
{"id":168029,"date":"2026-05-20T07:15:11","date_gmt":"2026-05-20T07:15:11","guid":{"rendered":"https:\/\/mycryptomania.com\/?p=168029"},"modified":"2026-05-20T07:15:11","modified_gmt":"2026-05-20T07:15:11","slug":"valid-signatures-are-not-enough","status":"publish","type":"post","link":"https:\/\/mycryptomania.com\/?p=168029","title":{"rendered":"Valid Signatures Are Not Enough"},"content":{"rendered":"<p>April was one of the worst months crypto has seen for security losses. <a href=\"https:\/\/x.com\/PeckShieldAlert\/status\/2050181065546023268\">PeckShield<\/a> reported <strong>40 major hacks totaling about $647M in losses, <\/strong>the largest being Drift Protocol and\u00a0KelpDAO.<\/p>\n<p>If we had to sum up what happened in one sentence: <strong>Valid signatures are not enough<\/strong>. A transaction can be signed by the right key, routed through the right contract, or approved by the right governance module, and still be the wrong transaction. That is the gap attackers exploited across governance compromise, cross-chain verification failures, oracle or routing manipulation, and privileged-key theft.<\/p>\n<h3>Governance compromise: Drift\u00a0Protocol<\/h3>\n<p>On <strong>April 1, 2026<\/strong>, Drift Protocol, a Solana-based DeFi derivatives platform, suffered one of the largest crypto attacks of the year. <a href=\"https:\/\/www.chainalysis.com\/blog\/lessons-from-the-drift-hack\">Chainalysis<\/a> reported that the attacker gained admin control and drained an estimated <strong>$285M<\/strong> from vaults, wiping out more than half of the protocol\u2019s TVL.<\/p>\n<p>Several analyses describe it as a <strong>control-plane compromise<\/strong>: attackers obtained the ability to execute privileged, governance-level transactions that looked valid on-chain. <a href=\"https:\/\/www.cm-alliance.com\/cybersecurity-blog\/drift-protocol-hack-explained-285m-governance-attack\">CM Alliance<\/a> describes the attack as a governance failure involving Security Council-level permissions and pre-approved transactions, rather than a direct smart-contract vulnerability.<\/p>\n<p><a href=\"https:\/\/www.halborn.com\/blog\/post\/explained-the-drift-hack-april-2026\">Halborn<\/a>\u2019s report says that <a href=\"https:\/\/techcrunch.com\/2026\/04\/01\/de-fi-platform-drift-suspends-deposits-and-withdrawals-after-millions-in-crypto-stolen-in-hack\">Drift<\/a> lost about <strong>$285M within 12 minutes<\/strong>, making the speed of execution part of the attack\u2019s impact: once the attacker had the right authority, onchain monitoring had little time to stop the\u00a0drain.<\/p>\n<h4><strong>Takeaway<\/strong><\/h4>\n<p>Governance authorization is not enough. Protocols need execution authorization: a signer may be valid, but the requested transaction still needs to be checked against an onchain policy that says whether this specific action is allowed. Governance and multisig systems need transaction-policy controls, signer isolation, timelocks for high-risk actions, pre-execution simulation, and independent monitoring of emergency powers.<\/p>\n<h3>Cross-chain verification failure:\u00a0KelpDAO<\/h3>\n<p>On <strong>April 18, 2026<\/strong>, KelpDAO was hit by a major cross-chain exploit. <a href=\"https:\/\/www.chainalysis.com\/blog\/kelpdao-bridge-exploit-april-2026\">Chainalysis<\/a> reported that attackers linked to North Korea\u2019s Lazarus Group stole about <strong>$292M<\/strong>, or <strong>116,500 rsETH<\/strong>, from KelpDAO\u2019s LayerZero bridge setup. <a href=\"https:\/\/x.com\/KelpDAO\/status\/2045595819035046148\">KelpDAO<\/a> posted that it had identified suspicious cross-chain rsETH activity, paused rsETH contracts across mainnet and several L2s, and was working with LayerZero, Unichain, auditors, and security\u00a0experts.<\/p>\n<p>The attack was <a href=\"https:\/\/www.chainalysis.com\/blog\/kelpdao-bridge-exploit-april-2026\">due to a compromise <\/a>of off-chain infrastructure and a single-point verification setup: attackers allegedly compromised internal RPC nodes, DDoS\u2019d external nodes, and fed false data to a <strong>1-of-1 DVN<\/strong> configuration so that a fake source-chain event appeared valid to the destination contract. <a href=\"https:\/\/www.halborn.com\/blog\/post\/explained-the-kelp-dao-hack-april-2026\">Halborn<\/a> similarly attributed the root cause to KelpDAO\u2019s <strong>1-of-1 verifier configuration<\/strong>, where only a single node needed to validate cross-chain messages before funds could be released.