Skip to content

Bybit Hack Traced Back to Weakness in Secure Wallet Framework

Bybit's security breach allegedly occurred via Safe Wallet's infrastructure, not the trading platform's internal systems, preliminary reports suggest.

Bybit's attack was executed via Safe Wallet's infrastructure, as opposed to the trading platform's...
Bybit's attack was executed via Safe Wallet's infrastructure, as opposed to the trading platform's own system, allegedly.

Bybit Hack Traced Back to Weakness in Secure Wallet Framework

Bybit's Brutal Breach: Exposed Due to Unseen Vulnerabilities in Safe Wallet

The notorious hack on Bybit wasn't an inside job, but rather a sneaky exploit of Safe Wallet's infrastructure. A preliminary forensic report concluded this, leaving Bybit's systems untouched and the investigation ongoing.

Introduction to the Nightmare

Bybit's nightmare began when hackers, trailed by North Korea's Lazarus Group, infiltrated the Safewallet infrastructure. The attack commenced with a cleverly crafted phishing campaign, targeting a developer's machine connected to Safe Wallet.

The Master Plan

With control over the system in hand, the attackers zoned in on the AWS S3 bucket hosting Safewallet's UI. They cunningly injected malicious JavaScript, and it stayed under the radar, waiting to spring into action.

When Bybit employees engaged with the compromised Safewallet UI, the hidden JavaScript came alive. Displaying deceptive transaction data, it tricked Bybit's multisig signers, including the CEO, into authorizing a transaction that corrupted their smart contract.

The Malicious Deployment

Replacing the genuine smart contract with a mischievous one, the attackers added functions that allowed them to escape the multisig approval requirements and siphon funds from the wallet. In just a blink, they made off with approximately 400,000 Ethereum tokens valued at roughly $1.5 billion.

Footsteps of the Phantom

Apparently, the hackers erased their digital tracks by replacing the modified files with the original ones just two minutes after the theft. Despite this, the fingerprints of the attack could still be noticed, lingering in the cache files on the devices of three transaction signers from February 19th. Even web archives like the Wayback Machine documented alterations to Safewallet's infrastructure code.

Closing Words

While the investigation continues, it seems that the root cause of the attack emerged from the Safewallet infrastructure. Symptoms of the hack didn't manifest within Bybit's systems. Long story short, the hackers played Bybit like a fiddle, and the only question that remains is, who's next?

Adam Back, the legendary cypherpunk, had already pointed the finger at the supposed poor EVM design. By the 26th of February, hackers had silently laundered $335 million worth of ETH.

[1] https://www.cybersecurityintelligence.com/news/bybit-hack-north-korean-lazarus-group-suspected-of-exploiting-safe-wallet-infrastructure-oud-2025-02-26/[5] https://www.coindesk.com/markets/2023/02/25/hackers-exploit-vulnerability-in-safewallets-ethereum-multisig-wallet-to-drain-400k-eth-worth-1-5b/

The cyber attack on Bybit's Safewallet, orchestrated by the North Korean Lazarus Group, highlighted the vulnerabilities in the industry's financial technology, specifically in the realm of cybersecurity. The attackers managed to bypass security measures, illustrating the need for more robust solutions in the ever-evolving technology landscape.

In light of these events, there is a pressing need for increased collaboration between finance, technology, and cybersecurity sectors to fortify system defenses and prevent future attacks that could potentially target other players in the industry.

Read also:

    Latest