Emergency Procedures
Engineer/DeveloperSecurity SpecialistMultisig Security
Authored by:
When security incidents occur, quick and decisive action is critical. This page covers procedures for key compromise, lost access, and communication breaches.
Key Compromise
Immediate Actions (Within 30 Minutes)
- Stop operations - Halt all non-emergency transactions
- Notify team - Alert via all communication channels using emergency notification template
- Assess scope - Determine which keys may be compromised
- Escalate - Contact Security team immediately
- Document - Record timeline and details
Recovery Process
- Isolate - Quarantine potentially compromised devices
- New hardware setup - Set up fresh wallet with new seed following Hardware Wallet Setup
- Coordinate replacement - Plan signer replacement transaction with team
- Execute replacement - Replace compromised signer on multisig, following steps for signer rotation in Secure Multisig Best Practices
- Verify security - Confirm new setup before resuming operations
Lost Key Access
Immediate Steps
- Try backup device first if available
- Contact team immediately via backup communication channels
- Do not panic - Lost access doesn't mean compromised keys
- Document the situation - Record what happened and when
Identity Verification Process
Since you can't sign with your key, verify identity through alternative methods:
- Video call with other signers
- Authentication via verified social media account
- Other pre-arranged verification methods
Replacement Coordination
- Generate new hardware wallet following standard setup procedures in Hardware Wallet Setup
- Verify new address through identity verification process above
- Coordinate timing with other signers for replacement transaction
- Execute replacement once team confirms identity
- Update documentation with new signer information
Communication Account Compromise
If Telegram/Signal/Discord Gets Taken Over
Immediate Actions
- Assume all recent messages are suspect - Don't trust recent communication
- Use backup channels to alert team about compromise
- Change passwords and enable additional security on compromised account
Team Verification Process
For the compromised person:- Use alternative contact methods (email, phone, other platforms)
- Verify identity through video call or pre-arranged methods
- Provide proof of the compromise (screenshots, platform confirmation)
- Verify all recent requests from compromised account
- Cancel any pending transactions initiated via compromised communication
- Require additional verification for any future requests until resolved
Recovery Steps
- Regain account control through platform recovery processes
- Enable maximum security (2FA, security keys, session management)
- Review recent message history for unauthorized communications
- Alert team when account is secured and verified clean
- Resume normal operations only after team confirms account security
Emergency Notification Template
Use this template for security incidents or key compromises:
Subject: [URGENT] Multisig Security Incident - [Multisig Name]
Immediate details:
- Multisig address: [ADDRESS]
- Classification: [Impact Level / Operational Type]
- Incident type: [Key Compromise / Communication Failure / System Issue]
- Time of discovery: [TIMESTAMP]
- Reporting signer: [NAME/HANDLE]
Situation summary: [Brief description of what happened and current status]
Immediate actions taken:
□ Stopped non-emergency operations
□ Isolated affected systems
□ Notified team members
□ [Other actions]
Next steps required:
□ Security team assessment
□ Key rotation process
□ Emergency transaction execution
□ [Other actions]
Current multisig status:
- Available signers: [X/Y]
- Communication status: [Operational/Compromised]
- Operational capability: [Full/Limited/Suspended]Emergency Communication Protocols
Multi-Channel Notification
- Primary channel: Alert via main communication channel
- Backup channels: Simultaneously notify via backup platforms
- Emergency contacts: Use emergency contact procedures if established
Identity Verification
- Code words: Use pre-established verification phrases
- Multiple confirmations: Verify through multiple channels
- Video verification: Use video calls for critical confirmations
Information Sharing
- Need-to-know basis: Share only essential information
- Secure channels only: Use most secure available communication
- Documentation: Record all emergency communications
Operational Emergency Procedures
For Emergency Response Multisigs
Rapid Response Protocol
- Immediate assessment - Determine scope and urgency
- Signer activation - Contact threshold number of signers
- Streamlined verification - Use minimal verification appropriate for risk level
- Execute response - Implement emergency measures
- Post-action review - Document and assess response effectiveness
24/7 Availability
- Geographic distribution - Ensure coverage across time zones
- Backup signers - Have additional signers available for activation
- Communication redundancy - Multiple ways to reach each signer
Emergency Drill Procedures
Regular Testing Schedule
- Quarterly: Communication system tests
- Bi-annually: Emergency paging system tests
- Annually: Full emergency simulation with all signers
Drill Components
- Notification test - Verify all signers receive alerts
- Response time measurement - Track time to threshold signatures
- Process verification - Ensure procedures work under pressure
- Documentation review - Update procedures based on drill results
Recovery and Post-Incident
Immediate Recovery
- Restore operations - Resume normal operations once threat is mitigated
- Monitor for issues - Watch for any residual security concerns
- Update security measures - Implement additional controls if needed
Post-Incident Analysis
- Root cause analysis - Determine how incident occurred
- Process improvement - Update procedures to prevent recurrence
- Team debriefing - Gather lessons learned from all participants
- Documentation updates - Revise emergency procedures based on experience
Communication
- Team notification - Inform team when incident is resolved
- Stakeholder updates - Notify relevant parties as appropriate
- Documentation - Complete incident report for future reference
Emergency Contact Information
Security Team Contact
- Email: [Security team email]
- Emergency escalation: [24/7 emergency contact if available]
- Communication: Use subject line format from emergency notification template
Internal Escalation
- Protocol leadership: [Contact information]
- Technical team: [Emergency technical contact]
- Legal/compliance: [If regulatory notification required]
Related Documents
- Incident Reporting - Formal incident reporting procedures
- Communication Setup - Backup communication channels
- Hardware Wallet Setup - Device replacement procedures
- Seed Phrase Management - Key recovery procedures
- Personal Security (OpSec) - Account security measures