North Korean Hacker Group's Attack on Top Coin Circle Infrastructure Safe: How Important Is Security in Crypto? In this translation, I aimed to maintain the original meaning while ensuring the terminology related to finance and blockchain was accurately
The next hacker-themed movie may be inspired by the recent $1.5 billion Bybit and Safe hack. The hacker's technique was near-perfect, and so far, no traces have been found.
After a week of multi-party investigations, updates have been provided by Safe's team, Bybit's team, and the security company. Blockbeats has summarized the investigation results in the most concise language, revealing the first-hand situation:
1. Code is fine: Safe's front-end code is open source, with no issues at the code level. It was Safe's server security that was compromised.
2. Inside job: Specifically, the code deployed in the production environment was not consistent with what was shown in the open-source repository. This means that at some point, someone replaced or inserted malicious code during the deployment process.
3. Unknown insider: Not all developers have the permission to deploy production code. The individual capable of conducting such a deep operation must have a high level of trust. This insider could be a long-trusted developer or a team member with sufficient permissions. The attacker concealed their tracks for a considerable period. Safe has examined the transaction history, found no anomalies, and has not identified the insider. The community and users are requested to assist in the investigation.
In addition, Safe has not mentioned any plans for compensation but has discussed some follow-up upgrade plans. They also remind everyone to stay rational and to not trust those who are marketing so-called "advanced multisig," "semi-custodial," "MPC," and similar products leveraging this hack event, as these products may instead expand the attack surface.
Indeed, this is not the first theft involving Safe's multisig. The technique used this time is very similar to the October incident involving Radiant Capital. During the Radiant Capital hack, the hacker infected the core developer's device and implanted malicious software, causing the developer to mistakenly believe they were signing a legitimate transaction when, in reality, a malicious transaction was being executed in the background.
Safe's Impact on the Crypto Space
Why is this event so attention-grabbing? The reason is that Safe is the most popular multisig wallet in the Ethereum ecosystem.
When Safe was launched last year, the top 100 airdrop addresses were mainly project teams, institutions, and large holders. This means that Safe's security can impact a significant part of the crypto space.
As shown in the image, well-known names include Metamask, PleasrDao, AAVE, 1inch, Lido, and more.

During this cycle, traditional finance, traditional institutions, family funds, and old money have accelerated their entry. However, due to the high entry barrier of crypto, many people have chosen a relatively safer way to protect their funds while engaging in on-chain activities, which is through a multi-signature wallet like Safe.
For example, the most representative is former President Trump's DeFi team.

According to Safe's guardians speaking to Doozer BlockBeats, the simplest way to determine if an on-chain address is a Safe wallet address is through two methods: first is the "MultiSig" displayed on ARKHAM, and second is the "MultiSig: Safe" directly displayed below the address on the debank page. As seen in the image above, former President Trump's DeFi project World Liberity Fi indeed uses a multi-signature wallet.
This means that any security vulnerability within Safe could potentially trigger a huge chain reaction and butterfly effect.
Even Top Coin Security Infrastructure Can Encounter Issues
The Safe project is basically a blue-chip project in the Ethereum ecosystem, with its incubation team being Gnosis.
Gnosis Chain, which was a well-known Ethereum sidechain in the previous cycle, focuses on efficient and secure decentralized application development. According to DefiLlama data, as of the time of writing this article, Gnosis Chain's total value locked (TVL) is $200 million, with a peak of $350 million.

In fact, the story of the Gnosis ecosystem and incubator can be traced back to 2015.
Compared to the now well-known Polymarket, Gnosis co-founder Martin Koeppelmann began researching decentralized prediction markets much earlier. In 2015, he posted his thoughts on the combination of MarketMaker and OrderBook on his forum, which was one of the earliest concepts of a decentralized prediction market in the industry.
Martin Koeppelmann is also one of the earliest Ethereum developers, having joined before TheDAO era and being based in Berlin, he had close interactions with Vitalik, who had an office in Berlin at the time.

Over the years, he has been actively involved in many discussions in the Ethereum development community, often engaging with Vitalik on topics such as L2, ZK, and the Ethereum roadmap. Martin's integration into the community can also be seen from his social media presence.
Based on this technical expertise, Gnosis has gradually developed a complete ecosystem. Evolving from Gnosis Protocol to CowSwap, Martin and his team have further expanded to create products such as Gnosis Chain, Safe, and Gnosis Pay.
Has the Bear Market Signal Been Triggered?
The extensive impact of this Safe security incident has indeed caused a significant amount of panic and pessimism in the crypto community. According to Alternative.me data, today's cryptocurrency fear and greed index has dropped to 10, hitting a new low since July 2022, with the market remaining in extreme fear.
Many community members are now questioning whether multi-signature is merely a "fig leaf" decoration.?
Simultaneously, many industry practitioners are expressing reflection and concerns about the industry: "If multi-signature wallets are not secure, then who will take this industry seriously and trust it? Has the crypto industry turned into a hacker haven?"
A historical perspective shows that the end of each crypto bull market is often accompanied by major security and trust crises.
For example, the early Mt.Gox event led to a large amount of crypto assets being stolen, becoming one of the most famous hacking incidents in crypto industry history; the end of the last bull market started with a trust crisis stemming from FTX's run on the bank and Terra's collapse, severely affecting investor confidence in the entire industry.
So, what will mark the end of this bull market? Pessimistically, the Safe security incident is very likely to be one of the "signals" marking the end of this bull run.
You may also like

a16z: The Real Opportunity of Stablecoins Lies Not in Disruption but in Filling Gaps