<\/p>\n<h4><strong>Takeaway<\/strong><\/h4>\n<p>Cross-chain systems need multiple independent verifiers, source-chain and destination-chain invariant checks, watcher diversity, DDoS-resilient RPC infrastructure, and circuit breakers when bridged supply changes abruptly.<\/p>\n<h3>Cross-chain proof-verification bug: Hyperbridge<\/h3>\n<p>Hyperbridge\u2019s April incident was smaller in dollar terms, but the attack was technically important. On April 13, 2026, <a href=\"https:\/\/rekt.news\/hyperbridge-rekt\">Rekt<\/a> reported that a missing bounds check in Hyperbridge\u2019s Merkle Mountain Range proof verifier <strong>allowed forged proofs to pass<\/strong>. <a href=\"https:\/\/www.coindesk.com\/tech\/2026\/04\/13\/attacker-mints-usd1-billion-polkadot-tokens-on-ethereum-ends-up-stealing-just-usd250-000\">Coindesk<\/a> reported the incident as an attacker minting a huge quantity of bridged DOT on Ethereum, though only a much smaller amount was successfully extracted before containment. The loss was later revised from an initial lower figure to about\u00a0<strong>$2.5M<\/strong>.<\/p>\n<p>A <a href=\"https:\/\/forum.polkadot.network\/t\/updated-pre-proposal-discussion-dot-recovery-loan-to-hyperbridge-exploit-victims\/17552\">Polkadot forum<\/a> described the exploit as a forged MMR proof issue in Hyperbridge\u2019s Token Gateway, with challengePeriod set to zero, and confirmed realized losses across Ethereum, Arbitrum, Base, and BNB\u00a0Chain.<\/p>\n<h4><strong>Takeaway<\/strong><\/h4>\n<p>Proof verifiers are consensus-adjacent infrastructure. They need adversarial audits, formal verification where possible, non-zero challenge windows, rate limits, and emergency pauses tied to abnormal mint events. Proof systems need defense in depth. A proof may pass, but the action it authorizes should still be bounded by onchain\u00a0policy.<\/p>\n<h3>Oracle, route, and slippage manipulation: Rhea\u00a0Finance<\/h3>\n<p>Rhea Finance, a NEAR-based DeFi hub, was exploited in mid-April. <a href=\"https:\/\/www.halborn.com\/blog\/post\/explained-the-rhea-finance-hack-april-2026\">Halborn<\/a> reported a <strong>$7.6M<\/strong> loss via oracle manipulation. Rhea <a href=\"https:\/\/x.com\/rhea_finance\/status\/2045203607856042118\">posted<\/a> that about <strong>$18.4M<\/strong> were drained in an attack that exploited a weakness in a slippage protection mechanism, but the attacker later returned about <strong>3.359M USDC<\/strong> and <strong>1.564M NEAR<\/strong> to the lending contract, while <strong>4.34M USDT<\/strong> was\u00a0frozen.<\/p>\n<p>The general attack pattern was price-path manipulation. Attackers created fake token contracts and liquidity pools, then used the protocol\u2019s routing or margin logic to misprice assets and drain assets from the protocol\u2019s reserve\u00a0pool.<\/p>\n<h4><strong>Takeaway<\/strong><\/h4>\n<p>Protocols should not trust arbitrary routes, pools, or tokens. Onchain systems need strict token allowlists, route validation, TWAP or multi-source pricing, slippage bounds that cannot be bypassed through synthetic pools, and invariant checks before debt or collateral state\u00a0changes.<\/p>\n<p>The transaction may be syntactically valid, but if it touches uncataloged contracts or produces impossible pricing behavior, it should not\u00a0execute.<\/p>\n<h3>Privileged key compromise: Volo\u00a0Protocol<\/h3>\n<p>Volo Protocol, on Sui, <a href=\"https:\/\/x.com\/volo_sui\/status\/2046715584201511351?s=20\">reported<\/a> a vault-related exploit on <strong>April 21, 2026<\/strong>. About <strong>$3.5M<\/strong> was drained from three vaults holding WBTC, XAUm, and USDC. <a href=\"https:\/\/x.com\/GoPlusSecurity\/status\/2046929307948425711?s=20\">GoPlus Security<\/a> and <a href=\"https:\/\/x.com\/exvulsec\/status\/2046865082374873588?s=20\">ExVul Security<\/a> attributed the incident to a compromised privileged operator key rather than a flaw in audited smart contracts. The team froze vaults, blocked an attempted bridge of <strong>19.6 WBTC<\/strong>, and said other vaults representing about <strong>$28M TVL <\/strong>were not affected by the same attack\u00a0path.