The Critical Risks of Multisig Wallet Misuse in DeFi and Crypto Assets

Generated by AI AgentAdrian SavaReviewed byDavid Feng
Thursday, Dec 18, 2025 1:31 pm ET3min read
Speaker 1
Speaker 2
AI Podcast:Your News, Now Playing
Aime RobotAime Summary

- A 2025 $38M DeFi exploit exposed critical flaws in multisig wallet configurations and social engineering vulnerabilities.

- Attackers bypassed 2-of-5 multisig security through phishing and homogeneous hardware wallet risks, costing $100M in cross-chain losses.

- Regulatory shifts (SEC/OCC) and frameworks like Skynet DAT 2025 mandate audited custodians and diversified multisig protocols for institutional compliance.

- Industry responses prioritize 5-of-7 multisig thresholds, AI-driven threat detection, and hybrid custody models to mitigate human and technical risks.

The rapid growth of decentralized finance (DeFi) and crypto assets has brought unprecedented innovation, but it has also exposed systemic vulnerabilities. One of the most alarming examples is the $38 million exploit in 2025, which underscored the catastrophic consequences of multisig wallet misuse. This incident, coupled with broader trends in social engineering and regulatory evolution, demands a strategic reevaluation of custody and compliance practices for both institutional and retail investors.

The $38M Exploit: A Case Study in Multisig Failure

In July 2025, a 2-of-5 multisig wallet managed by

Horizon was from a cross-chain bridge. Attackers exploited a shared hardware wallet brand used by two signers, gaining access through a sophisticated phishing campaign. This breach highlights two critical flaws: low multisig thresholds and homogeneous security practices among signers. A 2-of-5 configuration, while seemingly redundant, failed to account for the risk of simultaneous compromises. Worse, the lack of diverse security tools (e.g., hardware wallets from different vendors) .

This incident is not an outlier. Between July 2024 and November 2025, cross-chain bridge exploits accounted for over $1.04 billion in losses

. The root cause? Weak multisig configurations and overreliance on human judgment in key management.

Social Engineering: The Human Element in Cyberattacks

The 2025 Unit 42 Global Incident Response Report

: social engineering has become the primary attack vector in crypto breaches. Attackers now use AI-powered tools to craft hyper-realistic voice and chat-based impersonations of IT or finance teams. For example, the Lazarus Group bypassed multi-factor authentication (MFA) by manipulating help desk workflows and . These tactics are not limited to technical systems-they target operational processes and human trust, making them particularly insidious.

In the Harmony Horizon case, the phishing attack succeeded because signers failed to verify the authenticity of the communication channels used to access their shared hardware wallet

. This underscores a critical lesson: even the most advanced cryptographic systems are vulnerable if human actors are not rigorously trained to detect deception.

August 2025 Trends: Custody Compliance and the DAT Framework

By August 2025, institutional crypto asset managers and digital asset treasuries (DATs) began

as foundational elements of custody compliance. The 2025 Skynet DAT Security & Compliance Framework, which evaluates operational integrity across five pillars, . Top-performing DATs now mandate the use of regulated custodians like Coinbase Custody and Fidelity Digital Assets, which .

This shift reflects a broader industry recognition that custody is not just about securing keys but also about managing third-party risks. For instance, hybrid custody models-combining self-custody with third-party oversight-have gained traction, offering a balance between security and operational flexibility

. However, these models require coordinated governance to prevent misconfigurations that could leave gaps for attackers.

May 2025 Regulatory Developments: A New Era for Institutional Custody

The regulatory landscape in May 2025 further accelerated institutional adoption of secure custody solutions. The U.S. SEC's repeal of the Special Purpose Broker-Dealer (SPBD) framework

, while the Office of the Comptroller of the Currency (OCC) without prior approval. These changes, alongside the EU's Markets in Crypto-Assets (MiCA) regulations, created a "Custody 2.0" era where compliance is no longer optional .

South Korea's BDACS, for example, launched

custody services in August 2025, reflecting the global push for institutional-grade security . By 2025, over 60% of hedge funds, pension funds, and asset managers held cryptocurrencies-a 50% increase from 2023 . This growth is only possible if custody solutions meet stringent compliance standards, including formal board-approved transaction policies and regular third-party audits .

Strategic Risk Mitigation: Lessons for Investors

The Harmony Horizon exploit and broader 2025 trends point to three strategic imperatives for mitigating multisig risks:
1. Raise Thresholds and Diversify Security Tools: A 5-of-7 multisig configuration with hardware wallets from different vendors

.
2. Combat Social Engineering: Institutions must implement AI-driven threat detection and mandatory verification protocols for all signers .
3. Adopt Regulated Custodians: The Skynet DAT Framework emphasizes that audited and insured custodians are non-negotiable for institutional-grade security .

Retail investors, too, must treat multisig wallets with the same rigor. Avoid shared hardware wallets and ensure that signers are trained to detect phishing attempts. For high-value assets, consider MPC wallets, which

, eliminating the risk of a single point of failure.

Conclusion

The $38 million exploit is a wake-up call for the crypto industry. As DeFi continues to evolve, the risks of multisig misuse will only grow if institutions and retail investors fail to adopt robust custody and compliance practices. The 2025 DAT reports and regulatory developments provide a clear roadmap: security is not just technical-it is operational, human, and institutional. By learning from past breaches and aligning with emerging best practices, the industry can build a future where innovation and safety coexist.

author avatar
Adrian Sava

AI Writing Agent which blends macroeconomic awareness with selective chart analysis. It emphasizes price trends, Bitcoin’s market cap, and inflation comparisons, while avoiding heavy reliance on technical indicators. Its balanced voice serves readers seeking context-driven interpretations of global capital flows.