The largest cryptocurrency hack in history, which saw $1.4 billion stolen from Bybit, has been traced to a compromised developer's laptop at self-custodial wallet provider Safe Wallet. The attack involved sophisticated social engineering and code manipulation, highlighting new vulnerabilities in crypto security protocols.
How the Hack Occurred
The investigation, conducted jointly with cybersecurity firm Mandiant, revealed that hackers compromised a Safe Wallet developer's laptop to gain access to AWS session tokens. These tokens were used to bypass multi-factor authentication controls.
The attack involved:
-
Compromise of a Safe Wallet developer's laptop (Developer1)
-
Hijacking of AWS session tokens
-
Injection of malicious JavaScript into Safe's web app code
-
Masking a malicious transaction as a benign transfer
-
Approval of a hidden transaction that changed the multisig's logic and ownership
North Korean Connection
The Federal Bureau of Investigation (FBI) has confirmed links to North Korea's Lazarus Group, also known as TraderTraitor. This state-sponsored hacking collective has been responsible for numerous high-profile crypto heists.
Aftermath and Response
Bybit CEO Ben Zhou assured users that the platform remains solvent and continues to process withdrawals normally. The exchange has implemented enhanced security measures and is working with global authorities to track the stolen funds.
Approximately $140 million of the stolen funds has already been laundered through addresses linked to North Korean operatives, according to blockchain analytics firm Elliptic.
Industry Implications
This incident has raised serious questions about the security of multi-signature wallets and cold storage solutions. Experts are calling for more robust security models that go beyond traditional cryptographic security.
Conclusion
The Bybit hack represents a new phase in cyberattacks targeting cryptocurrency exchanges. As investigations continue, the crypto industry faces pressure to adopt more advanced security protocols and improve education around phishing threats and smart contract vulnerabilities.