Skip to content
Request a Demo

Bybit suffered the largest crypto hack in history, losing $1.5 billion in Ethereum. The attack exploited vulnerabilities in wallet infrastructure, prompting urgent discussions on security, risk management, and fund recovery. Amberdata’s blockchain intelligence is key in forensic investigations, helping track stolen assets and mitigate future threats. Learn all about the larget crypto hack in history:

Introduction

On February 21st, 2025, Bybit, a cryptocurrency exchange based in Dubai, experienced a significant security breach resulting in the theft of approximately $1.5 billion in virtual assets, primarily Ethereum. This incident is considered the largest cryptocurrency theft to date.

The hack sent shockwaves across the crypto industry, raising urgent concerns about security, risk management, and fund recovery. As blockchain crimes grow increasingly sophisticated, the ability to track, analyze, and mitigate the impact of such attacks is crucial.

Amberdata provides institutional-grade blockchain intelligence to help uncover critical details and assist in forensic investigations. Its comprehensive on-chain data solution is designed for institutions, developers, and enterprises looking to access real-time and historical blockchain data, analytics, and insights. Our platform supports a wide range of use cases, including DeFi analytics, trading strategies, risk management, and compliance.

Details of the Hack

The attackers gained control of an Ethereum wallet used by Bybit and transferred around 401,000 Ether to unidentified addresses.

The Federal Bureau of Investigation (FBI) has attributed this theft to North Korea-linked hacking groups, specifically the Lazarus Group, also known as TraderTraitor. These groups have a history of targeting cryptocurrency platforms to fund North Korea's nuclear weapons program.

Immediate Aftermath and Response

Following the breach, Bybit's CEO, Ben Zhou, assured users that the exchange remained solvent and that all client assets were backed 1:1. The company secured emergency funding, obtaining approximately 447,000 Ether from firms such as Galaxy Digital, FalconX, and Wintermute, to replenish its reserves within 72 hours.

Industry Impact

This unprecedented hack has raised concerns about security within the cryptocurrency industry. The incident led to a decline in the prices of major cryptocurrencies, including Bitcoin and Ethereum, and prompted increased regulatory scrutiny. The FBI has urged the private sector to assist in blocking transactions associated with the stolen assets to prevent further laundering efforts by the perpetrators.

Technical Deep Dive

The hack involved a sophisticated supply chain attack targeting the Safe{Wallet} infrastructure. Here's a detailed breakdown of the exploit:

Technical Details of the Exploit

  • Supply Chain Compromise: The attackers infiltrated the Safe{Wallet} infrastructure by compromising a developer's machine. This breach allowed them to inject malicious code into the wallet's interface, which Bybit utilized for managing its cold storage.
  • Phishing and Social Engineering: Leveraging the compromised interface, the attackers executed a phishing campaign that deceived Bybit's wallet signers. The malicious interface presented seemingly legitimate transactions, leading signers to authorize them without detecting the embedded malicious code.
  • Unauthorized Contract Upgrade: With the obtained signatures, the attackers replaced Bybit's multi-signature wallet implementation contract with a malicious version. This unauthorized upgrade granted them full control over the wallet, enabling the transfer of approximately $1.5 billion in Ethereum and other assets to addresses under their control.

Impacted Wallet Addresses

Bybit's Multisig Cold Wallet (Victim)

0x1db92e2eebc8e0c075a02bea49a2935bcd2dfcf4

Attacker's Address

0x0fa09c3a328792253f8dee7116848723b72a6d2e

Malicious Implementation Contract

0xbdd077f651ebe7f7b3ce16fe5f2b025be2969516

Attack Contract Used in Delegate Call

0x96221423681A6d52E184D440a8eFCEbB105C7242

This incident underscores the critical importance of securing the entire supply chain in cryptocurrency operations. Even with robust on-chain security measures, vulnerabilities in third-party tools and interfaces can be exploited, leading to significant breaches.

Initial Attack - Draining the funds

The exploit was executed by the following transaction, where 401,346 ETH were drained out of the Bybit cold wallet during regular maintenance operations:

0xb61413c495fdad6114a7aa863a00b2e3c28945979a10885b12b30316ea9f072c

Etherscan Bybiy address exploiter cold wallet

Source: Etherscan

This transaction resulted in the theft of approximately $1.5 billion in virtual assets, primarily Ethereum (ETH - $1.1 Billion) and a few other digital assets like stETH, cmETH and mETH (~ $324 Million):

Transaction Hashs Ethereum (ETH - $1.1 Billion) and a few other digital assets like stETH, cmETH and mETH (~ $324 Million): Amberdata

Source: Amberdata

Amberdata API - Drained Funds (USD) Ethereum ETH, stETH, cmETH, and mETH.

