Bybit Hack Exposes $1.5B via UI Vulnerability: Blind Signing and Infrastructure Flaws Under Scrutiny
May 9, 2026
The root flaw was blind signing of complex calldata on hardware wallets, where signers approved a malicious transaction because the UI failed to decode and display the contract payload.
This attack is an integration and infrastructure vulnerability, highlighting the gap between secure contracts and vulnerable frontend and uplink systems.
Defenses include: eliminate blind signing by using decoders or clear signing that reveals destination and amount; run in-flight transaction simulations to verify state changes before signing; and enforce strict frontend security with CSP, SRI, and consider decentralized hosting for admin interfaces.
A high-profile case is the Bybit hack on February 21, 2025, where about $1.5 billion (over 401,000 ETH) was drained from a cold wallet via a web UI supply-chain attack, not a smart contract flaw.
The broader takeaway is that on-chain security hinges on off-chain interfaces; treat the user interface as a critical threat vector and implement end-to-end transaction verification and supply-chain protections.
Traditional smart contract audits often miss these vulnerabilities because they focus on internal invariants and cryptographic validity, neglecting frontend trust assumptions, payload generation, and integration with signing devices.
Hackers compromised the Safe{Wallet} web interface by infiltrating developer infrastructure and injecting a malicious script into the React bundle, targeting Bybit’s session.
This case is contrasted with Panoptic audit work, which emphasizes the difference between logical contract bugs and frontend or transaction-flow flaws.
The malicious UI spoofed transaction details on signers’ screens, hijacking the payload to redirect funds while showing legitimate destinations and amounts to the user.
Summary based on 1 source
Get a daily email with more Tech stories
Source

DEV Community • May 9, 2026
How a Single JavaScript File Bypassed a $1.5B Multi-Sig: Anatomy of the Bybit Hack