On the evening of February 21, 2025, global cryptocurrency exchange Bybit experienced the largest hack in the crypto industry’s history. During the breach, more than 500,000 ETH, stETH, and mETH were drained from Bybit’s wallets, with the total loss exceeding $1.46 billion based on that day’s market prices. The stolen assets were quickly moved to unidentified wallet addresses. This attack surpassed the 2021 Poly Network breach, which saw $611 million stolen, making it the most significant crypto theft.
Source: https://www.ic3.gov/PSA/2025/PSA250226
Source: https://x.com/benbybit/status/1894768736084885929
Founded in 2018, Bybit is one of the largest cryptocurrency exchanges in the world, with an average daily trading volume exceeding $36 billion. According to CoinMarketCap, Bybit held approximately $16.2 billion in assets before the hack, meaning the stolen Ethereum accounted for around 9% of its total holdings.
On-chain analyst ZachXBT provided evidence suggesting that the hack was likely carried out by the North Korea-linked hacking group Lazarus Group. He received a $30,000 bounty for his investigation into the vulnerability.
Source: https://www.chainabuse.com/report/b87c8824-8f5c-434a-a595-b7b916f641ad
The Hack
The attackers used a spoofed user interface (UI) to infiltrate the computer of a Safe (wallet provider) employee, specifically targeting the front end of Bybit’s Safe system. By mimicking a legitimate user interface, the hackers could compromise Bybit’s ETH multi-signature cold wallet. The hackers stealthily altered the transaction content during what appeared to be a normal transaction process.
Since the signers believed they were authorizing a legitimate transaction, they failed to detect that it had been replaced with a malicious contract. This resulted in the unauthorized transfer of $1.46 billion worth of ETH to unknown addresses controlled by the attackers.
Attack Workflow, Methods, and Defense:
Fund Movement and Money Laundering
Between 3:00 PM and 4:30 PM on February 21, 2025, the hackers completed the majority of fund transfers. After the attack, only about $3 million worth of ETH remained in the primary wallet. The stolen ETH was divided into 40 transactions of 10,000 ETH each, while the stETH and mETH were distributed to multiple different wallets to obscure the fund trail. Subsequently, the hackers used decentralized exchanges (DEXs) to further fragment and launder the funds, aiming to erase all traces.
Market Impact
Even before Bybit officially confirmed the hack, both BTC and ETH prices began to fall. Within hours of the announcement, Bitcoin dropped by 3%, while Ethereum fell by 7%.
Over the weekend, ETH rebounded to $2,800 following a buyback initiated by Bybit, but slipped again by Monday. The hacker has now become the 14th largest ETH holder, and such a concentration of funds may put downward pressure on Ethereum’s market outlook.
Source: https://x.com/Bybit_Official/status/1893585578706227545
Controversy Over Cross-Chain Protocols
Lazarus Group frequently uses cross-chain exchange protocols like THORChain to convert stolen assets into Bitcoin. THORChain facilitates direct swaps between different blockchains, such as ETH to BTC, without going through centralized exchanges.
According to THORChain Explorer, the protocol’s 24-hour volume on March 5 reached $93 million. Developers behind the protocol have faced harsh criticism for allegedly enabling illicit transactions by North Korean hackers.
Source: https://thorchain.net/dashboard
Lazarus Group is one of the most active and notorious hacking organizations globally. The name “Lazarus” comes from the biblical figure brought back to life, symbolizing resilience and resurgence.
Also referred to as “Guardians,” “Peace,” or the “Whois Team,” the group’s membership and internal structure remain largely unknown. However, it is widely believed to operate under the direct control of the North Korean government. Initially functioning as a cybercriminal gang, Lazarus has evolved over time due to the scale and sophistication of its attacks. It is now considered an Advanced Persistent Threat (APT) group.
Different institutions refer to Lazarus by various names:
According to former North Korean intelligence officer Kim Kuk-song, the group is known internally in North Korea as the 414 Liaison Office.
The U.S. Department of Justice has stated that Lazarus Group operates as an extension of the North Korean state. Its activities go beyond cyber disruption and include efforts to bypass international sanctions and generate illicit revenue. By carrying out low-cost, high-impact cyberattacks, North Korea can deploy small teams of hackers that pose significant threats to global financial systems and critical infrastructure, particularly in South Korea and Western countries.
