The Bybit Heist: How North Korea Stole 1.5 Billion in 47 Minutes

bybit-heist

February 21, 2025. 12:30 PM Coordinated Universal Time.

Scene 1 illustration

Inside the operations center of Bybit — a cryptocurrency exchange headquartered in Dubai, handling tens of billions of dollars in daily trading volume — a scheduled transfer begins.

Scene 2 illustration

Four hundred one thousand three hundred forty-seven Ethereum tokens. Approximately one point five billion dollars at that moment. The transfer is routine: from Bybit's multisignature cold wallet, held offline for security, to a warm wallet used for operational liquidity.

Scene 3 illustration

Three senior Bybit employees are required to authorize the transaction. They open the Safe{Wallet} interface on their workstations. They review the destination address. They review the transaction details. Everything matches the expected operation.

Scene 4 illustration

They sign.

Scene 5 illustration

One minute later, four hundred one thousand Ethereum tokens are gone.

Scene 6 illustration

Not transferred to the warm wallet. Transferred to an address controlled by North Korea.

Scene 7 illustration

No passwords were stolen. No private keys were extracted. No credentials were phished. Bybit's own infrastructure was not compromised. The three signers did exactly what their procedures instructed them to do. What they saw on their screens, they approved.

Scene 8 illustration

What they saw on their screens was a lie.

Scene 9 illustration

This is the largest single cryptocurrency theft ever recorded. It is, by Guinness World Records classification, the largest bank heist in history — exceeding even the one billion dollars Saddam Hussein extracted from Iraq's central bank in 2003.

Scene 10 illustration

It was executed by changing a single file on a website.

Scene 11 illustration

The attack did not target Bybit directly.

Scene 12 illustration

Bybit's infrastructure — servers, employee workstations, signing hardware, internal networks — was never penetrated. Every subsequent forensic investigation, conducted by independent firms Sygnia and Verichains, confirmed the same finding. Bybit was not hacked.

Scene 13 illustration

The company that was hacked was Safe — formerly Gnosis Safe — the most widely used multisignature wallet platform in the Ethereum ecosystem. Safe maintains the web interface at app.safe.global through which most institutional Ethereum holders manage multi-party authorization of large transactions.

Scene 14 illustration

Safe's engineering team numbers approximately thirty people. Among them, a small group of system administrators have permissions to modify the live production codebase and the deployed web interface.

Scene 15 illustration

Approximately thirty days before February 21, one of those system administrators is targeted.

Scene 16 illustration

The vector is consistent with the playbook of the North Korean unit internally tracked by the Federal Bureau of Investigation as TraderTraitor. The unit is a subcomponent of the broader Lazarus Group, operating out of the Third Bureau of North Korea's Reconnaissance General Bureau.

Scene 17 illustration

The specific technique is not publicly disclosed by Safe or by investigators. Most likely: a highly targeted social engineering approach, routing through a LinkedIn contact, a developer forum, or a technical collaboration pretext. The administrator downloads what appears to be a legitimate technical artifact. The artifact contains malware.

Scene 18 illustration

The malware steals AWS session tokens. Not long-lived credentials — the temporary authentication tokens that Safe's developers use during their normal workday to access Amazon Web Services, where Safe's web interface is hosted.

Scene 19 illustration

With those tokens, the attackers gain access to Safe's AWS account.

Scene 20 illustration

They do not extract data. They do not deploy ransomware. They do not attempt lateral movement through the infrastructure.

Scene 21 illustration

They modify one JavaScript file.

Scene 22 illustration

The file served from Safe's Amazon S3 storage bucket is the frontend JavaScript that renders the transaction approval interface in Bybit's signers' browsers.

Scene 23 illustration

The modified version contains what forensic investigators later describe as conditional malicious logic.

Scene 24 illustration

For the vast majority of Safe users — ordinary holders, other exchanges, decentralized finance projects — the modified JavaScript behaves identically to the legitimate version. The interface renders normally. Transactions process as expected. Nothing looks wrong.

Scene 25 illustration

The malicious code executes only when specific conditions are met.

