CYBERSECURITY BRIEFING · FEBRUARY 2025

THE $1.5B
BYBIT HEIST

How North Korea's Lazarus Group Pulled Off
the Largest Cryptocurrency Theft in History

THREAT ACTOR: LAZARUS GROUP (DPRK)
DATE: FEBRUARY 21, 2025
SECTOR: CRYPTOCURRENCY / FINTECH
01 / 08
INCIDENT OVERVIEW

What Happened

On February 21, 2025, Bybit — a Dubai-based cryptocurrency exchange — suffered the single largest crypto theft in history. Attackers silently redirected a routine cold-to-hot wallet transfer, draining 401,347 ETH worth approximately $1.5 billion USD.

Bybit CEO Ben Zhou confirmed the breach in real time on X (Twitter), assuring users the exchange remained solvent. Within 72 hours, emergency funding of ~447,000 ETH was secured from Galaxy Digital, FalconX, and Wintermute to replenish reserves.

The FBI and blockchain intelligence firms TRM Labs, Chainalysis, and Elliptic attributed the attack to North Korea's Lazarus Group (also known as TraderTraitor) — a state-sponsored APT collective that funds Pyongyang's nuclear weapons program through cybercrime.

$1.5B
Total Stolen
401K
ETH Drained
23 min
To First Laundering
$160M
Laundered in 48hrs
02 / 08
TECHNICAL ANALYSIS

Attack Vector

Supply Chain Compromise

Attackers targeted Safe{Wallet} — the third-party smart contract wallet platform used by Bybit — rather than attacking Bybit's own infrastructure directly.

🎣

Social Engineering / Phishing

A Safe{Wallet} developer's macOS workstation was compromised via a malicious Python app delivered through Telegram or Discord social engineering.

💉

Malicious JS Injection

Attackers injected malicious JavaScript into Safe{Wallet}'s statically hosted Next.js frontend at app.safe.global, silently replacing transaction destination addresses.

🔑

Credential & Token Theft

Stolen AWS session tokens gave attackers access to Safe{Wallet}'s cloud environment. A YAML policy file was tampered with — unsigned and undetected.

🕶

UI Spoofing / Blind Signing

The malicious UI displayed a legitimate-looking transaction to Bybit's multi-sig signers, who unknowingly approved the fraudulent transfer — turning security into a liability.

🌀

Crypto Laundering

Funds were funneled through Tornado Cash mixers, DEXs, cross-chain bridges, and P2P vendors. 86.29% of stolen ETH was converted to BTC within weeks.

03 / 08
KILL CHAIN

Attack Flow

01
Early Feb 2025

Infrastructure Setup

Lazarus registers C2 domain getstockprice[.]com. Malicious Docker image prepared.

02
Feb 4–10, 2025

Developer Compromise

Safe{Wallet} Developer1's macOS workstation infected via social engineering on Telegram/Discord. AWS session tokens stolen.

03
Feb 11–18, 2025

Reconnaissance & Persistence

Attackers enumerate IAM roles, S3 buckets, cloud assets. Attempt to register virtual MFA device. YAML policy file silently tampered.

04
Feb 19, 2025

Malicious JS Deployed

Malicious JavaScript injected into Safe{Wallet}'s Next.js frontend. Code targets only Bybit wallets — replacing recipient addresses in real time.

05
Feb 21, 2025

Execution — $1.5B Drained

Bybit operators initiate routine cold→hot wallet transfer. Multi-sig signers approve what appears legitimate. 401,347 ETH redirected to attacker wallets.

06
Feb 21 – Mar 2025

Laundering & Obfuscation

Funds split across hundreds of wallets. Tornado Cash mixers, DEXs, cross-chain bridges used. 86.29% converted to BTC. Malicious JS scrubbed from site.

04 / 08
POST-MORTEM

Root Causes

01

Third-Party Trust Without Verification

Bybit implicitly trusted Safe{Wallet}'s frontend without independently verifying the integrity of the JavaScript served at runtime. No cryptographic hash checks were performed on the UI code before signing.

02

Unsigned CI/CD Pipeline Policies

Safe{Wallet}'s deployment pipeline lacked mandatory code-signing on YAML policy files. The tampered configuration left no cryptographic signature or audit-log entry — evading all routine integrity checks.

