Executive Summary
In February 2025, Dubai-based cryptocurrency exchange Bybit suffered a significant security breach, resulting in the theft of approximately 401,000 Ethereum (ETH), valued at over $1.4 billion. The attackers exploited vulnerabilities in Bybit's multi-signature cold wallet system, facilitated by compromised infrastructure at Safe{Wallet}, a third-party provider. This incident stands as the largest cryptocurrency exchange hack to date. (en.wikipedia.org)
The breach was attributed to the North Korean state-sponsored Lazarus Group, known for their sophisticated cyber operations targeting financial institutions. The stolen funds were laundered through various channels, including privacy-focused platforms, complicating recovery efforts. (en.wikipedia.org)
Why This Matters Now
This incident underscores the escalating threat posed by state-sponsored cyber actors to the cryptocurrency sector, highlighting the urgent need for enhanced security measures and regulatory frameworks to protect digital assets.
Attack Path Analysis
In February 2025, North Korean state-sponsored hackers infiltrated Bybit's systems by compromising a developer's machine, allowing them to manipulate the Ethereum cold wallet's smart contract logic. This unauthorized access enabled the attackers to escalate privileges and alter transaction processes, facilitating the transfer of $1.5 billion in Ethereum to their own addresses. The attackers maintained control over the compromised systems to manage and obfuscate the stolen funds. They then exfiltrated the cryptocurrency through multiple obfuscation layers, including decentralized exchanges and privacy-enhancing protocols, making direct recovery challenging. The impact was significant, marking the largest cryptocurrency theft in history and severely affecting Bybit's operations and reputation.
Kill Chain Progression
Initial Compromise
Description
North Korean hackers compromised a developer's machine, gaining unauthorized access to Bybit's systems.
MITRE ATT&CK® Techniques
Acquire Infrastructure: Domains
Phishing: Spearphishing Attachment
Valid Accounts
Data Encrypted for Impact
Exfiltration Over C2 Channel
Use Alternate Authentication Material: Pass the Ticket
Application Layer Protocol: Web Protocols
Exfiltration Over Web Service: Exfiltration to Cloud Storage
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Ensure the security of cryptographic keys
Control ID: 6.4.3
NYDFS 23 NYCRR 500 – Encryption of Nonpublic Information
Control ID: 500.15
DORA – ICT Risk Management Framework
Control ID: Article 10
CISA ZTMM 2.0 – Identity and Access Management
Control ID: 3.1
NIS2 Directive – Incident Handling
Control ID: Article 21
ISO 27001 – Event Logging
Control ID: A.12.4.1
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Financial Services
Multi-vector financial crime with $158B illicit crypto flows directly threatens core banking operations, requiring enhanced egress security and encrypted traffic monitoring capabilities.
Banking/Mortgage
Record cryptocurrency laundering activities expose banking infrastructure to sanctions violations and regulatory compliance failures under PCI and NIST frameworks.
Investment Banking/Venture
Nation-state crypto activities and $2.87B in hacking losses create systemic risks for investment platforms requiring zero trust segmentation and anomaly detection.
Computer/Network Security
Ransomware fragmentation with 161 active strains and evolving cross-chain laundering demands advanced threat detection and multicloud visibility solutions for security providers.
Sources
- Crypto wallets received a record $158 billion in illicit funds last yearhttps://www.bleepingcomputer.com/news/security/crypto-wallets-received-a-record-158-billion-in-illicit-funds-last-year/Verified
- Bybit Sees Over $4 Billion ‘Bank Run’ After Crypto’s Biggest Hackhttps://www.coindesk.com/business/2025/02/22/bybit-sees-over-usd4-billion-bank-run-after-crypto-s-biggest-hackVerified
- Bybit revamps security after $1.4 billion hackhttps://cointelegraph.com/news/bybit-announces-security-overhaul-in-response-to-1-4b-hackVerified
- FBI accuses North Korean-backed hackers of stealing $1.5 billion in crypto from Dubai-based firmhttps://apnews.com/article/7c8335c1397261554138090c2c38f457Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Implementing Aviatrix Zero Trust CNSF could have significantly constrained the attacker's ability to escalate privileges, move laterally, and exfiltrate data within Bybit's cloud environment.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The attacker's initial access would likely have been limited to the compromised developer's machine, reducing the risk of further unauthorized access.
Control: Zero Trust Segmentation
Mitigation: The attacker's ability to escalate privileges and modify transaction processes would likely have been constrained, limiting unauthorized changes.
Control: East-West Traffic Security
Mitigation: The attacker's lateral movement within the network would likely have been restricted, reducing the spread of the compromise.
Control: Multicloud Visibility & Control
Mitigation: The attacker's command and control communications would likely have been detected and disrupted, hindering their ability to manage stolen funds.
Control: Egress Security & Policy Enforcement
Mitigation: The attacker's ability to exfiltrate large amounts of Ethereum would likely have been limited, reducing the scale of the theft.
The overall impact of the attack would likely have been mitigated, preserving Bybit's operational integrity and reputation.
Impact at a Glance
Affected Business Functions
- Asset Custody
- Trading Operations
- Customer Withdrawals
Estimated downtime: 3 days
Estimated loss: $1,500,000,000
n/a
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to enforce least privilege access and prevent lateral movement within the network.
- • Deploy East-West Traffic Security measures to monitor and control internal traffic, detecting unauthorized movements.
- • Utilize Multicloud Visibility & Control tools to gain comprehensive insights into network activities and identify anomalies.
- • Establish Egress Security & Policy Enforcement to control outbound traffic and prevent unauthorized data exfiltration.
- • Integrate Threat Detection & Anomaly Response systems to detect and respond to suspicious activities in real-time.