Source: https://en.wikipedia.org/wiki/Lazarus_Group
Lazarus Group is primarily composed of two branches:
Also known as APT38, Stardust Chollima, or BeagleBoyz, BlueNorOff focuses on financial cybercrime, often involving fraudulent SWIFT transactions to move funds illegally. The group has targeted financial institutions in various countries, with the stolen funds believed to support North Korea’s missile and nuclear weapons programs.
Their most infamous operation occurred in 2016, when they attempted to steal nearly $1 billion through the SWIFT network. A spelling error in one of the instructions prevented the Federal Reserve Bank of New York from completing part of the transfers. BlueNorOff uses tactics such as phishing, backdoors, exploits, and malware (e.g., DarkComet, WannaCry). They also collaborate with other cybercriminal groups to expand illicit money channels, increasing global cybersecurity risks.
Also known as “Silent Chollima,” “Dark Seoul,” “Rifle,” and “Wassonite,” Andariel specializes in cyberattacks targeting South Korea, and is known for its stealthy operations. According to a 2020 report from the U.S. Army, the group consists of approximately 1,600 members responsible for cyber reconnaissance, vulnerability assessments, and mapping enemy network infrastructures to prepare for future attacks.
Besides targeting South Korea, Andariel has also launched attacks on government agencies, critical infrastructure, and corporations in other countries.
Source: https://home.treasury.gov/news/press-releases/sm774
Over the years, Lazarus Group has launched a series of cyberattacks worldwide. Starting with early DDoS campaigns like Operation Troy (2009) and Ten Days of Rain (2011), they have evolved into more complex operations involving:
Since 2017, the group has heavily targeted the cryptocurrency sector, launching attacks on:
Their campaigns have stolen billions of dollars worth of digital assets.
In recent years, Lazarus has continued to expand into new sectors, including healthcare, cybersecurity, and online gambling. In 2023 alone, the group caused approximately $300 million in losses, accounting for 17.6% of all global hacking damages.
Source: https://x.com/Cointelegraph/status/1894180646584516772
Crypto exchanges typically adopt a comprehensive security strategy based on four key pillars: prevention, detection, incident response, and recovery.
Source: demo.chainalysis.com
Emergency Funds: Establish emergency funds such as Gate.io’s SAFU (Secure Asset Fund for Users) to protect user assets during critical incidents.
As of March 5, 2025, Gate.io’s reserve fund stood at $10.328 billion, underscoring its financial strength and user protection capabilities.
Source: www.gate.io
Source: https://www.gate.io/safu-user-assets-security-fund
The cornerstone of a crypto platform’s cybersecurity lies in the principle:
“Prevention first, timely detection, efficient response, and strong recovery.”
Platforms can maximize user asset protection by combining optimized security architecture, on-chain analysis, and rapid response mechanisms.
Cryptocurrencies are entirely digital, and once lost or stolen, recovery is usually impossible through traditional means (e.g., banks). Therefore, taking strict security precautions is essential. Below are the core strategies for safeguarding your crypto assets:
Cold Storage:
Hot Wallets:
Source: https://metamask.io/
Source: play.google.com
Source: https://kratikal.com/blog/clipboard-hijacking-can-turn-your-copied-text-into-a-threat/
Source: https://www.alchemy.com/best/blockchain-auditing-companies
Source: coindesk.com
This incident not only resulted in significant financial losses for Bybit but also raised broader concerns about trust and security within the crypto industry. Looking ahead, exchanges, project teams, and users must place a stronger emphasis on robust security practices. Key areas of focus should include private key management, the implementation of multi-signature wallets, and thorough smart contract audits.
As cyber threats become more sophisticated, global regulatory bodies are expected to introduce stricter security requirements. The Financial Action Task Force (FATF), for example, is advancing new anti-money laundering proposals that target cross-chain protocols to enhance oversight of decentralized platforms and multi-chain interactions. In parallel, agencies such as the U.S. SEC and European regulators may increase scrutiny of exchange security standards and advocate for tighter KYC and AML compliance measures.
For individual investors, protecting digital assets calls for a proactive approach. This includes choosing platforms with strong security records, diversifying asset storage methods, and staying informed about emerging risks. As the crypto ecosystem continues to evolve, security must remain a core priority to ensure sustainable growth and user confidence.
