In a recent incident, $1.35 million was stolen from a Thorchain cofounder through a hack of a software wallet. This case emphasizes the need to reassess approaches to digital asset security.
Vulnerabilities of Software Wallets
Major cryptocurrencies are stored in software wallets that are easy to use but exposed to malware risks. In this case, the theft occurred without a signed transaction; malware extracted the private keys, giving the attackers full access to the assets.
Benefits of Hardware Wallets
Hardware wallets keep private keys offline, making them less vulnerable to attacks. Unlike software wallets, device compromise does not lead to fund leakage without physical access to the hardware wallet.
New Solutions for Cryptocurrency Security
In response to the recent incident, the Thorchain cofounder proposed using Vultisig, a next-generation crypto wallet that combines multi-factor authentication and multi-chain support, eliminating the need for traditional seed phrases.
The incident involving the theft from Thorchain highlights the growing vulnerabilities of software wallets. New solutions like Vultisig may represent a step toward improving cryptocurrency storage security.