The Bybit hack has officially become the largest crypto heist in history, with over $1.5 billion stolen.
That’s roughly 16% of all previous crypto hacks combined.
This wasn’t just a technical exploit, it was a masterclass in social engineering that bypassed even the most robust security measures, including multisig setups and cold wallets.
Let’s break down what happened, how it happened, and what we can learn from this incident.
The exploit was a chilling reminder that even the most secure systems can be compromised if humans are manipulated.
Here’s the play-by-play:
Blockchain sleuth ZachXBT first flagged unusual outflows from Bybit, totaling over $1.46 billion.
The attacker swapped mETH and stETH for ETH on decentralized exchanges and split 10,000 ETH across 48 different addresses to obfuscate the trail.
The hacker didn’t exploit a smart contract vulnerability, they exploited humans.
Bybit’s multisig signers were tricked into approving a fraudulent transaction.
The blame game is always tricky in these situations, but let’s break it down:
The signers were the primary target of the attack. Despite seeing what appeared to be a legitimate transaction, they were tricked into approving a malicious change to the cold wallet’s logic.
While Safe’s official frontend wasn’t compromised, the attacker was able to mimic it convincingly enough to deceive the signers.
The malware used to infect the signers’ devices played a critical role in manipulating the UI and hiding the true nature of the transaction.
Ultimately, the weakest link in the chain was human vulnerability. No amount of technical security can fully protect against sophisticated social engineering.
Bybit is now in damage control mode. Here’s what they’re doing:
Tracing the Funds:
The team is working to trace the stolen ETH. Since the funds were split across 48 addresses, recovery will be challenging but not impossible. They launched a bounty of 140M to trace & freeze funds.
Reassuring Users:
Bybit claims they’re solvent and can cover the loss. They’ve assured users that all client assets are backed 1:1 and that withdrawals are operating normally.
Strengthening Security:
This incident has been a wake-up call for Bybit. They’re likely reviewing their security protocols, especially around multisig approvals and cold wallet management.
The Bybit hack is a stark reminder of the risks in the crypto space.
Here are some key takeaways:
Multisigs Aren’t Foolproof:
Even the most robust multisig setups can be bypassed if human signers are manipulated.
Cold Wallets Aren’t Automatically Safe:
Social engineering can bypass even the best cold wallet setups.
Humans Are the Weakest Link:
No matter how secure the code is, humans remain vulnerable to manipulation.
Supply Chain Attacks Are Evolving:
Malware can manipulate trusted interfaces, making it harder to detect fraudulent transactions.
To prevent such attacks in the future, here are 10 actionable steps for securing wallets, whether they’re cold, warm, or hot:
Choosing a reputable audit firm like QuillAudits means your protocol undergoes a multi-layered security review, combining deep manual inspection by expert auditors with AI-powered analysis.
With 7+ years of experience, 1,400+ audits completed, and $30B in assets secured, we specialize in uncovering critical vulnerabilities, from logic flaws to economic exploits, and providing actionable remediation strategies.
Our comprehensive approach ensures your project isn’t just audited but fortified against evolving threats, keeping security risks in check long before attackers find them.
Your weekly dose of Web3 innovation and security, featuring blockchain updates, developer insights, curated knowledge, security resources, and hack alerts. Stay ahead in Web3!