Bybit Hack: How Attackers Stole $1.5B in Ethereum and What It Means for Crypto Security

Massive Crypto Heist: $1.5B Stolen from Bybit!

01 / Blog Article

Bybit Hack: How Attackers Stole $1.5B in Ethereum and What It Means for Crypto Security
    Bybit

    On February 21, 2025, Dubai-based cryptocurrency exchange Bybit experienced a significant security breach, resulting in the theft of approximately $1.5 billion worth of Ethereum (ETH). This incident is considered one of the largest digital currency heists to date.

    Details of the Hack

    • Incident Occurrence: The breach occurred during a routine transfer from Bybit's offline "cold" wallet to a "warm" wallet used for daily trading operations. Attackers exploited security vulnerabilities during this process, manipulating the transaction to gain control of the cold wallet and transferring over 400,000 ETH to an unidentified address.

    Bybit's Response

    • Assurance of Solvency: CEO Ben Zhou promptly addressed the situation, assuring customers that their assets remained secure and that Bybit possessed sufficient reserves to cover the loss. He emphasized that all client assets are backed 1:1 and that the company could absorb the financial impact without jeopardizing its operations.
    • Withdrawal Surge: Following the announcement, Bybit experienced a surge in withdrawal requests, processing over 350,000 requests shortly after the incident. While this led to potential delays, the company maintained that operations continued as usual.
    • Collaborative Efforts: Bybit has engaged blockchain forensic experts to trace the stolen funds and has launched a recovery bounty program, offering up to 10% of the recovered amount to individuals aiding in the retrieval of the stolen cryptocurrency.

    Suspected Perpetrators

    • North Korean Involvement: Blockchain analytics firms, including Arkham Intelligence and Elliptic, have linked the attack to the Lazarus Group, a North Korean state-sponsored hacking organization known for previous large-scale cryptocurrency thefts. This group has been implicated in several high-profile heists, including the $615 million theft from the Ronin Network in 2022.

    Industry Implications

    • Security Concerns: This incident underscores ongoing security challenges within the cryptocurrency industry, highlighting the need for robust protective measures to safeguard digital assets.
    • Market Impact: The hack led to a temporary decline in Ethereum's value by nearly 4%, though prices have since stabilized.

    Bybit remains committed to enhancing its security infrastructure and maintaining transparency with its user base as investigations continue.

    The Bybit hack was a highly sophisticated attack that targeted the cold-to-warm wallet transfer process, exploiting vulnerabilities in private key management, wallet signing mechanisms, and internal security protocols. Below is a technical breakdown of how the attackers might have executed the heist:

    Incident Overview

    Key Details

    • Compromised Wallet: 0x1Db92e2EeBC8E0c075a02BeA49a2935BcD2dFCF4
    • Exploiter Wallet: 0x47666Fab8bd0Ac7003bce3f5C3585383F09486E2
    • Estimated Total Loss: $1.44 billion
    Assets Stolen
    Asset Amount Estimated Value ($)
    ETH 401,347 1,123,770,953
    stETH 90,376 253,051,540
    mETH 8,000 22,400,000
    cmETH 15,000 42,000,000
    USDT 90 90

    Attack Attribution

    Renowned blockchain investigator ZachXBT provided definitive proof to Arkham Intelligence, confirming the attack was executed by the Lazarus Group, a North Korean state-sponsored hacking entity.

    Attack Techniques

    1. Deployment of a Malicious Contract

    The attacker deployed a malicious implementation contract on February 19, 2025, embedding hidden backdoor functions:

    • sweepETH: Transfers all ETH from the wallet to the attacker’s address.
    • sweepERC20: Moves all ERC20 tokens to the attacker’s address.

    2. Replacing the Safe Wallet Implementation

    On February 21, 2025, the attacker exploited Bybit’s multi-signature wallet upgrade mechanism:

    • The attacker tricked three Bybit signers into approving an upgrade transaction that replaced the legitimate contract with the malicious one.
    • The transaction was signed using a Ledger hardware wallet, where transaction details were hard to verify due to UI constraints.
    • Bybit CEO Ben Zhou unknowingly approved the final signature, believing the transaction was part of routine cold-to-warm wallet operations.