Scene 26 illustration

Those conditions are engineered precisely for Bybit.

Scene 27 illustration

The code checks: is this session authenticated against one of three specific wallet addresses? Is the transaction being proposed a transfer from Bybit's Ethereum cold wallet? If both conditions are true — proceed.

Scene 28 illustration

If both conditions are true, the malicious JavaScript intercepts the transaction data just before it is displayed to the signers. It substitutes the transaction logic. What the signers see on their screen — destination address, amount, operation type — remains visually identical to the legitimate intended transfer.

Scene 29 illustration

What they are actually signing is a `delegatecall` to a contract controlled by North Korea.

Scene 30 illustration

In Ethereum, `delegatecall` is a primitive that allows one smart contract to execute code in the context of another — with full access to the caller's storage and funds. When a signer approves a transaction that includes a `delegatecall`, they are not merely transferring funds. They are granting the called contract full control over the calling wallet.

Scene 31 illustration

By approving what they believe is a routine transfer, the three Bybit signers grant a North Korean-controlled contract total ownership of their cold wallet.

Scene 32 illustration

The attacker then drains it.

Scene 33 illustration

Four hundred one thousand three hundred forty-seven Ethereum tokens. One point five billion dollars.

Scene 34 illustration

All three signers had multifactor authentication enabled on their accounts. All three had active hardware security keys. None of that mattered. The deception happened at the layer above authentication — at the layer where the signer's own eyes interpret what the signer is being asked to approve.

Scene 35 illustration

Two minutes after the transaction lands on the Ethereum mainnet, the malicious JavaScript on Safe's website is deleted.

Scene 36 illustration

The modified file is replaced with the legitimate version. Any subsequent visitor to app.safe.global receives clean code. The evidence is gone from the live environment.

Scene 37 illustration

But Safe's infrastructure is not the only place the file was served. Wayback Machine archives — the public archive of the web maintained by the Internet Archive — had captured the malicious version during its active deployment window. When investigators reconstruct the attack, the archived file becomes central forensic evidence. The attackers had not anticipated that the public web archive was quietly making copies of their exploit.

Scene 38 illustration

Bybit's detection systems flag the anomaly within minutes. CEO Ben Zhou publicly confirms the theft within hours. Blockchain analysis firms begin tracing the stolen Ethereum in real time.

Scene 39 illustration

The laundering operation has already started.

Scene 40 illustration

North Korea's cryptocurrency laundering methodology is mature.

Scene 41 illustration

Within the first forty-eight hours after the theft, blockchain analysts estimate that approximately one hundred sixty million dollars in Ethereum is successfully laundered through decentralized exchanges and cross-chain bridges. The assets are converted, fragmented, mixed through privacy protocols, and reconstituted across thousands of blockchain addresses.

Scene 42 illustration

The preferred conversion target is Bitcoin.

Scene 43 illustration

Bitcoin's transaction model uses Unspent Transaction Outputs — a structure that treats every transaction as a discrete unit, analogous to physical cash. Tracing a specific dollar value through Bitcoin requires following individual UTXOs across many addresses, an exponentially more complex forensic task than tracing an Ethereum account.

Scene 44 illustration

North Korea's laundering unit, designated by the FBI as TraderTraitor, converts most of the stolen Ethereum to Bitcoin within the first week.

Scene 45 illustration

The FBI issues a public service announcement on February 26, 2025 — five days after the attack — formally attributing the theft to North Korea. The bureau releases fifty-one Ethereum addresses identified as part of the laundering infrastructure. It calls on exchanges, decentralized finance platforms, and blockchain intelligence firms to block transactions derived from those addresses.

Scene 46 illustration

The attribution is rapid by the standards of nation-state cyberattack investigations. It is enabled by pattern matching.

Scene 47 illustration

The addresses used to move Bybit's stolen funds overlap, at specific points, with addresses used in prior cryptocurrency thefts — the 2024 Phemex theft, the 2024 BingX theft, the 2023 Poloniex theft. Blockchain intelligence firms Elliptic and TRM Labs, along with independent investigator ZachXBT, establish the overlaps within days.

