Live
Loading prices…
CoinHub Today · coinhubtoday.com
CoinHub Today · Security

Bybit, One Year Later: How the $1.5B Heist Reshaped Crypto Security

The largest crypto theft in history forced a rare moment of unanimity across exchanges, custodians, wallet providers and regulators. A year in, the defensive architecture looks very different — and the attackers haven’t stopped improving either.

SecurityInstitutionalLazarus GroupCoinHub Today Research DeskApril 8, 20268 min read

A year and two months after the single largest crypto theft in history, the industry that emerged on the other side of the Bybit incident is measurably safer than the one that walked into it. It is also, by every reasonable metric, still not safe enough.

$1.5B
Stolen — Feb 21, 2025
$0
User losses (fully absorbed)
5x
MPC custody signups since Q4 2024
$42M
Recovered / frozen (<3% of total)
MetricValue
Date of incidentFebruary 21, 2025
Stolen~401,000 ETH (~$1.5B)
AttackerNorth Korea’s Lazarus Group (TraderTraitor)
VectorMalicious JS injection into Safe wallet UI
Reserves replenishedWithin 72 hours
User losses absorbed$0 — fully reimbursed
Funds recovered / frozen~$42M (industry-wide)

The Attack and the Response

North Korean hackers compromised a developer’s laptop at Safe — the multisig wallet provider Bybit used for ETH cold-storage rotations. The attackers injected a malicious JavaScript payload into the Safe UI endpoint that Bybit’s signers used, presenting a legitimate-looking transaction on screen while the wallet actually signed a different one. In a single routine rebalancing operation, roughly 401,000 ETH moved from Bybit’s cold storage into attacker-controlled wallets.

Bybit’s CEO Ben Zhou announced publicly within two hours that the exchange would absorb the full loss and guarantee all user withdrawals. A combination of emergency loans, overnight transfers from major partners, and Bybit’s own reserves rebuilt cold-wallet balances to 1:1 backing within three days. The run on withdrawals was vicious — $4 billion in the first 24 hours — but the exchange met every one of them. That single act of competent crisis response is why Bybit still exists.

What Changed in the Year After

MPC-based custody signups across the industry’s largest providers have risen more than fivefold since Q4 2024. External smart-contract audit engagements are up 2.7x since the Bybit incident — and the scope of those engagements has broadened to cover CI/CD pipelines, deployment scripts, cloud configurations, and developer-device security.

“Multisig is not dead, but multisig-over-a-single-UI is. Every signer has to independently verify what they are signing, against a path the attacker cannot forge.”

— Michael Shaulov, CEO, Fireblocks

“We were all running around telling people the code was fine. The code was fine. That was never the whole problem, and February 21, 2025 is when the industry finally accepted it.”

— Taylor Monahan, MetaMask

What Hasn’t Changed

The total funds recovered or frozen from the Bybit incident remains around $42 million — less than 3% of what was stolen. The same TraderTraitor subunit that ran Bybit has since executed the Drift and Kelp DAO heists, each with novel tradecraft and each resulting in nine-figure losses despite the visible industry-wide hardening. The Bybit-era laundering playbook — fan-out through THORChain and eXch, consolidation in Chinese OTC networks — is still the same playbook being used today.

The April 2026 losses suggest that a large part of the industry, particularly outside the centralized-exchange segment, has not yet absorbed the lesson. Bybit made the response template. Everyone else still has to choose to apply it.

The Durable Change
Crypto’s security posture, for most of its history, has been characterized by a mix of technical excellence and operational carelessness. The Bybit incident broke that pattern. Engineers who once dismissed phishing training now lead red-team exercises. Protocols that once treated “sophisticated nation-state adversary” as an abstraction now budget for it.
Sponsored · Web3Firewall
Pre-Signature Intelligence for Crypto Operations

The attacks described in this article exploit gaps that pre-signature transaction monitoring is built to close. Web3Firewall evaluates 100+ risk signals before a transaction reaches the blockchain — enforcing policy controls at the only moment intervention is actually possible.

Reporting note: Draws on public disclosures from Chainalysis, TRM Labs, Elliptic, CertiK, Halborn, Fireblocks and Bybit. Editorial commentary; figures subject to revision.

Stay ahead with CoinHub Today

Real crypto news, market data, and analysis — free to your inbox every weekday at 7am.

No spam. Unsubscribe anytime. Sent to admin@coinhubtoday.com

CoinHub Today is an independent media organisation and does not provide investment, financial, or legal advice. All content is for educational purposes only. Cryptocurrency investments involve substantial risk. Past performance is not indicative of future results. Always consult a qualified financial adviser before investing.