towards this report is obviously not recognized. In its official statement, Safe divides the responsibility into three levels: in terms of technology, it emphasizes that the smart contract has not been attacked and emphasizes the security of the product. In terms of operation and maintenance, it admits that the developer's device was hacked and caused the AWS key to be leaked, but blames it on the national attack of the North Korean hacker organization. In terms of users, it recommends users to "be vigilant when signing transactions", implying that Bybit did not fully verify the transaction data.

Bybit security investigation reveals the truth: SAFE front-end cloud service was attacked, how to ensure the safety of hundreds of billions of assets carried by multi-signature wallets

However, this response seems to be evasive. According to the process shown in the report, Safe has the following negligence in this process:

1. Loss of control over permissions: Attackers gained AWS permissions by hacking into developers’ devices, exposing that the Safe team did not implement the principle of least privilege. For example, a developer could directly modify the production environment code without a code change monitoring mechanism.

2. Front-end security failure: basic protection measures such as SRI (subresource integrity verification) were not enabled.

3. Supply chain dependency risk: The attack path (developer device → AWS → front-end code) proves that Safe is overly dependent on centralized cloud services, which conflicts with the decentralized security concept of blockchain.

In addition, the industry has also raised many questions about Safe's statement. Binance founder CZ has raised five technical questions in a row (such as the specific way the developer's device was hacked, the reason for the loss of control of permissions, etc.), directly pointing out the information opacity of Safe's statement. Safe did not disclose the details of the attack chain, resulting in the industry being unable to take targeted defenses.

Tokens rose strangely, and daily activity dropped by nearly 70%

Another major point of contention in the community is whether Safe should compensate Bybit for the losses in this incident. Some users believe that the attack was caused by a vulnerability in Safe's infrastructure, and Safe should be responsible for compensation. What's more, it is proposed that Gnosis, the predecessor of Safe, bear joint and several liability for compensation. Safe was originally developed as a multi-signature agreement by the Gnosis team in 2017 as Gnosis Safe, and was spun off from the Gnosis ecosystem in 2022 to operate independently. Gnosis completed an ICO financing of 250,000 ETH in 2017, and currently has 150,000 ETH in its treasury, which belongs to the ETH whale.

However, some people believe that the main responsibility for this incident lies with Bybit itself. On the one hand, it is necessary to invest in research and development to develop a series of security infrastructures in order to manage cold wallets with more than one billion assets. On the other hand, Bybit seems to use the free Safe service and does not pay a subscription fee, so Safe has no obligation to bear responsibility from this perspective.

After publishing the investigation report, Bybit did not ask Safe for financial compensation.

While the industry is still arguing about who should be held responsible, the capital market is playing out an absurd drama. Safe's official token seems to have received special attention because of this incident. On February 27, the SAFE token rose against the trend from $0.44 to $0.69, with a maximum increase of about 58% in 10 hours. However, from an investment logic perspective, the incident has mainly had a negative impact on Safe's brand, and the rise may only be due to short-term market sentiment.

Data on February 27 showed that Safe's total managed assets exceeded US$100 billion, and its silence on the details of the vulnerability is shaking its credibility as industry infrastructure.

Bybit security investigation reveals the truth: SAFE front-end cloud service was attacked, how to ensure the safety of hundreds of billions of assets carried by multi-signature wallets

From the daily active user data, it can be clearly seen that Safe suffered a considerable impact after this incident. Compared with the 1,200 daily active addresses on February 12, the data dropped to 379 daily active addresses on February 27, a decrease of nearly 70%.

Bybit security investigation reveals the truth: SAFE front-end cloud service was attacked, how to ensure the safety of hundreds of billions of assets carried by multi-signature wallets In addition, after the centralization risk of the front-end was exposed, the community once again paid attention to the security mechanism of the front-end. Dominic Williams, founder of ICP, said that the North Korean hacker group recently successfully stole $1.5 billion in funds from Bybit, mainly by exploiting the web-side vulnerability of Safe{Wallet}, which is hosted on the cloud rather than on smart contracts. Williams criticized some Web3 projects for running only on a "fake onchain", which leads to security risks, and suggested using ICP (Internet Computer) for on-chain computing, data storage, and user experience verification to improve security. He proposed that Safe{Wallet} be migrated to ICP and adopt encrypted authentication mechanisms and multi-party consensus governance (such as SNS DAO) to enhance security.

