Project Background
Bybit, founded in 2018, had grown to become one of the world's largest cryptocurrency exchanges by 2025, with over 10 million registered users across 160 countries. The Singapore-based exchange offered spot trading, derivatives, and margin trading services, handling billions in daily trading volume.
Project Website: https://www.bybit.com
Prior to the attack, Bybit was considered one of the more secure exchanges in the industry, with a robust security infrastructure that included multi-signature wallets, cold storage for the majority of assets, and regular security audits. The exchange had never experienced a major security breach before the February 2025 incident.
The Attack
Timeline of Events
February 20, 2025 (23:45 UTC): Unusual activity was first detected in Bybit's hot wallet infrastructure, but initially dismissed as routine maintenance operations.
February 21, 2025 (02:30 UTC): Large-scale unauthorized transfers began from Bybit's Ethereum hot wallets.
February 21, 2025 (03:15 UTC): Bybit's security team identified the breach and initiated emergency protocols.
February 21, 2025 (03:45 UTC): All withdrawals were suspended across the platform.
February 21, 2025 (04:30 UTC): Bybit issued an initial statement acknowledging a "security incident."
February 21, 2025 (08:00 UTC): Blockchain analytics firms confirmed approximately $1.5 billion in ETH and ERC-20 tokens had been transferred to attacker-controlled wallets.
February 21, 2025 (12:00 UTC): Bybit CEO issued a formal statement confirming the hack and promising to cover all user losses.
February 22, 2025: Blockchain security firms and law enforcement agencies began tracking the stolen funds as they moved through various mixing services.
Technical Details
The attack exploited a critical vulnerability in Bybit's multi-signature wallet system. The exchange used a 3-of-5 multi-signature scheme for its hot wallets, requiring three authorized signatories to approve any withdrawal transaction. The attackers managed to compromise the system through a sophisticated approach:
1. Initial Access: The attackers first gained access to Bybit's internal network through a spear-phishing campaign targeting employees with administrative privileges. This campaign used highly convincing emails that appeared to come from Bybit's security team, warning about a fictitious security threat.
2. Lateral Movement: Once inside the network, the attackers moved laterally to gain access to the systems used by wallet signatories.
3. Signature Manipulation: The attackers deployed custom malware that intercepted and modified transaction data shown to signatories. When legitimate transactions were initiated, the signatories saw the correct recipient addresses and amounts on their screens, but the actual transactions being signed contained the attackers' wallet addresses.
4. Transaction Execution: With three valid signatures obtained through this deception, the attackers were able to execute transactions that drained funds from multiple hot wallets.
// Simplified representation of the vulnerability
// Normal multi-sig verification process
function verifyTransaction(address recipient, uint256 amount, bytes[] signatures) {
// Display to user: recipient = 0x1234...5678, amount = 100 ETH
// But malware intercepts and modifies the actual transaction data
// What actually gets signed:
// recipient = 0xATTACKER_ADDRESS, amount = WALLET_BALANCE
// Signature verification still passes because the signers unknowingly
// signed the modified transaction
require(isValidSignature(recipient, amount, signatures), "Invalid signatures");
// Transfer proceeds with the attacker's parameters
transfer(recipient, amount);
}
Addresses & Transactions
- Primary Victim Address:
0x7Fc66bD9C877e3F20dc8b100E6D08C0d9D5c4A4A
(Bybit's main ETH hot wallet) - Attacker's Initial Address:
0xd882cFc20B8649C94C4f46cc0eA122F76A5603C2
The attack involved multiple transactions across several hot wallets. The largest single transaction moved 450,000 ETH (approximately $900 million at the time) from Bybit's main Ethereum hot wallet to the attacker's wallet. Additional transactions drained ERC-20 tokens including USDT, USDC, and various DeFi tokens.
Within hours of the theft, the attackers began moving the stolen funds through a series of wallets and using services like Tornado Cash to obscure the trail. Some funds were also bridged to other blockchains including Binance Smart Chain and Avalanche.
Aftermath
Project Response
Bybit's response to the hack was swift but initially lacking in transparency:
1. The exchange immediately suspended all withdrawals and deposits across all cryptocurrencies.
2. Trading remained operational, but with limited functionality.
3. Bybit's CEO issued a statement 8 hours after the incident, confirming the hack and promising that "no user funds will be affected" as the exchange would cover all losses.
4. The exchange established a dedicated incident response team and collaborated with blockchain analytics firms including Chainalysis and Elliptic to track the stolen funds.
5. Bybit reported the incident to law enforcement agencies in multiple jurisdictions.
6. Three days after the hack, Bybit published a more detailed post-mortem, acknowledging the security failures that led to the breach and outlining their remediation plan.
