Ta strona służy wyłącznie do celów informacyjnych. Niektóre usługi i funkcje mogą nie być dostępne w jurysdykcji użytkownika.

ETH Heist: How $1.5 Billion Was Stolen in the Largest Crypto Hack Ever

The Largest ETH Heist in History: What Happened?

On February 21, 2025, the cryptocurrency world witnessed the largest Ethereum (ETH) heist in history. Hackers successfully stole an estimated $1.4–$1.5 billion worth of ETH from the Bybit cryptocurrency exchange. This unprecedented breach exploited vulnerabilities in cold wallet storage, a method previously considered one of the most secure ways to safeguard digital assets.

This incident has raised critical questions about the security of crypto platforms and highlighted the growing sophistication of cyberattacks targeting the industry. Below is a detailed analysis of how the hack unfolded, its implications, and the lessons it offers for the future of cryptocurrency security.

How Hackers Exploited Safe{Wallet}'s Multisig Process

The attack targeted Safe{Wallet}, a third-party wallet provider utilized by Bybit. Safe{Wallet} employed a multisignature (multisig) approval process, which is designed to enhance security by requiring multiple approvals for transactions. However, the hackers identified and exploited vulnerabilities in this system.

By manipulating the multisig process, the attackers altered the underlying smart contract logic while displaying legitimate transaction details on the user interface (UI). This deceptive tactic allowed them to bypass security protocols and gain unauthorized access to Bybit’s cold wallet, which held a significant amount of ETH.

Who Was Behind the Attack? The Role of the Lazarus Group

The North Korean Lazarus Group, a state-sponsored hacking organization, has been identified as the primary perpetrator of this attack. Known for their history of targeting cryptocurrency platforms, the Lazarus Group has been linked to several high-profile cybercrimes. Their activities are believed to fund North Korea’s weapons programs, making this heist not only a financial crime but also a geopolitical concern.

How the Stolen ETH Was Laundered

Once the hackers gained access to the funds, they employed sophisticated laundering techniques to obscure the origins of the stolen ETH. The process involved multiple steps:

  • Decentralized Exchanges (DEXs): The hackers used DEXs to swap ETH for other cryptocurrencies, bypassing centralized intermediaries.

  • Mixers: Cryptocurrency mixers were employed to obfuscate transaction trails, making it difficult to trace the stolen funds.

  • Cross-Chain Bridges: These tools facilitated the transfer of assets across different blockchain networks, further complicating tracking efforts.

  • Peer-to-Peer (P2P) Platforms: Direct transactions with other users helped convert the stolen ETH into Bitcoin (BTC) and fiat currency.

Despite efforts by blockchain forensic experts to trace the funds, the rapid and sophisticated laundering process has made recovery increasingly challenging.

Bybit’s Response to the Hack

In response to the attack, Bybit CEO Ben Zhou assured users that the exchange remains solvent. He pledged to cover any unrecovered funds using the company’s treasury, ensuring that user assets would not be affected. This proactive approach aimed to restore user confidence and mitigate potential fallout from the incident.

Security Vulnerabilities in Cold Wallets and Multisig Systems

The hack has shattered the perception that cold wallets are immune to cyberattacks. While cold wallets are offline storage solutions designed to protect assets from online threats, this incident revealed that vulnerabilities in associated systems, such as multisig processes, can still be exploited.

Key vulnerabilities exposed by the attack include:

  • Manipulation of Smart Contracts: The ability to alter contract logic without detection.

  • UI Deception: Displaying legitimate transaction details while executing malicious actions.

  • Lack of Pre-Signing Simulations: Insufficient validation of transactions before approval.

Recommendations for Improving Crypto Security

To prevent similar breaches in the future, the cryptocurrency industry must adopt more robust security measures. Key recommendations include:

  • Pre-Signing Simulations: Simulating transactions before approval to detect anomalies.

  • Raw Transaction Validation: Verifying the actual transaction data rather than relying solely on the UI.

  • Off-Chain Validation: Implementing additional layers of verification outside the blockchain.

  • Employee Training: Educating employees on security best practices to reduce human error.

The Need for International Collaboration and Regulation

The Bybit hack has reignited discussions about the need for stronger regulatory frameworks and international collaboration to combat crypto-related cybercrime. Key areas of focus include:

  • Global Security Standards: Establishing industry-wide protocols to enhance platform security.

  • Cross-Border Cooperation: Facilitating information sharing and joint investigations between countries.

  • Regulatory Oversight: Implementing measures to hold platforms accountable for security lapses.

Broader Implications of Crypto Thefts

The implications of this heist extend beyond the cryptocurrency industry. The use of stolen funds to finance geopolitical activities, such as North Korea’s weapons programs, underscores the broader security risks posed by crypto thefts. Additionally, the incident highlights the urgent need for greater awareness and education within the industry to address emerging threats.

Conclusion

The $1.5 billion ETH heist serves as a wake-up call for the cryptocurrency industry. It underscores the importance of continuous innovation in security measures and the need for global collaboration to combat increasingly sophisticated cyberattacks. While the stolen funds may be difficult to recover, the lessons learned from this incident could pave the way for a more secure and resilient crypto ecosystem in the future.

Wyłączenie odpowiedzialności
Niniejsza treść ma charakter wyłącznie informacyjny i może obejmować produkty niedostępne w Twoim regionie. Nie ma na celu zapewnienia (i) porady inwestycyjnej lub rekomendacji inwestycyjnej; (ii) oferty lub zachęty do kupna, sprzedaży lub posiadania kryptowalut/aktywów cyfrowych lub (iii) doradztwa finansowego, księgowego, prawnego lub podatkowego. Posiadanie aktywów cyfrowych, w tym stablecoinów, wiąże się z wysokim stopniem ryzyka i może podlegać znacznym wahaniom. Musisz dokładnie rozważyć, czy handel lub posiadanie kryptowalut/aktywów cyfrowych jest dla Ciebie odpowiednie w świetle Twojej sytuacji finansowej. W przypadku pytań dotyczących konkretnej sytuacji skonsultuj się ze swoim doradcą prawnym, podatkowym lub specjalistą ds. inwestycji. Informacje (w tym dane rynkowe i informacje statystyczne, jeśli występują) zawarte w tym poście służą wyłącznie ogólnym celom informacyjnym. Podczas przygotowywania tych danych i wykresów dołożono należytej staranności, jednak nie ponosimy odpowiedzialności za żadne błędy lub pominięcia w niniejszym dokumencie.

© 2025 OKX. Niniejszy artykuł może być powielany lub rozpowszechniany w całości, a także można wykorzystywać jego fragmenty liczące do 100 słów, pod warunkiem że takie wykorzystanie ma charakter niekomercyjny. Każde powielanie lub rozpowszechnianie całego artykułu musi również zawierać wyraźne stwierdzenie: „Ten artykuł jest © 2025 OKX i jest używany za zgodą”. Dozwolone fragmenty muszą odnosić się do nazwy artykułu i zawierać przypis, na przykład „Nazwa artykułu, [nazwisko autora, jeśli dotyczy], © 2025 OKX”. Niektóre treści mogą być generowane lub wspierane przez narzędzia sztucznej inteligencji (AI). Nie są dozwolone żadne prace pochodne ani inne sposoby wykorzystania tego artykułu.