On the evening of February 21, 2025, global cryptocurrency exchange Bybit experienced the largest hack in the crypto industry’s history. During the breach, more than 500,000 ETH, stETH, and mETH were drained from Bybit’s wallets, with the total loss exceeding $1.46 billion based on that day’s market prices. The stolen assets were quickly moved to unidentified wallet addresses. This attack surpassed the 2021 Poly Network breach, which saw $611 million stolen, making it the most significant crypto theft.
Source: https://www.ic3.gov/PSA/2025/PSA250226
Source: https://x.com/benbybit/status/1894768736084885929
Founded in 2018, Bybit is one of the largest cryptocurrency exchanges in the world, with an average daily trading volume exceeding $36 billion. According to CoinMarketCap, Bybit held approximately $16.2 billion in assets before the hack, meaning the stolen Ethereum accounted for around 9% of its total holdings.
On-chain analyst ZachXBT provided evidence suggesting that the hack was likely carried out by the North Korea-linked hacking group Lazarus Group. He received a $30,000 bounty for his investigation into the vulnerability.
Source: https://www.chainabuse.com/report/b87c8824-8f5c-434a-a595-b7b916f641ad
The Hack
The attackers used a spoofed user interface (UI) to infiltrate the computer of a Safe (wallet provider) employee, specifically targeting the front end of Bybit’s Safe system. By mimicking a legitimate user interface, the hackers could compromise Bybit’s ETH multi-signature cold wallet. The hackers stealthily altered the transaction content during what appeared to be a normal transaction process.
Since the signers believed they were authorizing a legitimate transaction, they failed to detect that it had been replaced with a malicious contract. This resulted in the unauthorized transfer of $1.46 billion worth of ETH to unknown addresses controlled by the attackers.
Attack Workflow, Methods, and Defense:
Fund Movement and Money Laundering
Between 3:00 PM and 4:30 PM on February 21, 2025, the hackers completed the majority of fund transfers. After the attack, only about $3 million worth of ETH remained in the primary wallet. The stolen ETH was divided into 40 transactions of 10,000 ETH each, while the stETH and mETH were distributed to multiple different wallets to obscure the fund trail. Subsequently, the hackers used decentralized exchanges (DEXs) to further fragment and launder the funds, aiming to erase all traces.
Market Impact
Even before Bybit officially confirmed the hack, both BTC and ETH prices began to fall. Within hours of the announcement, Bitcoin dropped by 3%, while Ethereum fell by 7%.
Over the weekend, ETH rebounded to $2,800 following a buyback initiated by Bybit, but slipped again by Monday. The hacker has now become the 14th largest ETH holder, and such a concentration of funds may put downward pressure on Ethereum’s market outlook.
Source: https://x.com/Bybit_Official/status/1893585578706227545
Controversy Over Cross-Chain Protocols
Lazarus Group frequently uses cross-chain exchange protocols like THORChain to convert stolen assets into Bitcoin. THORChain facilitates direct swaps between different blockchains, such as ETH to BTC, without going through centralized exchanges.
According to THORChain Explorer, the protocol’s 24-hour volume on March 5 reached $93 million. Developers behind the protocol have faced harsh criticism for allegedly enabling illicit transactions by North Korean hackers.
Source: https://thorchain.net/dashboard
Lazarus Group is one of the most active and notorious hacking organizations globally. The name “Lazarus” comes from the biblical figure brought back to life, symbolizing resilience and resurgence.
Also referred to as “Guardians,” “Peace,” or the “Whois Team,” the group’s membership and internal structure remain largely unknown. However, it is widely believed to operate under the direct control of the North Korean government. Initially functioning as a cybercriminal gang, Lazarus has evolved over time due to the scale and sophistication of its attacks. It is now considered an Advanced Persistent Threat (APT) group.
Different institutions refer to Lazarus by various names:
According to former North Korean intelligence officer Kim Kuk-song, the group is known internally in North Korea as the 414 Liaison Office.
The U.S. Department of Justice has stated that Lazarus Group operates as an extension of the North Korean state. Its activities go beyond cyber disruption and include efforts to bypass international sanctions and generate illicit revenue. By carrying out low-cost, high-impact cyberattacks, North Korea can deploy small teams of hackers that pose significant threats to global financial systems and critical infrastructure, particularly in South Korea and Western countries.
