Radiant Capital’s $50 Million Breach Reveals New Crypto Vulnerabilities

Multi-signature security compromised via hardware wallet malware

  • Radiant Capital lost approximately $50 million due to a security breach.
  • Sophisticated malware compromised three developers’ hardware wallets.
  • Attackers used legitimate-looking transactions to mask malicious activity.
  • Industry-standard procedures failed to detect the multi-signature exploit.
  • U.S. law enforcement and ZeroShadow are working to recover stolen assets.

On October 16, 2024, Radiant Capital faced a catastrophic security breach, losing nearly $50 million USD.

- Advertisement -

This incident rocked the crypto world, as attackers infiltrated the defenses of a decentralized autonomous organization (DAO) known for its robust security measures.

The breach, which compromised three developers using hardware wallets, raises critical questions about the vulnerabilities in multi-signature setups, a previously trusted line of defense.

A Methodical Attack

According to Radiant Capital, the attackers targeted trusted contributors within the Radiant DAO, strategically planting sophisticated malware on their devices.

These developers, who were geographically dispersed, followed industry-standard operating procedures.

They used Safe{Wallet} (formerly known as Gnosis Safe) and Tenderly for transaction simulations and verifications.

However, the attack’s sophistication lay in the malware’s ability to present legitimate-looking transactions, only to execute malicious ones in the background, bypassing all manual checks.

- Advertisement -

The Illusion of Security

During a routine multi-signature emissions adjustment, the attackers exploited the normalcy of transaction failures to extract multiple compromised signatures.

This method allowed them to execute a transferOwnership action, draining funds from Radiant’s core markets on Arbitrum and Binance Smart Chain (BSC).

The breach went undetected during manual reviews and simulations, as confirmed by external security teams, SEAL911 and Hypernative.

- Advertisement -

Identifying Vulnerabilities

The breach exposed serious gaps in current DeFi security practices.

Despite multiple layers of verification, including checks on Tenderly and display of blind-signing signatures on Ledger hardware wallets, the attackers masked their malicious intent.

This attack underscores the need for immediate improvements in security protocols. Recommended strategies include developing a multi-layer signature verification system and using an independent device for transaction verification to ensure transparency and prevent similar breaches.

A Community in Crisis

The Radiant DAO is working around the clock with U.S. law enforcement and ZeroShadow to recover the stolen assets.

All users have been urged to revoke approvals on all chains. Radiant’s contributors have implemented preventative measures such as creating new cold wallet addresses and reducing the number of required signers in multi-signature setups to enhance security.

They are also using input data decoders on Etherscan to verify transaction data before signing.

A Call for Change

This breach highlights the ever-evolving challenges facing the DeFi community. As Radiant Capital rebuilds, it plans to deploy new Safes for RIZ markets and introduce timelock contracts for added protection, although these measures are not foolproof.

By distributing responsibilities across multiple roles, the DAO aims to prevent any single point of failure.

Radiant Capital’s breach reflects a crucial turning point in the crypto industry. It serves as a stark reminder that even the most trusted systems can fall prey to determined adversaries.

As the community grapples with the implications, it is clear that innovation in security measures is not just necessary but urgent.

The incident should galvanize all stakeholders in the crypto sphere to re-evaluate their defenses, ensuring that vulnerabilities are addressed before they are exploited.

Previous Articles:

- Advertisement -

Latest News

ClickFix Attacks Surge 517% in 2025, Fake CAPTCHAs Spread Malware

ClickFix attacks using fake CAPTCHA verifications have risen by 517% in early 2025, according...

FHFA Orders Fannie, Freddie to Consider Crypto as Mortgage Collateral

The U.S. Federal Housing Finance Agency ordered Fannie Mae and Freddie Mac to consider...

Retail Investors Can Now Buy Tokenized Shares of SpaceX via Blockchain

Retail investors can now buy blockchain-based fractional shares in SpaceX through Republic. These digital tokens...

EU Commission Eases Stablecoin Stance, Calms Bank Run Concerns

The European Commission downplayed the risk of bank runs linked to stablecoins after concerns...

Iranian Hackers Launch AI-Driven Phishing Attacks on Israelis

An Iranian state-backed Hacking group targeted Israeli journalists, Cybersecurity professionals, and academics in a...

Must Read

What Is a Sim Swap Hack?

You've likely heard the term 'sim-swap,' but do you really know what it means? It's a type of fraud that's rapidly increasing, where scammers...