<\/p>\n<h4><strong>Takeaway<\/strong><\/h4>\n<p>Private-key compromise should not equal protocol compromise. Keys should authorize roles, while onchain policy authorize actions. Use withdrawal rate limits, per-vault permissions, and mandatory delay for high-risk admin\u00a0actions.<\/p>\n<h3>Infrastructure compromise: Wasabi\u00a0Protocol<\/h3>\n<p>Wasabi Protocol was exploited on <strong>April 30, 2026<\/strong>, with losses reported between about <strong>$4.5M and $5.7M<\/strong> across Ethereum, Base, Berachain, and Blast. <a href=\"https:\/\/www.coindesk.com\/tech\/2026\/04\/30\/wasabi-protocol-drained-for-usd4-5-million-in-apparent-admin-key-compromise\">Coindesk<\/a> described the incident as an apparent admin-key compromise involving a compromised deployer key with no timelock.<\/p>\n<p>Wasabi\u2019s security update attributed the compromise to a <strong>Spring Boot Actuator configuration vulnerability<\/strong> in AWS infrastructure that exposed or enabled theft of private keys controlling EVM smart contracts; the reported impact was about <strong>$4.8M in user funds<\/strong> plus <strong>$900K from the protocol treasury<\/strong>.<\/p>\n<p>PeckShield flagged the attack as a multi-chain exploit, and <a href=\"https:\/\/thedefiant.io\/news\/hacks\/wasabi-protocol-hack\">CertiK<\/a> estimated losses at around\u00a0<strong>$5.5M<\/strong>.<\/p>\n<h4><strong>Takeaway<\/strong><\/h4>\n<p>Cloud misconfiguration is crypto risk. Smart-contract security programs need cloud attack-surface management, secrets scanning, locked-down actuator\/debug endpoints, HSM or MPC signing, timelocks, and separation between deployer, admin, and treasury\u00a0keys.<\/p>\n<p>Wasabi illustrates why infrastructure security and onchain execution controls need to work together. Cloud hardening protects the key; policy enforcement protects the protocol when the key\u00a0fails.<\/p>\n<p>April\u2019s largest crypto attacks shared a theme: attackers increasingly targeted <strong>control points<\/strong>, not just code. Drift showed that governance and emergency powers can be weaponized. KelpDAO and Hyperbridge showed that cross-chain verification remains fragile. Wasabi and Volo showed that one compromised key can bypass an otherwise audited contract. Rhea showed that complex routing and margin logic still creates exploitable pricing assumptions.<\/p>\n<p>For builders, the practical lesson is clear: code audits are necessary, but not enough. Protocols need operational security, signer security, cross-chain monitoring, incident drills, and on-chain controls that assume humans, keys, RPC nodes, and cloud infrastructure can\u00a0fail.<\/p>\n<p><em>Disclaimer: OKcontract Labs is working on a solution that simplifies considerably how teams enforce\u00a0opsec.<\/em><\/p>\n<p><a href=\"https:\/\/medium.com\/coinmonks\/valid-signatures-are-not-enough-ad9b7c48257b\">Valid Signatures Are Not Enough<\/a> was originally published in <a href=\"https:\/\/medium.com\/coinmonks\">Coinmonks<\/a> on Medium, where people are continuing the conversation by highlighting and responding to this story.<\/p>","protected":false},"excerpt":{"rendered":"<p>April was one of the worst months crypto has seen for security losses. PeckShield reported 40 major hacks totaling about $647M in losses, the largest being Drift Protocol and\u00a0KelpDAO. If we had to sum up what happened in one sentence: Valid signatures are not enough. A transaction can be signed by the right key, routed [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":168030,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-168029","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-interesting"],"_links":{"self":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/posts\/168029"}],"collection":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=168029"}],"version-history":[{"count":0,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/posts\/168029\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=\/wp\/v2\/media\/168030"}],"wp:attachment":[{"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=168029"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=168029"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mycryptomania.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=168029"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}