03

Multi-Sig ≠ Multi-Layer Security

Multi-signature protocols only protect against key compromise — not UI-layer manipulation. When the interface itself is poisoned, all signers become unwitting accomplices regardless of quorum size.

04

Single Developer Workstation as Entry Point

One compromised macOS device gave attackers a foothold into Safe{Wallet}'s entire cloud environment. No endpoint isolation or privileged access workstation (PAW) policy was enforced.

05

Insufficient Transaction Verification UX

Hardware wallet signing interfaces did not display the actual on-chain transaction data in a human-readable, verifiable format — enabling "blind signing" where operators approved without seeing true details.

06

State-Sponsored APT Sophistication

Lazarus Group operated with nation-state resources, patience (weeks of reconnaissance), and precision targeting — exploiting the human-machine trust relationship rather than brute-forcing cryptography.

05 / 08
DEFENSE FRAMEWORK

Prevention Strategies

🔐

Verify Transaction Data On-Device

Always verify the actual on-chain destination address and amount on the hardware wallet's own trusted display — never rely solely on the browser UI.

OPERATIONAL
🧾

Sign & Hash All Deployment Artifacts

Enforce cryptographic signing on all CI/CD pipeline files, YAML configs, and frontend bundles. Implement Subresource Integrity (SRI) checks on all loaded scripts.

TECHNICAL
🏝

Privileged Access Workstations (PAW)

Isolate developer machines that have access to production signing keys and cloud credentials. No social media, messaging apps, or untrusted software on PAWs.

INFRASTRUCTURE
🔍

Supply Chain Security Audits

Continuously audit all third-party dependencies, SDKs, and wallet infrastructure. Treat every external library as a potential attack surface. Use SBOM (Software Bill of Materials).

GOVERNANCE
👁

Real-Time Anomaly Detection

Deploy blockchain analytics and on-chain monitoring to flag unusual transaction patterns, unexpected destination addresses, or abnormal transfer volumes before signing.

MONITORING
🎓

Social Engineering Awareness Training

Train all developers and operators on spear-phishing, fake job offers, and Telegram/Discord-based lures — the primary initial access vector used by Lazarus Group globally.

HUMAN
🔄

4-Eyes Approval on Policy Changes

Require dual-control (two independent approvers) for any changes to wallet policies, deployment configurations, or access control rules — eliminating single points of failure.

PROCESS
🌐

Zero Trust Architecture

Never implicitly trust any internal or external service. Enforce least-privilege access, micro-segmentation, and continuous authentication across all systems and APIs.

ARCHITECTURE
06 / 08
LESSONS LEARNED

Key Takeaways

"Multi-sig is not a silver bullet. When the interface is compromised, every signer becomes an unwitting attacker."
Supply chain is the new perimeter. Attackers no longer need to breach your systems — they breach the tools your systems trust.
State-sponsored APTs are patient and precise. Lazarus spent weeks in reconnaissance before executing a 23-minute heist. Defenders must assume long dwell times.
Human trust is the ultimate vulnerability. No amount of cryptographic security prevents blind signing when operators trust what they see on screen.
Crypto laundering is industrialized. $160M was laundered within 48 hours using mixers, DEXs, and bridges — making recovery nearly impossible without global coordination.
Incident response speed matters. Bybit's rapid public communication and emergency liquidity sourcing prevented a full market panic — a model for crisis management.
This attack will be replicated. The Bybit playbook — supply chain + UI spoofing + blind signing — is now a proven template for future nation-state crypto heists.
07 / 08
CONCLUSION

The Era of Operational Security Failures Has Arrived

The Bybit hack is not just a cryptocurrency story — it is a watershed moment for all of cybersecurity. It demonstrates that even organizations with robust cryptographic controls, multi-signature protocols, and cold storage can be defeated when attackers target the human-machine trust layer.

As AI-powered social engineering, supply chain attacks, and state-sponsored APTs converge, the security industry must evolve from perimeter defense to zero-trust, end-to-end verification at every layer — from developer workstations to transaction signing interfaces.

🔗
Audit your supply chain dependencies today
Implement on-device transaction verification
🛡
Train your team against social engineering
08 / 08