    3. Exploiting DELEGATECALL

    The attacker used DELEGATECALL, a smart contract function that allows executing external code within the context of the existing contract. This allowed the attacker to execute backdoor functions, draining all assets from the wallet.

    Security Recommendations

    To mitigate such risks, security teams must implement stronger operational and technical controls:

    1. Verify Transactions Independently

    • Use hardware wallets with dedicated displays to manually verify transactions.
    • Cross-check transactions using multiple sources before signing.

    2. Strengthen Endpoint Security

    • Implement strict software whitelisting.
    • Regularly update antivirus and anti-malware solutions.
    • Conduct frequent security audits on critical systems.

    3. Enhance Employee Cybersecurity Awareness

    • Train employees to recognize social engineering attacks.
    • Implement clear signing policies to prevent deceptive transactions.

    The Bybit hack of February 2025 serves as a wake-up call for the crypto industry, highlighting the vulnerabilities in multi-signature wallets, UI-based transaction verification, and social engineering risks. As hackers continue evolving their attack methodologies, exchanges must adopt stricter security measures to prevent similar catastrophic breaches in the future.

    02/ Related Posts

    view all
    Article Image Cybersecurity

    CISO Guide: Building a Cybersecurity Attitude in Organizational Culture

    While technology-based defenses continually improve, 82% of data breaches are still caused by social engineering or human error.

    Article 5 Cybersecurity

    Develop an Effective Cybersecurity Strategy for Your Organization

    There is no one-size-fits-all approach when it comes to cybersecurity; every business needs a unique cybersecurity strategy that aligns with its objectives and is suitable for the threats that particular businesses face.

    4 Principles to Protect Your Business from Cyber Attacks Cybersecurity

    4 Principles to Protect Your Business from Cyber Attacks

    To effectively mitigate these risks, CISOs must adopt a proactive approach and implement strategies that address the ever-changing cybersecurity landscape.

    Zero Trust Security Cybersecurity

    One Security Principle Will Solve Most Security Issues

    To have good security, it’s essential to lock down your infrastructure to prevent compromise. This is where the zero trust approach comes in.

    Cybersecurity Operations Cybersecurity

    Preparing For Tomorrow's Threats: Future-Proofing Cyber Security Operations

    From small businesses to major corporations, cyberattacks are becoming increasingly sophisticated and prevalent.

    Data Protection Cybersecurity

    Data Protection: How to Give Your Organization a Competitive Edge

    Data breaches have led to reputational and brand damage for 65% of organizations that failed to protect their customer data and privacy.

    MSSP Cybersecurity

    No Cost, No Hassle with Managed Security Services (MSS)

    MSS provides a cost-effective, hassle-free solution to meet cybersecurity needs.

    The Multi-Million Dollar Hacking Industry Built Over Years Cybersecurity

    The Multi-Million Dollar Hacking Industry: Built Over Years

    The RaaS model makes it incredibly easy to launch ransomware campaigns without technical expertise.

    Quantum Threats Are Real Cybersecurity

    Quantum Threats Are Real: Are We Ready for Them?

    Quantum computing is not just a step forward; it’s a leap. While uncertainties remain, one thing is clear: the quantum era will redefine cybersecurity.

    Insider Threats Cybersecurity

    Mitigate Insider Threats Through Security Awareness Programs

    An insider threat is a potential risk posed by an individual within an organization who might use their privileged access or specialized knowledge to harm the organization.

    The Unconventional Power of Ethical Hacking and Penetration Testing Cybersecurity

    The Unconventional Power of Ethical Hacking and Penetration Testing

    Modern practices—such as Penetration Testing as a Service (PTaaS)—are revolutionizing the field.

    Protect your business with Paratus

    Ready to get started? Fill out the form below and we'll get back to you in no time!

    To: Paratus

    risk decrease

    96% Risks from dealing with clients and traders decrease by 96%