Bybit Hack: How Attackers Stole $1.5B in Ethereum and What It Means for Crypto Security
Bybit Hack: How Attackers Stole $1.5B in Ethereum and What It Means for Crypto Security
Massive Crypto Heist: $1.5B Stolen from Bybit!
01 / Blog Article
Bybit Hack: How Attackers Stole $1.5B in Ethereum and What It Means for Crypto Security
On February 21, 2025, Dubai-based cryptocurrency exchange Bybit experienced a significant security breach, resulting in the theft of approximately $1.5 billion worth of Ethereum (ETH). This incident is considered one of the largest digital currency heists to date.
Details of the Hack
Incident Occurrence: The breach occurred during a routine transfer from Bybit's offline "cold" wallet to a "warm" wallet used for daily trading operations. Attackers exploited security vulnerabilities during this process, manipulating the transaction to gain control of the cold wallet and transferring over 400,000 ETH to an unidentified address.
Bybit's Response
Assurance of Solvency: CEO Ben Zhou promptly addressed the situation, assuring customers that their assets remained secure and that Bybit possessed sufficient reserves to cover the loss. He emphasized that all client assets are backed 1:1 and that the company could absorb the financial impact without jeopardizing its operations.
Withdrawal Surge: Following the announcement, Bybit experienced a surge in withdrawal requests, processing over 350,000 requests shortly after the incident. While this led to potential delays, the company maintained that operations continued as usual.
Collaborative Efforts: Bybit has engaged blockchain forensic experts to trace the stolen funds and has launched a recovery bounty program, offering up to 10% of the recovered amount to individuals aiding in the retrieval of the stolen cryptocurrency.
Suspected Perpetrators
North Korean Involvement: Blockchain analytics firms, including Arkham Intelligence and Elliptic, have linked the attack to the Lazarus Group, a North Korean state-sponsored hacking organization known for previous large-scale cryptocurrency thefts. This group has been implicated in several high-profile heists, including the $615 million theft from the Ronin Network in 2022.
Industry Implications
Security Concerns: This incident underscores ongoing security challenges within the cryptocurrency industry, highlighting the need for robust protective measures to safeguard digital assets.
Market Impact: The hack led to a temporary decline in Ethereum's value by nearly 4%, though prices have since stabilized.
Bybit remains committed to enhancing its security infrastructure and maintaining transparency with its user base as investigations continue.
The Bybit hack was a highly sophisticated attack that targeted the cold-to-warm wallet transfer process, exploiting vulnerabilities in private key management, wallet signing mechanisms, and internal security protocols. Below is a technical breakdown of how the attackers might have executed the heist:
Renowned blockchain investigator ZachXBT provided definitive proof to Arkham Intelligence, confirming the attack was executed by the Lazarus Group, a North Korean state-sponsored hacking entity.
Attack Techniques
1. Deployment of a Malicious Contract
The attacker deployed a malicious implementation contract on February 19, 2025, embedding hidden backdoor functions:
sweepETH: Transfers all ETH from the wallet to the attacker’s address.
sweepERC20: Moves all ERC20 tokens to the attacker’s address.
2. Replacing the Safe Wallet Implementation
On February 21, 2025, the attacker exploited Bybit’s multi-signature wallet upgrade mechanism:
The attacker tricked three Bybit signers into approving an upgrade transaction that replaced the legitimate contract with the malicious one.
The transaction was signed using a Ledger hardware wallet, where transaction details were hard to verify due to UI constraints.
Bybit CEO Ben Zhou unknowingly approved the final signature, believing the transaction was part of routine cold-to-warm wallet operations.
3. Exploiting DELEGATECALL
The attacker used DELEGATECALL, a smart contract function that allows executing external code within the context of the existing contract. This allowed the attacker to execute backdoor functions, draining all assets from the wallet.
Security Recommendations
To mitigate such risks, security teams must implement stronger operational and technical controls:
1. Verify Transactions Independently
Use hardware wallets with dedicated displays to manually verify transactions.
Cross-check transactions using multiple sources before signing.
2. Strengthen Endpoint Security
Implement strict software whitelisting.
Regularly update antivirus and anti-malware solutions.
Conduct frequent security audits on critical systems.
3. Enhance Employee Cybersecurity Awareness
Train employees to recognize social engineering attacks.
Implement clear signing policies to prevent deceptive transactions.
The Bybit hack of February 2025 serves as a wake-up call for the crypto industry, highlighting the vulnerabilities in multi-signature wallets, UI-based transaction verification, and social engineering risks. As hackers continue evolving their attack methodologies, exchanges must adopt stricter security measures to prevent similar catastrophic breaches in the future.
CISO Guide: Building a Cybersecurity Attitude in Organizational Culture
While technology-based defenses continually improve, 82% of data breaches are still caused by social engineering or human error.
