Bybit, a leading cryptocurrency exchange, recently lost approximately $1.5 billion in Ethereum (ETH) due to a hack. The incident was caused by a breach in its multi-signature (multi-sig) cold wallet.
This was one of the largest digital heists to date and has raised concerns about the security of digital wallets, particularly cold wallets.
While cold wallets are often considered the most secure method to store crypto, this incident reveals they are not foolproof.
Let’s break down how cold wallets can be hacked or compromised. We will also highlight some common misconceptions about cold wallet security and how you can better protect your digital assets stored in a cold wallet.
Cold wallets, often deemed the gold standard for crypto security, store private keys offline to protect against online threats. However, the Bybit hack underscores that cold wallets are not impervious to attacks.
According to the article by businessinsider.com, the hack on Bybit occurred as the company attempted a routine transfer from their cold wallet to a warm wallet. In a post on X, the CEO of Bybit, Ben Zhou stated that the transaction was manipulated through a sophisticated attack that masked the signing interface, displaying the correct address while altering the underlying smart contract logic.
This breach highlights that even offline storage solutions can be compromised through sophisticated methods. It also reminds us of the hacking vulnerabilities of smart contracts.
Some beginner crypto investors may mistakenly believe that storing assets in a cold wallet guarantees absolute security.
While cold wallets offer enhanced security by storing private keys offline, it is not hack-proof. The offline nature only reduces exposure to online threats but it doesn’t completely eliminate other risks such as:

How Your Cold Wallet Can Be Compromised
There are a myriad of methods that hackers can employ to exploit vulnerabilities in smart contracts. The details will be too technical for the layman to understand but here are just some known methods:
Just like any other online digital system, there is no smart contract that is totally hack-proof. Protecting any online digital system against hackers is an on-going battle and this is why cybersecurity professionals are some of the most highly paid IT professionals in the world.
For the common user, it will thus be wise to only use smart contracts and platforms that follow strict security standards.
Do not assume that MFA is only important for online systems. To better protect your cold wallets, consider using hardware security keys and best to avoid SMS based MFA that is known to have security flaws.
Even if you are just an individual investor, you should regularly check your cold wallet setup, including the hardware and software components.
Bear in mind that your cold wallet is not totally protected from malware. Therefore, make sure you use your cold wallet on secure computer devices and only download firmware from official sources.
If your company owns multiple cold wallets, consider hiring third-party cybersecurity experts to conduct thorough and objective audits.
Never assume that the location where you store your cold wallets will be totally safe from theft or natural disasters. Hence, you should store your cold wallet devices in fire and tamper proof safes that are located in a secure facility.
If you own multiple cold wallets, consider keeping them in different geographic locations. You never know when the funds may come in handy during an emergency.
Last but not least, make sure only authorized personnel can access your cold wallets.
Multi-sig wallets require multiple private keys to approve transactions, but they need careful setup.
You should at least ensure the private keys are stored in separate physical locations and use independent custodians to manage different keys.
Hardware cold wallets can be tampered with even before you open the box.
Therefore, you should always purchase directly from trusted manufacturers and resellers. Do not be tempted to buy from online marketplaces even if the seller’s profile looks honest.
The first thing to do when you receive the package is check for physical tampering. There should be a high grade tamper-proof seal on the package.
In many cases, human error has been the cause of breaches. So, always double check what you are doing before signing off on the transaction.
When moving funds with cold wallets, you should create step-by-step protocols for all wallet operations.
For example, when signing transactions, make sure you are using an air-gapped computer. Air-gapped computers are physically isolated from the Internet or other less secure networks to reduce the risk of data leakage and protect sensitive information.
Implement a transaction delay mechanism that will allow time to detect unauthorized attempts.
Phishing and social engineering tactics are widespread in cyberspace and they are commonly used by hackers to attempt to steal personal details in order to breach into secured systems. Training yourself or your employees on how to recognize threats will be your first line of defense.
When you are dealing with any assets that are of high value, you should apply the principle of least privilege. That means only grant access to those who truly need it. Especially when a large sum of money is involved, even the supposedly most honest person you know can be tempted to betray you.
In a company setting, you should enforce strict offboarding protocols to revoke access from departing employees immediately.
Despite all the precautionary measures, you should still prepare for your cold wallets to go missing, stolen or damaged.
Remember that your crypto funds are actually stored on the blockchain and not on the hardware. As long as you still have your private keys, you can still access your funds.
Therefore, you should maintain encrypted backups of private keys and store them in a secured location. Recovery phrases must never be stored on online cloud services or connected to the Internet.
You should also make it a habit to regularly test recovery procedures to ensure you can quickly regain access to funds.
The Bybit hack serves as a stark reminder that cold wallets are not invincible. Blockchain technology is inherently secure, but human error, operational oversights, and smart contract vulnerabilities can still lead to catastrophic losses.
In conclusion, to better protect your crypto funds: