Bitget
Bitget

# NEW

Crypto Security Wake-Up Call: Bybit Hit by $140 Million Large-Scale Hack

Crypto Security Wake-Up Call: Bybit Hit by $140 Million Large-Scale Hack

KEYTAKEAWAYS

  • Bybit lost $140 million in a highly organized hack, exploiting Safe wallet vulnerabilities.
  • Attackers used social engineering to manipulate key holders into signing a malicious transaction.
  • The Lazarus Group is suspected to be behind the attack, continuing their targeting of crypto platforms.

CONTENT

BYBIT FACES THE LARGEST CRYPTO THEFT IN HISTORY

 

On the evening of February 21, 2025, the cryptocurrency exchange Bybit was targeted in a well-planned attack, resulting in the theft of approximately $1.4 billion in assets. This attack became the largest theft in cryptocurrency history. The attack was not due to a smart contract vulnerability but exploited the Safe multi-signature wallet system used by Bybit.

 

The attackers used deceptive tactics to trick several key holders into signing a malicious upgrade transaction, allowing them to take control of the wallet and transfer the funds. Following the incident, blockchain detective ZachXBT, the SlowMist security team, and Bybit’s own team quickly began investigating, revealing technical details of the attack and the likely culprit—North Korean hacker group Lazarus Group.

 


 

THE TIMELINE: FROM DEPLOYMENT TO FUND TRANSFER

 

According to on-chain analysis, the preparation for this attack began at least two days earlier. The attackers first obtained initial funds from an address on Binance (0x0fa09C3A328792253f8dee7116848723b72a6d2e) and then deployed a malicious contract (0xbDd077f651EBe7f7b3cE16fe5F2b025BE2969516) on February 19, 2025, at 07:15:23 UTC.

 

On February 21, 2025, at 14:13:35 UTC, the attackers tricked three key holders of the Safe wallet into signing a transaction that replaced the original Safe contract with the malicious version. The transaction hash was:0x46deef0f52e3a983b67abf4714448a41dd7ffd6d32d32da69d62081c68ad7882.

 

This malicious contract contained a backdoor, which used DELEGATECALL to write attack code into storage (STORAGE 0, address 0x96221423681A6d52E184D440a8eFCEbB105C7242). The built-in functions, sweepETH and sweepERC20, quickly transferred assets from the cold wallet.

 

The stolen assets included 401,347 ETH (around $1.068 billion), 8,000 mETH (about $26 million), 90,375.5479 stETH (roughly $260 million), and 15,000 cmETH (around $43 million), totaling over $1.46 billion. The transfer process was highly efficient. The initial hacker address (0x47666Fab8bd0Ac7003bce3f5C3585383F09486E2) distributed 400,000 ETH in 10,000 ETH batches across 40 addresses. They also converted 205 ETH into BTC via Chainflip, sending it to a Bitcoin address (bc1qlu4a33zjspefa3tnq566xszcr0fvwz05ewhqfq).

 

Meanwhile, 8,000 mETH and 90,375.5479 stETH were swapped for 98,048 ETH on Uniswap and ParaSwap, and later transferred to another address (0xdd90071d52f20e85c89802e5dc1ec0a7b6475f92) and further spread across nine more addresses. Notably, the 15,000 cmETH was transferred to 0x1542368a03ad1f03d96D51B414f4738961Cf4443, but mETH Protocol temporarily paused withdrawals, recovering that portion of the stolen assets.

 


 

THE “BLIND SIGNING” RISK OF SAFE MULTI-SIGNATURE WALLETS

 

The Safe multi-signature wallet, widely used as a smart contract wallet, operates under the “n-of-m” model (e.g., 3-of-5), requiring multiple key holders to authorize transactions to enhance security. However, this attack exposed its potential weaknesses.

 

Bybit CEO Ben Zhou pointed out in an X post at 23:44 on the night of the attack that the attackers did not breach the Safe contract directly but instead exploited a frontend interface manipulation. This deceived the signers into approving a malicious upgrade transaction that appeared normal on the interface.

 

This “blind signing” issue arises because hardware wallets struggle to interpret complex transactions, making it hard for users to verify the true contents of a transaction before signing.

 

The SlowMist security team speculates that the attackers may have used social engineering techniques to study the internal financial team’s operations at Bybit or even compromised the Safe’s frontend system or the signers’ devices.

 

This method mirrors similar attacks in 2024, such as those against WazirX (a $230 million loss) and Radiant Capital (a $50 million loss), where Safe multi-signature wallets were replaced with malicious contracts, and the permission check methods were strikingly similar.

 


 

NORTH KOREAN HACKERS’ “OLD TACTIC”?

 

Blockchain detective ZachXBT used transaction testing, wallet correlations, and timing analysis to confirm that the attack was linked to the North Korean hacker group Lazarus Group. This group has increasingly targeted cryptocurrency platforms in recent years, using increasingly sophisticated methods.

 

Further analysis by SlowMist and Arkham revealed connections between the hacker’s address and previous attacks on exchanges like BingX and Phemex, with the funds showing typical laundering patterns associated with Lazarus Group.

 

While the initial funds came from Binance, this may have been a strategy to cover the attackers’ tracks, and there is a high likelihood that the accounts used were either unverified or using false identities.

 


 

BYBIT’S RESPONSE AND MARKET IMPACT

 

After the incident, Bybit reacted swiftly. In their official statement, they assured customers that all assets would be backed 1:1, and the platform could cover the loss. User withdrawal functions were not affected. By 10:51 on February 22, Ben Zhou confirmed that deposits and withdrawals had been restored.

 

However, the $1.5 billion theft certainly served as a wake-up call for the crypto industry. While Bybit was not affected by a smart contract vulnerability, the weakness in its frontend security and operational procedures was clearly exposed.

 


 

LESSONS AND FUTURE OUTLOOK

 

This attack underscores that even a well-established Safe multi-signature wallet cannot fully withstand a meticulously planned social engineering attack. Frontend manipulation, blind signing risks, and unclear operational processes became exploitable weaknesses.

 

This event is not an isolated case, as Lazarus Group used similar tactics to attack multiple platforms in 2024, including DMM Bitcoin (with a $305 million loss). These cases highlight the need for the industry to shift its focus from single-point technical solutions to comprehensive, end-to-end security measures.

 


▶ Buy Crypto at Bitget

 

CoinRank x Bitget – Sign up & Trade to get $20!

Bitget, Messi, Crypto Exchange


DISCLAIMER

CoinRank is not a certified investment, legal, or tax advisor, nor is it a broker or dealer. All content, including opinions and analyses, is based on independent research and experiences of our team, intended for educational purposes only. It should not be considered as solicitation or recommendation for any investment decisions. We encourage you to conduct your own research prior to investing.

 

We strive for accuracy in our content, but occasional errors may occur. Importantly, our information should not be seen as licensed financial advice or a substitute for consultation with certified professionals. CoinRank does not endorse specific financial products or strategies.


WRITER’S INTRO

CoinRank Exclusive brings together primary sources from various fields to provide readers with the most timely and in-depth analysis and coverage. Whether it’s blockchain, cryptocurrency, finance, or technology industries, readers can access the most exclusive and comprehensive knowledge.


NEWSLETTER

SUBSCRIBE

CoinRank