Cybersecurity
Develop an Effective Cybersecurity Strategy for Your Organization
There is no one-size-fits-all approach when it comes to cybersecurity; every business needs a unique cybersecurity strategy that aligns with its objectives and is suitable for the threats that particular businesses face.
Cybersecurity
4 Principles to Protect Your Business from Cyber Attacks
To effectively mitigate these risks, CISOs must adopt a proactive approach and implement strategies that address the ever-changing cybersecurity landscape.
Cybersecurity
One Security Principle Will Solve Most Security Issues
To have good security, it’s essential to lock down your infrastructure to prevent compromise. This is where the zero trust approach comes in.
Cybersecurity
Preparing For Tomorrow's Threats: Future-Proofing Cyber Security Operations
From small businesses to major corporations, cyberattacks are becoming increasingly sophisticated and prevalent.
Cybersecurity
Data Protection: How to Give Your Organization a Competitive Edge
Data breaches have led to reputational and brand damage for 65% of organizations that failed to protect their customer data and privacy.
Cybersecurity
No Cost, No Hassle with Managed Security Services (MSS)
MSS provides a cost-effective, hassle-free solution to meet cybersecurity needs.
Cybersecurity
The Multi-Million Dollar Hacking Industry: Built Over Years
The RaaS model makes it incredibly easy to launch ransomware campaigns without technical expertise.
Cybersecurity
Quantum Threats Are Real: Are We Ready for Them?
Quantum computing is not just a step forward; it’s a leap. While uncertainties remain, one thing is clear: the quantum era will redefine cybersecurity.
Cybersecurity
Mitigate Insider Threats Through Security Awareness Programs
An insider threat is a potential risk posed by an individual within an organization who might use their privileged access or specialized knowledge to harm the organization.
Cybersecurity
The Unconventional Power of Ethical Hacking and Penetration Testing
Modern practices—such as Penetration Testing as a Service (PTaaS)—are revolutionizing the field.
Cybersecurity
How to Choose the Right Cybersecurity Solution
Explore how to choose the right cybersecurity technology, solutions, and vendors to secure your organization against cyber threats without overspending or exceeding your budget.
Cybersecurity
Addressing the Cybersecurity Talent Shortage
The cybersecurity industry faces a critical challenge: a global shortage of skilled professionals. With over 4 million unfilled positions, organizations must rethink traditional hiring practices and embrace innovative strategies to bridge this gap.
Cybersecurity
The Evolving Threat Landscape and the Imperative of Preparedness
Organizations face a critical disadvantage: while defenders must succeed every time, attackers need only one successful breach.
Cybersecurity
The Psychology of Phishing: Why Employees Still Fall for Scams
Social engineering remains one of the most potent threats in cybersecurity, exploiting inherent human vulnerabilities to bypass technical defenses.
Cybersecurity
Securing APIs: The Overlooked Attack Surface in Cybersecurity
APIs now account for 83% of internet traffic, serving as the backbone of web applications, mobile apps, microservices, and cloud-native architectures.
Cybersecurity
Key Cybersecurity Metrics for Executive Leadership
For executive leaders to make informed decisions, cybersecurity metrics must be translated into the language of business: financial impact, risk quantification, and strategic alignment.
Cybersecurity
Cybersecurity Insurance: A Comprehensive Guide
As organizations navigate these risks, cybersecurity insurance has emerged as a critical financial control to mitigate losses and ensure business continuity.
Cybersecurity
The Evolving Role of the CISO: Beyond Technical Expertise
Modern CISOs must align security initiatives with business objectives, translating complex technical risks into strategic decisions that impact revenue, reputation, and operational continuity.
Cybersecurity
Why Email Remains the Weakest Link - and What Smart Organizations are Doing About It
This article highlights the limitations of standard email defense and ways to strengthen the email perimeter without disrupting employees’ productivity.
Cybersecurity
Identity is the New Perimeter
This article explores how identity has replaced the network perimeter, and how enterprises can realign their security strategies to better protect critical assets.
Cybersecurity
Weekly Cybersecurity Recap - 29 September 2025
Ransomware at Airports, Cisco Zero-Days, and New Supply Chain Attacks
Cybersecurity
Turning Cyber Awareness into Action in Emerging Markets
In honor of this year’s Cybersecurity Awareness Month, we go beyond basic cyber awareness, focusing on how security managers can transform security training into measurable action.
Cybersecurity
How Breach and Attack Simulation is Redefining Cyber Preparedness
Breach and attack simulation (BAS) is the vector to achieve continuous validation with minimal disruptions to business operations.
Protect your business with Paratus
Ready to get started? Fill out the form below and we'll get back to you in no time!
risk decrease
96%Risks from dealing with clients and traders decrease by 96%
Become a Vendor
To: Paratus
Thank You!
Thank you for reaching out to us. Your request has been received, and we will get back to you
within
the
next 24
hours. Alternatively, you can also reach us at
[email protected]