Digital Asset Custodians in Securing Crypto
Photo: Author's own, at the Buddhist temple in Genting Highlands, Malaysia, 2018
As a longtime Crypto and (Crypto security) enthusiast, I was really interested when I came across news that Indian crypto exchange WazirX has now partnered with BitGo Trust, a regulated digital asset custodian. This partnership aims to improve security of funds on WazirX's platform and rebuild user trust.
Here is some background, in July 2024, India's one of the largest crypto exchanges WazirX suffered a major cyberattack that led to nearly $235 million in digital assets being stolen (Explained: The WazirX Hack). This breach occurred despite WazirX implementing advanced safeguards (multi-signature wallets, address allowlisting, and hardware key storage), this highlights how even pretty cautious and secure exchanges remain vulnerable.
The incident was a wake-up call across the industry, highlighting that traditional exchange security alone is not enough. Crypto platforms and users face unique risks that demand stronger solutions. This is where digital asset custodians come in, think of these as specialised entities whose core mission is to securely hold and manage crypto assets on behalf of users or exchanges. By entrusting assets to a qualified custodian, exchanges and investors can address critical security vulnerabilities and prevent becoming the next WazirX-style headline.
The Challenge: Why is Custodianship Needed?
Cryptocurrency users and exchanges face threat vectors that go beyond typical IT security concerns. Traditional cybersecurity tools are important, but they are often insufficient for protecting on-chain assets .
Unlike in traditional finance – where a fraudulent bank transfer can be reversed – blockchain transactions are irreversible, and stolen crypto is nearly impossible to recover . Below are key security challenges and why digital asset custodians are needed:
- Private Key Loss or Damage: Crypto ownership is controlled by private keys; if a user loses their key (or seed phrase), the funds are permanently inaccessible. Self-custody brings “significant risks, such as losing private keys and passwords,” with no “forgot my password” recourse (How to Choose a Qualified Crypto Custodian). A custodian mitigates this by providing backup key management and recovery procedures so that a single mishap doesn’t mean permanent losses.
- Theft and Hacks: Hackers target exchanges and individual wallets to steal keys or exploit software. Phishing, malware, and smart contract exploits have led to billions in crypto theft. In fact, $3.8 billion worth of cryptocurrency was stolen in 2022 across exchanges – an increase from the prior year (8 Crypto Exchange Hacks to Know About). Once thieves obtain private keys or transfer funds illicitly, victims have little recourse.
- Exchange Hack: Crypto exchanges are juicy targets; breaches of “hot” wallets (online wallets for daily operations) can drain a platform’s reserves in minutes. The WazirX attack is one example, and numerous other exchange hacks have shaken user confidence. These incidents show that even strong network security can be bypassed if wallet management is flawed. Without an independent custodian, exchanges must hold keys internally, creating a large attack surface.
- Insider Fraud or Mismanagement: In the absence of proper custody controls, an insider with sufficient access (a rogue employee) could illegally transfer or misuse funds. Traditional IT security might catch unauthorised server access, but would not stop a trusted insider with keys from moving crypto. This insider threat is very real, so companies must strictly limit who can access and move funds. Custodians enforce separation of duties and multi-approval processes that make it far harder for any one insider to steal assets.
- Regulatory Non-Compliance: Holding digital assets also introduces regulatory responsibilities. Exchanges managing customer funds in-house must implement robust Anti-Money Laundering and KYC controls, reporting, and auditing. Failure to do so can result in fines or shutdowns. Global standards like the FATF Travel Rule require virtual asset service providers to collect and share customer information for large transfers – a complex task to implement. As governments impose stricter rules on crypto, firms must ensure compliance with KYC/AML controls to prevent legal issues and fines. Many smaller exchanges lack the infrastructure or licenses to meet these custodial regulations on their own.
Getting into the Weeds - Tech Deep Dive
Digital asset custodians address the above challenges through a multi-layered security architecture and specialized operational controls. Some of the key technologies and practices custodians use include:
Multi-Signature Wallets & MPC: Custodians typically require multiple private keys to authorise any movement of funds, rather than a single key. A multi-signature (“multisig”) wallet might be configured as M-of-N (e.g. 3 of 5 keys needed to sign), so that no single compromise is fatal. This provides “greater security, loss prevention, and oversight” by design (How to Choose a Qualified Crypto Custodian). An advanced variant is Multi-Party Computation (MPC), which splits the cryptographic key into shards held by different parties/devices. MPC can eliminate a single point of failure, reducing theft risk by ensuring an attacker cannot assemble a full key from any one breach. In practice, these approaches mean that even if one key is stolen or one system is breached, the assets remain safe.
By combining these technologies and controls, digital asset custodians create a defense-in-depth approach specifically tailored to crypto’s needs. In essence, they bridge the gap between the traditional security world and the crypto world – bringing cutting edge protections to digital assets that were previously secured only by end-users or start-up exchanges. Custodians not only drastically reduce the likelihood of breaches, but also limit the fallout should one occur (through measures like insurance and distributed keys).
Disclaimer: The views and opinions expressed in this article are solely those of the author and do not necessarily reflect the official policy or position of my employer.
Comments
Post a Comment