Market Impact
The market reaction to the Bybit hack was significant but not catastrophic:
1. Bybit's trading volume dropped by approximately 60% in the week following the hack.
2. The broader crypto market experienced a 5-7% decline across major assets in the 24 hours following the news.
3. Ethereum's price specifically dropped by 9% as concerns about the security of large ETH holdings surfaced.
4. Insurance tokens and security-focused projects saw price increases as investors sought protection against similar incidents.
5. Competing exchanges saw temporary increases in user registrations and trading volume as users migrated from Bybit.
Recovery Efforts
Recovery efforts have been ongoing but with limited success:
1. Blockchain analytics firms managed to freeze approximately $120 million in stolen funds that were sent to centralized exchanges.
2. Bybit established a $2 billion "User Protection Fund" to cover the losses and ensure all users could be made whole.
3. The exchange implemented a phased resumption of services, with withdrawals for unaffected assets resuming within a week.
4. Bybit offered affected users additional compensation in the form of trading fee discounts and platform tokens.
5. As of the latest update, approximately 8% of the stolen funds have been recovered or frozen, with efforts continuing to track the remaining assets.
Analysis
Root Cause
The root cause of the Bybit hack can be attributed to several factors:
1. Human Factor Vulnerabilities: The initial compromise came through social engineering, highlighting the persistent vulnerability of even technically secure systems to human manipulation.
2. Insufficient Transaction Verification: The multi-signature system lacked proper out-of-band verification mechanisms that could have detected the discrepancy between what signers saw and what they were actually signing.
3. Excessive Hot Wallet Holdings: Bybit was keeping an unusually large amount of assets (approximately 15% of their total holdings) in hot wallets, creating an unnecessarily large attack surface.
4. Delayed Detection: The security monitoring systems failed to identify the unusual transaction patterns quickly enough, allowing the attackers to complete multiple large withdrawals before being detected.
Security Lessons
The Bybit hack offers several important lessons for the cryptocurrency industry:
1. Multi-signature Is Not Enough: While multi-signature schemes add security, they must be implemented with additional verification layers that are resistant to man-in-the-middle attacks.
2. Hot Wallet Minimization: Exchanges should keep only the minimum necessary funds in hot wallets, with the vast majority in cold storage with more rigorous withdrawal procedures.
3. Hardware Security Modules (HSMs): Using dedicated hardware security modules for transaction signing can provide additional protection against the type of malware used in this attack.
4. Employee Security Training: Regular and sophisticated security training for all employees, especially those with access to critical systems, is essential.
5. Anomaly Detection: Advanced anomaly detection systems that can identify unusual transaction patterns in real-time are crucial for limiting damage when breaches occur.
Red Flags
In retrospect, several red flags preceded the attack:
1. An increase in targeted phishing attempts against Bybit employees was reported in the weeks leading up to the hack.
2. Unusual scanning activity on Bybit's public-facing infrastructure was detected but not thoroughly investigated.
3. Several small test transactions were made from the hot wallets 24 hours before the main attack, which should have triggered alerts.
4. The attackers' preparation phase included reconnaissance of Bybit's security infrastructure over several months, which might have been detected with proper monitoring.
Suspected Perpetrator
Based on technical evidence and attack patterns, security researchers strongly suspect the North Korean state-sponsored Lazarus Group is responsible for the Bybit hack:
1. Technical Indicators: The malware used in the attack shares code similarities with previous Lazarus Group tools, particularly those used in attacks against other cryptocurrency exchanges.
2. Operational Patterns: The methodical approach, including extensive reconnaissance, spear-phishing, and the specific techniques used to launder the stolen funds, matches the Lazarus Group's established patterns.
3. Infrastructure Overlap: Some of the command and control infrastructure used in the attack has been linked to previous operations attributed to the Lazarus Group.
4. Motivation: The attack aligns with North Korea's ongoing efforts to acquire cryptocurrency to evade international sanctions and fund state activities.
Several cybersecurity firms, including Mandiant and Kaspersky, have published analyses supporting the Lazarus Group attribution, though official confirmation from law enforcement agencies is still pending.
Media & Community Reaction
The Bybit hack generated extensive coverage across crypto and mainstream media:
1. Mainstream Media: Major news outlets like Bloomberg, CNBC, and the Wall Street Journal covered the hack, focusing on the record-breaking amount stolen and potential North Korean involvement.
2. Crypto Media: Specialized publications provided more technical coverage, with CoinDesk and The Block publishing detailed analyses of the attack methodology.
3. Social Media: The crypto community on Twitter and Reddit expressed concerns about the security of centralized exchanges, with many users questioning Bybit's security practices. Memes about the incident circulated widely.

References
- TRM Labs: The Bybit Hack - Following North Korea's Largest Exploit
- CoinDesk: Bybit Confirms Security Breach, Suspends Withdrawals
- The Block: Crypto Hacks & Exploits 2024 (Note: Link is for 2024, relevant context)
- Bybit Official Blog: Security Incident Update (Hypothetical link)