Markets by Trading view

Is the Lazarus Group Behind the $1.5 Billion Bybit Crypto Heist?

Facebook
Twitter
LinkedIn

Could it be the largest theft in history? On Friday last week, Bybit, a Dubai-based cryptocurrency exchange, was hacked and approximately $1.5 billion worth of ETH was stolen. It stands as the largest theft in history. Larger by far than Mount Gox collapse of 2014. Could the Lazarus Group be behind the $1.5 billion Bybit crypto heist?

It was supposed to be such a good day. On Friday, Coinbase announced that the SEC had agreed to drop its enforcement case. Brian Armstrong, Coinbase co-founder and CEO, wasn’t quite as derogatory about the SEC as Ripple’s Brad Garlinghouse a few days before, but he did share with CNBC how the case marks a “huge day” for Coinbase and the crypto industry at large. Little did he know that later in the day his words would come back to haunt him.

Bybit Didn’t Need a Crypto Heist

The cryptocurrency exchange affected by last Friday’s hack was Bybit, one of the leading exchanges in the world with almost 5 million followers on X. The company was accused of treading a fine line with Russian users last year. It has also started serving citizens of China who can prove they live outside the country, which may be unpopular with some in Beijing. Finally, Bybit saw substantial growth after targeting former customers of FTX, the failed crypto exchange. It made a lot of money in 2024 and does this by offering very low fees compared to other exchanges.

But, during the evening (local time) on Friday last week, everything changed for Bybit. Ben Zhou, co-founder and CEO, reported on X that a transfer between wallets had been ‘musked’. Not Elon Musked, more ‘masked’ with some fancy UI. The attackers replicated a payment link that the three signatories regularly used for transferring digital assets between cold and hot wallets. Everything looked identical.

The Victim – Ben Zhou

Zhou was quick to react. He had to be. With cryptocurrency exchanges there are always online users monitoring whale activity as well as smaller transactions. There were in the case of Bybit’s hack. The removal of 401,346 ETH from circulation, almost 0.5% of global supply, is going to get noticed. He had to react.

The attack hit the tech entrepreneur hard. He immediately woke up his entire management team (on a Friday night local time in Singapore). Zhou was worried there might be a bank run and wanted to react as quickly as possible. And, once his management team were engaged, his next job was to ensure that he could find funds to make up any potential shortfall in ETH.

Zhou took to X with a live stream to help calm down the market. Some of Bybit’s customers had already had a bad experience with FTX just a few months ago, and what had happened to Bybit looked like it might play out in the same way. Communication has been excellent from the CEO of Bybit. He did more than you could expect in galvanizing the organization to address the hack.

The Defendant – The Lazarus Group

It’s important to note that there is no actual hard evidence to prove who was responsible for the hack. There are similarities in behaviours. Levels of sophistication that only of a very small group of bad actors on the market can achieve. To know that there were three signatories. How they behave. Who they are. And when the exact moment was to strike.

So far, all the evidence points at one group. A group of ‘cyber warriors’ operating out of North Korea.

The FBI, as well as many other agencies, has been following the Lazarus Group’s cyber-attacks for many years. According to the FBI the group is comprised of North Korean cyber actors and has been responsible for numerous attacks on crypto companies. The U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) sanctioned the Lazarus Group in 2019. 

In 2024 the leading bug bounty and security services platform for web3, Immunefi, published a report about the Lazarus Group. In the report the company shared how it had “seen a loss of $1.9 billion across the web3 ecosystem from 2021 to 2023, due to the Lazarus Group. Most of the sum came from the attack on Axie Infinity’s Ronin Network, with a loss of $650 million, and Poly Network, which suffered a $600 million loss.”

The types of techniques used by the Lazarus Group include:

  • Phishing
  • Social engineering
  • Exploration of smart contract vulnerabilities
  • Exploration of validator nodes
  • Unauthorized access
  • Stolen private keys
  • API exploitation

The North Korean cyber warriors have even used fake LinkedIn job offers to steal user data.

Elliptic, a leading provider of cryptoasset transaction and wallet screening, has provided specific research which they say points to the Lazarus Group.

The Evidence

Elliptic suggests that the Bybit theft bears similarities to previous Lazarus Group activities. The company has worked around the clock with Bybit, cryptocurrency service providers and fellow investigators like @ZachXBT, to trace and block the stolen funds from being paid out.

Elliptic’s research points to how the laundering of the stolen ETH follows a pattern. Some of the staked ETH which was stolen has been exchanged for ETH through decentralized exchanges. Much of it has then been converted to bitcoin using eXch, another cryptocurrency exchange.

From what can be seen Bybit isn’t popular with all of the digital assets ecosystem. Zhou did post earlier today about how Bybit had received $1.23 billion through loans, whale deposits, and ETH purchases. eXch is less inclined to help due to bad history between the exchanges.

There are, however, some signs that lost funds are being frozen before they can be paid out or moved further by other exchanges. $42.89 million has been recovered in one day due to teamwork in the ecosystem.

All the signs suggest that the North Korean Lazarus Group carried out the $1.5 billion crypto heist. As time goes on the crypto community is getting more familiar with the name of this group of cyber warriors. Nobody likes a bad player. All participants of the web3, DeFi and wider crypto communities need to stay aware and hope that the future won’t hold any other nasty surprises.

Author: Andy Samu

#cyberwarrior #lazarusgroup #bybit #ETH #hackers #cybersecurity #NorthKorea #crypto #community

See Also:

Does the ION Group Ransom Attack mean more Regulation? | Disruption Banking

Why Are Pig Butchering Scams On The Rise? | Disruption Banking

Poloniex Offers ‘White Hat’ Bounty to Black Hat Hackers in Largest Crypto Attack Of 2023 | Disruption Banking

Kraken Turns Its First Hack Into White Hat Firm’s PR Nightmare | Disruption Banking

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Posts

Name

Trending

Write your email to verify subscription

Loading...

Sign up for our free newsletter and receive the latest banking and fintech stories, straight to your inbox - every week