Source: Amberdata

Post Hack - Fund Laundering

Here are a few of the Money Laundering Techniques employed:

  • Initial Transfer: Upon gaining control of Bybit's Ethereum multisignature cold wallet, the attackers swiftly transferred the stolen assets to an unidentified address.
  • Conversion to Other Cryptocurrencies: The hackers began converting portions of the stolen Ethereum into Bitcoin and other virtual currencies. This strategy aimed to obfuscate the origin of the funds and facilitate their movement across different blockchain networks.
  • Utilization of Mixing Services: To further obscure the transaction trail, over 5,000 ETH were routed through the eXch mixer—a service designed to mask wallet addresses. This process complicates the tracking of funds by blending them with other transactions.
  • Cross-Chain Swaps: The laundered funds were then moved to cross-chain bridge protocols, such as ChainFlip, where they were converted into Bitcoin. This cross-chain activity makes it more challenging to trace the assets as they traverse multiple blockchain platforms.
  • Dispersal Across Multiple Addresses: The converted assets were distributed across numerous blockchain addresses, a tactic intended to further complicate tracking efforts and hinder recovery attempts.

This laundering process has been very methodical and most likely executed in an automated fashion:

  • The initial funds were transferred out of the attacker’s original wallet in tranches of exactly 10k Ether
  • In about 1 hour, all the funds had been transferred out through 40 different transactions, leaving the original wallet with just ~1,346 Ether or $3,072,635 at today’s current price

Transfers in Ethereum (ETH) and value transferred

Source: Amberdata

Source: Amberdata - Wallet Funds of ETH

Source: Amberdata

The ramifications of the laundering process are far reaching, and a lot of wallets have been tainted by this attack. As previously mentioned, the original attackers’ wallet address was syphoned to 41 different secondary wallets, which in turn have been emptied to different degrees into new wallets, and this process is repeated multiple times.

Extensive graph analysis yield the following results (only the first 7 levels are shown):

Extensive graph analysis yield the following results (only the first 7 levels are shown):

Source: Amberdata

Level here means the level of interaction from the attacker’s original wallet:

  • Level 1 refers to the wallets which received funds from the original wallet
  • Level 2 refers to the wallets which received funds from the level 1 wallets
  • Etc

In just 7 levels, over 150k wallets have been implicated in the dissemination of the funds.

While this attack is one of the biggest in the industry, the attacker has not been able to launder all the funds yet. The wallets and flows of funds are being very carefully monitored and investigated, making it more difficult for them to be laundered, while some entities like Gate.io, Kucoin or Bridgers have stepped up and frozen some of the stolen assets.

Out of the original ~400k Ether, about a third are still sitting in the level 1 wallets.

Out of the original ~400k Ether, about a third are still sitting in the level 1 wallets. Address and Value of ETH

Source: Amberdata

Ethereum Bybit hack value in ETH, number of wallets and number of wallets > 1000 ETH

Source: Amberdata

In response to the Bybit hack, the exchange has launched a bounty program offering a 10% reward for any successfully frozen or recovered assets. This initiative is designed to engage blockchain investigators and independent analysts, enhancing efforts to track laundering networks. It reflects a growing industry trend where exchanges and security firms use financial incentives to crowdsource investigations and improve real-time tracking of illicit activities.

Conclusion

The Bybit hack highlights the critical need for robust blockchain intelligence to combat cyber threats. Amberdata provides the on-chain visibility, forensic tools, and risk management solutions required to track, analyze, and mitigate the impact of such attacks.

By leveraging real-time blockchain monitoring, historical analytics, and compliance intelligence, Amberdata empowers exchanges, regulators, and security teams to take swift action, recover stolen assets, and enhance future security measures.

For organizations looking to fortify their defenses against crypto exploits, Amberdata’s institutional-grade blockchain data solutions are an essential tool in the fight against digital asset crime.

Interested in learning more about how Amberdata can assist in crypto investigations? Contact us today.

Digital Asset Market Intelligence Report

Joanes Espanol

Joanes Espanol is Co-founder and CDO of Amberdata. Prior to founding Amberdata, Joanes architected large-scale data ingestion pipelines and analytics platforms. He has extensive experience building scale-out data infrastructure and highly available systems for digital marketing attribution, analytics, and reporting...

Amberdata Blog

View All Posts