Bybit Hack Considerations

March 1, 2026Crimson7 Research Team
threat intelligencesupply chainincident analysis

What Happened

In February 2025, cryptocurrency exchange Bybit suffered a breach resulting in the theft of approximately $1.5 billion in Ethereum and related tokens. The attack, attributed to North Korea's Lazarus Group, exploited a supply chain compromise rather than direct infrastructure exploitation - a pattern that carries important lessons for all organizations managing high-value digital assets.

The Attack Chain

The breach followed a sophisticated multi-stage supply chain attack:

  1. Third-Party Compromise - Attackers first compromised Safe{Wallet}, a multi-signature wallet infrastructure provider used by Bybit for cold storage management.
  2. Developer Machine Access - Through social engineering of a Safe developer, the attackers gained access to cloud development infrastructure.
  3. UI Manipulation - Rather than modifying the smart contract logic directly, the attackers injected malicious JavaScript into the Safe{Wallet} web interface. This is the critical innovation - the transaction signing UI displayed correct transaction details to the human signers, while the actual transaction payload was modified.
  4. Multi-Sig Bypass - Because each authorized signer saw a legitimate-looking transaction in their browser, all required signatures were collected for what appeared to be a routine cold-to-warm wallet transfer.
  5. Fund Extraction - With valid multi-sig authorization, the modified transaction redirected approximately 401,347 ETH to attacker-controlled addresses.

Key Takeaways

1. Supply Chain Attacks Target Trust Relationships

The attackers didn't need to breach Bybit's infrastructure directly. By compromising a trusted vendor's interface, they bypassed Bybit's internal security controls entirely. This mirrors a broader trend: why attack the castle when you can compromise the bridge builder?

Defensive action: Map your critical vendor dependencies and assess each one's security posture. For vendors handling transaction signing or authorization workflows, demand evidence of:

  • Secure development lifecycle practices
  • Code signing and deployment integrity verification
  • Regular third-party penetration testing focused on supply chain risks

2. Browser-Based Verification is Insufficient

The core vulnerability was the assumption that what signers saw in their browser matched what was being submitted to the blockchain. This is a fundamental limitation of web-based interfaces for high-value operations.

Defensive action: For critical financial operations, implement out-of-band verification:

  • Hardware wallet displays that show transaction details independently of the web interface
  • Secondary verification channels (e.g., a separate read-only node that independently computes expected transaction hashes)
  • Time-delayed execution with automated monitoring for discrepancies during the delay window

3. Multi-Signature is Not Multi-Verification

Having multiple signers provides no additional security if all signers use the same compromised interface. Multi-sig protects against a single compromised key; it does not protect against a compromised signing environment.

Defensive action: Enforce signer diversity:

  • Require signers to use different software interfaces
  • Implement at least one hardware-based signer that cannot be influenced by web UI manipulation
  • Consider requiring signers to independently verify transaction parameters through separate tooling

4. The Speed of Cryptocurrency Laundering

Within hours of the theft, the attackers began distributing funds across thousands of addresses using automated mixing and cross-chain bridge protocols. Despite the transparent nature of blockchain transactions, the speed and sophistication of the laundering operation made recovery extremely difficult.

Defensive action: Pre-position incident response capabilities:

  • Maintain relationships with blockchain analysis firms before an incident occurs
  • Implement automated monitoring for large outbound transfers with configurable delay mechanisms
  • Practice incident response scenarios specific to cryptocurrency theft

Architectural Recommendations

For organizations managing significant cryptocurrency holdings, the Bybit breach suggests several architectural improvements:

  • Air-gapped signing - Transaction creation and signing should occur on isolated systems without internet connectivity
  • Reproducible builds - All software used in signing workflows should be built from verified source code using deterministic build processes
  • Transaction simulation - Before signing, simulate the transaction against a fork of the current blockchain state and verify the expected outcome matches the displayed details
  • Anomaly detection - Monitor for deviations between historical transaction patterns and proposed operations

The Bigger Picture

The Bybit breach is not just a cryptocurrency story. It demonstrates that even organizations with significant security investment and multi-layered authorization controls are vulnerable to supply chain compromises that target the human-computer interface. As financial systems increasingly rely on web-based interfaces for critical operations, the integrity of those interfaces - and the entire software supply chain behind them - becomes a primary attack surface.

Every organization should ask: if a trusted vendor's interface was silently modified, would our verification processes catch it before authorization was granted?