Mining Exodus: Someone Holds $12.8 Billion AI Order

March 6 Market Key Intelligence, How Much Did You Miss?

a16z: The True Opportunity of Stablecoins is in Complementing, Not Disrupting
Predict LALIGA Matches, Shoot Daily & Win BTC, USDT and WXT on WEEX
The WEEX × LALIGA campaign brought together football excitement and crypto participation through a dynamic interactive experience. During the event, users predicted matches, completed trading tasks, and took daily shots to compete for rewards including BTC, USDT, WXT, and exclusive prizes.

Ray Dalio Dialogue: Why I'm Betting on Gold and Not Bitcoin

Who Took the Money in the AI Era? A Must-See Investment Checklist for HALO Asset Trading

Wall Street Bears Target Ethereum: Vitalik In the Know Takes Flight, Tom Lee Remains Bullish

Pump.fun Hacker Steals $2 Million, Receives 6-Year Prison Sentence, Opts for 'Self-Detonation'

6% Annual Percentage Yield as Musk Declares War on Traditional Banks

36 years, 4 wars, 1 script: How does capital price the world in conflict?

Mining Companies' Great Migration: Some Have Already Secured $12.8 Billion in AI Orders

What Is Vibe Coding? How AI Is Changing Web3 & Crypto Development
What is vibe coding? Learn how AI coding tools are lowering the barrier to Web3 development and enabling anyone to build crypto applications.

The parent company of the New York Stock Exchange strategically invests in OKX: The intentions behind the $25 billion valuation

WEEX P2P update: Country/region restrictions for ad posting
To improve ad security and matching accuracy, WEEX P2P now allows advertisers to restrict who can trade with their ads based on country or region. Advertisers can select preferred counterparty locations for a safer, smoother trading experience.
I. Overview
When publishing P2P ads, advertisers can now set the following:
Allow only counterparties from selected countries or regions to trade with your ads.
With this feature, you can:
Target specific user groups more precisely.Reduce cross-region trading risks.Improve order matching quality.
II. Applicable scenarios
The following are some common scenarios:
Restrict payment methods: Limit orders to users in your country using supported local banks or wallets.Risk control: Avoid trading with users from high-risk regions.Operational strategy: Tailor ads to specific markets.
III. How to get started
On the ad posting page, find "Trading requirements":
Select "Trade with users from selected countries or regions only".Then select the countries or regions to add to the allowlist.Use the search box to quickly find a country or region.Once your settings are complete, submit the ad to apply the restrictions.
When an advertiser enables the "Country/Region Restriction" feature, users who do not meet the criteria will be blocked when placing an order and will see the following prompt:
If you encounter this issue when placing an order as a regular user, try the following solutions.
Choose another ad: Select ads that do not restrict your country/region, or ads that allow users from your location.Show local ads only: Prioritize ads available in the same country as your identity verification.
IV. Benefits
Compared with ads without country/region restrictions, this feature provides the following improvements.
Aspect
Improvement
Trading security
Reduces abnormal orders and fraud risk
Conversion efficiency
Matches ads with more relevant users
Order completion rate
Reduces failures caused by incompatible payment methods
V. FAQ
Q1: Why are some users not able to place orders on my ad?
A1: Their country or region may not be included in your allowlist.
Q2: Can I select multiple countries or regions when setting the restriction?
A2: Yes, multiple selections are supported.
Q3: Can I edit my published ads?
A3: Yes. You can edit your ad in the "My Ads" list. Changes will take effect immediately after saving.

What are the key highlights of this year's Ethereum's most important upgrade, the Glamsterdam upgrade?

March 6 Key Market Update You Can't Miss! | Alpha Morning Report

Sell Nvidia, Buy Power Plant: 27-Year-Old AI Investor Earns $5 Billion in One Year
a16z: The Real Opportunity of Stablecoins Lies Not in Disruption but in Filling Gaps
Mining Exodus: Someone Holds $12.8 Billion AI Order
March 6 Market Key Intelligence, How Much Did You Miss?
a16z: The True Opportunity of Stablecoins is in Complementing, Not Disrupting
Predict LALIGA Matches, Shoot Daily & Win BTC, USDT and WXT on WEEX
The WEEX × LALIGA campaign brought together football excitement and crypto participation through a dynamic interactive experience. During the event, users predicted matches, completed trading tasks, and took daily shots to compete for rewards including BTC, USDT, WXT, and exclusive prizes.