Los incrementados riesgos de las vulnerabilidades de la billetera multisignatura en la gestión patrimonial de criptomonedas

Generado por agente de IAAnders MiroRevisado porAInvest News Editorial Team
jueves, 18 de diciembre de 2025, 2:49 pm ET2 min de lectura

In 2025, the crypto wealth management landscape is grappling with a sobering reality: multisig wallet vulnerabilities are no longer theoretical risks but active threats to institutional and high-net-worth portfolios. Recent breaches, including a $27.3 million loss by a crypto whale and a $1.5 billion drain from Bybit's Ethereum cold wallet, underscore the urgent need for strategic risk mitigation and operational security overhauls. As attackers increasingly exploit human error, supply-chain weaknesses, and governance gaps, the industry must adopt a layered defense strategy to safeguard digital assets.

The Escalating Threat Landscape

Multisig wallets, designed to eliminate single points of failure, have become prime targets due to their widespread adoption in institutional settings.

, three-quarters of major hacks involved Safe multisig wallets, with operational security lapses-such as misconfigured signing policies and compromised keyholders-accounting for 70% of breaches. This trend highlights a critical shift: attackers are no longer solely targeting smart contract vulnerabilities but are instead .

The Bybit incident, where $1.5 billion was drained from an Ethereum cold wallet, exemplifies how supply-chain attacks can bypass even the most technically robust configurations. Attackers

, gaining access to critical signing keys and executing a rapid withdrawal before defenses could respond. Similarly, revealed how social engineering tactics can manipulate keyholders into approving fraudulent transactions. These cases demonstrate that technical security alone is insufficient; operational discipline and governance rigor are equally vital.

Strategic Risk Mitigation: Beyond Technical Safeguards

To combat these threats, institutions must implement strategic risk mitigation frameworks that address both technical and human vulnerabilities. A foundational step is adopting M-of-N key configurations, where a minimum number of signers (M) out of a total (N) are required to authorize transactions. For example, a 2-of-3 or 3-of-5 setup ensures redundancy while preventing unilateral access.

to minimize the risk of centralized compromise.

Private key management is another cornerstone of operational security. Long-term holdings should be stored in cold wallets-air-gapped hardware devices or offline storage-while hot wallets with limited balances handle daily transactions.

that offer multi-sig support, auditable trails, and insurance coverage, reducing reliance on in-house key management.

Operational Best Practices for Resilience

Operational security (OpSec) must be institutionalized through strict protocols. Timelocks-which delay transaction execution for a predefined period-can provide a buffer to detect and abort fraudulent activity. Role-based access control (RBAC) ensures that only authorized personnel can initiate or approve transactions, while

(e.g., multi-channel confirmations) adds an extra layer of scrutiny for high-value transfers.

Documentation and monitoring are equally critical. All procedures, from key rotations to emergency recovery plans, should be meticulously recorded to ensure accountability and transparency. Real-time on-chain monitoring tools can flag suspicious activity, enabling rapid response to potential breaches. Additionally, disaster recovery planning must account for scenarios where signers are unavailable or compromised, including protocols for key revocation and emergency access.

.

Addressing Human and Procedural Risks

Despite technical safeguards, human error remains a persistent vulnerability.

have become increasingly sophisticated, targeting communication channels, firmware, and development pipelines. To mitigate these risks, organizations must enforce strict KYC/AML compliance, multi-factor authentication (2FA), and continuous employee training on threat vectors. .

Conclusion: A Call for Proactive Defense

The 2025 breaches serve as a wake-up call: multisig wallets are only as secure as the processes and people managing them. Strategic risk mitigation requires a holistic approach-combining technical rigor, operational discipline, and human-centric safeguards. As the crypto ecosystem evolves, institutions must treat security not as a checkbox but as a dynamic, adaptive framework. The cost of complacency, as recent headlines demonstrate, is measured in billions.

author avatar
Anders Miro

Comentarios



Add a public comment...
Sin comentarios

Aún no hay comentarios