Looking back at the entire incident, it seems to be an isolated incident carefully planned by North Korean hackers, but it still exposes the security loopholes in the permission design and supply chain of Safe's current multi-signature wallet. From the perspective of brand development, the practice of rushing to distance oneself from the issue in order to deliberately maintain the safety myth is counterproductive and has instead triggered more doubts from the public. Perhaps, Safe's timely admission of mistakes and the introduction of corresponding measures can better reflect the attitude of a giant in the field of cryptographic security. At the same time, publishing the details of the vulnerability as soon as possible can also further help the industry strengthen self-inspection and prevention of similar vulnerabilities.

Market Opportunity
Cloud Logo
Cloud Price(CLOUD)
$0.04624
$0.04624$0.04624
-4.22%
USD
Cloud (CLOUD) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

FCA komt in 2026 met aangepaste cryptoregels voor Britse markt

FCA komt in 2026 met aangepaste cryptoregels voor Britse markt

De Britse financiële waakhond, de FCA, komt in 2026 met nieuwe regels speciaal voor crypto bedrijven. Wat direct opvalt: de toezichthouder laat enkele klassieke financiële verplichtingen los om beter aan te sluiten op de snelle en grillige wereld van digitale activa. Tegelijkertijd wordt er extra nadruk gelegd op digitale beveiliging,... Het bericht FCA komt in 2026 met aangepaste cryptoregels voor Britse markt verscheen het eerst op Blockchain Stories.
Share
Coinstats2025/09/18 00:33
Cashing In On University Patents Means Giving Up On Our Innovation Future

Cashing In On University Patents Means Giving Up On Our Innovation Future

The post Cashing In On University Patents Means Giving Up On Our Innovation Future appeared on BitcoinEthereumNews.com. “It’s a raid on American innovation that would deliver pennies to the Treasury while kneecapping the very engine of our economic and medical progress,” writes Pipes. Getty Images Washington is addicted to taxing success. Now, Commerce Secretary Howard Lutnick is floating a plan to skim half the patent earnings from inventions developed at universities with federal funding. It’s being sold as a way to shore up programs like Social Security. In reality, it’s a raid on American innovation that would deliver pennies to the Treasury while kneecapping the very engine of our economic and medical progress. Yes, taxpayer dollars support early-stage research. But the real payoff comes later—in the jobs created, cures discovered, and industries launched when universities and private industry turn those discoveries into real products. By comparison, the sums at stake in patent licensing are trivial. Universities collectively earn only about $3.6 billion annually in patent income—less than the federal government spends on Social Security in a single day. Even confiscating half would barely register against a $6 trillion federal budget. And yet the damage from such a policy would be anything but trivial. The true return on taxpayer investment isn’t in licensing checks sent to Washington, but in the downstream economic activity that federally supported research unleashes. Thanks to the bipartisan Bayh-Dole Act of 1980, universities and private industry have powerful incentives to translate early-stage discoveries into real-world products. Before Bayh-Dole, the government hoarded patents from federally funded research, and fewer than 5% were ever licensed. Once universities could own and license their own inventions, innovation exploded. The result has been one of the best returns on investment in government history. Since 1996, university research has added nearly $2 trillion to U.S. industrial output, supported 6.5 million jobs, and launched more than 19,000 startups. Those companies pay…
Share
BitcoinEthereumNews2025/09/18 03:26
Trump foe devises plan to starve him of what he 'craves' most

Trump foe devises plan to starve him of what he 'craves' most

A longtime adversary of President Donald Trump has a plan for a key group to take away what Trump craves the most — attention. EX-CNN journalist Jim Acosta, who
Share
Rawstory2026/02/04 01:19