Source: https://en.wikipedia.org/wiki/Lazarus_Group
Lazarus Group is primarily composed of two branches:
Also known as APT38, Stardust Chollima, or BeagleBoyz, BlueNorOff focuses on financial cybercrime, often involving fraudulent SWIFT transactions to move funds illegally. The group has targeted financial institutions in various countries, with the stolen funds believed to support North Korea’s missile and nuclear weapons programs.
Their most infamous operation occurred in 2016, when they attempted to steal nearly $1 billion through the SWIFT network. A spelling error in one of the instructions prevented the Federal Reserve Bank of New York from completing part of the transfers. BlueNorOff uses tactics such as phishing, backdoors, exploits, and malware (e.g., DarkComet, WannaCry). They also collaborate with other cybercriminal groups to expand illicit money channels, increasing global cybersecurity risks.
Also known as “Silent Chollima,” “Dark Seoul,” “Rifle,” and “Wassonite,” Andariel specializes in cyberattacks targeting South Korea, and is known for its stealthy operations. According to a 2020 report from the U.S. Army, the group consists of approximately 1,600 members responsible for cyber reconnaissance, vulnerability assessments, and mapping enemy network infrastructures to prepare for future attacks.
Besides targeting South Korea, Andariel has also launched attacks on government agencies, critical infrastructure, and corporations in other countries.
Source: https://home.treasury.gov/news/press-releases/sm774
Over the years, Lazarus Group has launched a series of cyberattacks worldwide. Starting with early DDoS campaigns like Operation Troy (2009) and Ten Days of Rain (2011), they have evolved into more complex operations involving:
Since 2017, the group has heavily targeted the cryptocurrency sector, launching attacks on:
Their campaigns have stolen billions of dollars worth of digital assets.
In recent years, Lazarus has continued to expand into new sectors, including healthcare, cybersecurity, and online gambling. In 2023 alone, the group caused approximately $300 million in losses, accounting for 17.6% of all global hacking damages.
Source: https://x.com/Cointelegraph/status/1894180646584516772
Crypto exchanges typically adopt a comprehensive security strategy based on four key pillars: prevention, detection, incident response, and recovery.
Source: demo.chainalysis.com
Emergency Funds: Establish emergency funds such as Gate.io’s SAFU (Secure Asset Fund for Users) to protect user assets during critical incidents.
As of March 5, 2025, Gate.io’s reserve fund stood at $10.328 billion, underscoring its financial strength and user protection capabilities.
Source: www.gate.io
Source: https://www.gate.io/safu-user-assets-security-fund
The cornerstone of a crypto platform’s cybersecurity lies in the principle:
“Prevention first, timely detection, efficient response, and strong recovery.”
Platforms can maximize user asset protection by combining optimized security architecture, on-chain analysis, and rapid response mechanisms.
Cryptocurrencies are entirely digital, and once lost or stolen, recovery is usually impossible through traditional means (e.g., banks). Therefore, taking strict security precautions is essential. Below are the core strategies for safeguarding your crypto assets:
Cold Storage:
Hot Wallets:
Source: https://metamask.io/
Source: play.google.com
Source: https://kratikal.com/blog/clipboard-hijacking-can-turn-your-copied-text-into-a-threat/
Source: https://www.alchemy.com/best/blockchain-auditing-companies
Source: coindesk.com
This incident not only resulted in significant financial losses for Bybit but also raised broader concerns about trust and security within the crypto industry. Looking ahead, exchanges, project teams, and users must place a stronger emphasis on robust security practices. Key areas of focus should include private key management, the implementation of multi-signature wallets, and thorough smart contract audits.
As cyber threats become more sophisticated, global regulatory bodies are expected to introduce stricter security requirements. The Financial Action Task Force (FATF), for example, is advancing new anti-money laundering proposals that target cross-chain protocols to enhance oversight of decentralized platforms and multi-chain interactions. In parallel, agencies such as the U.S. SEC and European regulators may increase scrutiny of exchange security standards and advocate for tighter KYC and AML compliance measures.
For individual investors, protecting digital assets calls for a proactive approach. This includes choosing platforms with strong security records, diversifying asset storage methods, and staying informed about emerging risks. As the crypto ecosystem continues to evolve, security must remain a core priority to ensure sustainable growth and user confidence.