Scene 48 illustration

The same operators are running the same laundering infrastructure across repeated heists. The infrastructure is the signature.

Scene 49 illustration

Context for the scale.

Scene 50 illustration

According to multiple blockchain intelligence firms, the Lazarus Group and its subcomponents have stolen, over a multi-year period, an estimated three point four to over six billion dollars in cryptocurrency. In 2024 alone, North Korean-linked theft accounted for over two billion dollars.

Scene 51 illustration

Bybit's one point five billion dollars, taken in a single operation, exceeds the next-largest single heist — the 2024 theft of three hundred eight million dollars from Japan's DMM Bitcoin exchange — by a factor of five.

Scene 52 illustration

The funds flow, through laundering networks, into accounts controlled by the Democratic People's Republic of Korea government. Treasury Department designations have established repeatedly that these accounts finance North Korea's weapons programs, including ballistic missile development and its nuclear program.

Scene 53 illustration

Bybit, for its part, survives. The company is solvent. Within hours of the theft, CEO Ben Zhou arranges bridge loans and strategic inflows from other institutional holders to replenish reserves. Customer funds remain protected. No user lost deposited assets.

Scene 54 illustration

The exchange launches a recovery bounty program, offering up to ten percent of any funds recovered to those who help trace or seize them.

Scene 55 illustration

The vast majority of the stolen Ethereum has not been recovered.

Scene 56 illustration

The unresolved elements of this case file are structural.

Scene 57 illustration

Bybit did nothing wrong by the standards of cryptocurrency custody best practices. It used cold storage for its reserves. It used multisignature authorization for transfers. It used a reputable third-party interface provider. It used hardware security keys for its signers. Every defensive control the industry recommends, Bybit implemented.

Scene 58 illustration

The attack bypassed all of them by compromising a layer outside Bybit's control.

Scene 59 illustration

Safe, the interface provider, serves thousands of institutional clients. Any of those clients could have been the target. Bybit was selected because the attackers had, through their initial reconnaissance, identified its cold wallet addresses and transaction patterns in advance. The conditional JavaScript was engineered around those specific data points.

Scene 60 illustration

The underlying architectural weakness is general, not specific.

Scene 61 illustration

Any web interface used for signing cryptocurrency transactions is, by definition, a potential point of display manipulation. If the interface can be subtly modified — through compromise of its hosting infrastructure, its content delivery network, its source code repository, or its deployment pipeline — a signer cannot, in most implementations, independently verify what they are actually signing.

Scene 62 illustration

Hardware wallets with independent transaction display are a partial mitigation. But many hardware wallets do not decode complex transaction structures like `delegatecall` in human-readable form. They show a raw hash. A user staring at a sixty-four-character hexadecimal string cannot verify its meaning by inspection.

Scene 63 illustration

The user has to trust the interface.

Scene 64 illustration

North Korea demonstrated, on February 21, 2025, the cost of that trust.

Scene 65 illustration

Fragment Zero will track the case file.

Scene 66 illustration

The stolen funds continue to fragment across the global blockchain. Portions remain static in addresses that have been tagged and sanctioned. Portions continue to move. The FBI's fifty-one identified addresses have grown to several hundred, across multiple chains.

Scene 67 illustration

The developer at Safe whose machine was compromised has not been publicly named. The specific social engineering vector used to reach him has not been publicly detailed.

Scene 68 illustration

The Lazarus Group continues to operate. In the months following the Bybit theft, smaller but still substantial thefts — measured in tens of millions of dollars — have been attributed to the same infrastructure.

Scene 69 illustration

The deeper question is not whether cryptocurrency can be stolen.

Scene 70 illustration

The deeper question is how much financial infrastructure now relies on a small number of open-source interface projects — maintained by small teams, updated through live deployment pipelines, consumed through web browsers — that sit between billions of dollars in assets and the humans authorizing them.

Scene 71 illustration

In this case, the number of people who could have prevented the largest theft in history was one. And he clicked on something.