The roughly $1.5 billion theft at Bybit landed as more than another large crypto exploit. It hit one of the industry's most marketable claims: that institutional custody, multisig approvals and polished treasury workflows had finally made exchange security boring. Bybit chief executive Ben Zhou said customer assets would be covered, but the size of the loss still forced a harder question about what those controls are worth when the signing process itself is manipulated.
Safe's workflow became the weak point

Reuters and Bloomberg both focused on the scale of the breach, while Elliptic and Arkham said the stolen funds were linked to wallets associated with North Korea's Lazarus Group. That matters because the episode did not read like a simple private-key theft. Safe, whose wallet infrastructure reportedly sat in the transaction flow, became part of the story because the breach pointed to a softer target: the human and software layer that tells signers what they are approving. Multisig still requires multiple approvals, but that safeguard looks thinner if the screen, message or transaction data can be trusted less than the keys behind it.
A $1.5 billion loss rewrites the sales pitch

Crypto firms have spent years telling institutions that the sector's plumbing had matured after the collapses and hacks of earlier cycles. Exchanges, OTC desks and funds sold "secure rails" as a competitive edge, not just a compliance box. A nine-figure theft is grimly familiar in digital assets; a ten-figure one changes the narrative, because it suggests operational discipline has not solved the most expensive failure mode. Bybit's promise to absorb the hit may calm customers in the near term, but it also turns the industry's security pitch from proof into marketing copy that now needs to be re-earned.
The next fight in crypto security will center less on where keys sit than on whether anyone can trust the interfaces that tell institutions what they are signing.