By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Security Expert Says the Bybit Hack May Have Involved an Insider | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Security Expert Says the Bybit Hack May Have Involved an Insider | HackerNoon
Computing

Security Expert Says the Bybit Hack May Have Involved an Insider | HackerNoon

News Room
Last updated: 2025/02/26 at 6:37 PM
News Room Published 26 February 2025
Share
SHARE

The $1.4 billion hack of the Bybit exchange is a natural thunderclap. First, the amount of stolen cryptocurrency is staggering in scope. Secondly, the security systems of large CEX platforms are considered to be quite reliable and elaborate, but it seems that this is not the case.

Entire companies (Arkham) and individual experts (ZachXBT) are looking for signs of outside influence and the path of funds to find out who the funds will lead to. In the meantime, anonymous security expert Dexaran, author of ERC-223 and head of Ethereum Commonwealth, has looked deeper into the attack itself and revealed that the defense mechanism wasn’t really that robust, and that someone inside Bybit could conceivably be involved in the hack.

Multisig has proven to be unreliable.

The vast majority of exchanges use multisig wallets to store assets. In fact, it is a special smart contract that can only be acted upon if the persons involved in the management approve the proposed action with their signatures. Such smart contracts can be updatable, i.e. have a bundle of a proxy contract that stores data and an implementation contract – the logic to be executed.

Dexaran in one of his posts gives the address of the proxy contract of the attacked Bybit cold wallet using Gnosis Safe as the implementation contract, rightly noting that it is a rather complex contract of 1080 lines. It may well be that the Bybit team never utilized the full functionality of Gnosis Safe. Most likely, the choice of a smart multi-signature contract was influenced by the widespread adoption of Gnosis Safe. In the meantime, complexity often leads to redundancy and misunderstanding of code behavior in complex situations, one can recall the incorrect user interaction with Gnosis Safe and the loss of $25 million.

The Achilles’ heel of the multisig used turned out to be signatures, or rather, how and with what help they are generated. As Dexaran notes, signatures are very complex and unreadable by humans, which means that most likely software is used to generate them, and the process itself is the same for all participants, the researcher suggests.

That’s why other members of the Bybit team didn’t suspect anything, because everything looked as usual, and they couldn’t read the substitution of Bybit’s hot wallet for the hacker’s wallet because of the complexity of the signature provided by the hacker.

There is no reason not to trust Dexaran’s expertise. He has extensive experience auditing smart contracts since the Ethereum split. He audited the multisig wallet for Ethereum Classic, developed the ERC-223 standard and the smart contract communication model to solve the ERC-20 problem.

Why would a hacker be inside Bybit? Sure, the Gnosis Safe contract and the proxy contract are verified in the Etherscan block browser, anyone can read the code, the hacker could just be a smart guy. However, the fact that he clearly knows how signatures are generated is either a rare coincidence and a lucky break for the hacker, or he simply knows the inner workings of Bybit’s security system from his direct job duties or from an informant. In addition, the hacker didn’t just walk by, he deployed two copies of the target contract for practice the day before.

Hacker trails

A researcher under the nickname ZachXBT traced the flow of funds to an address that accumulated funds from the Phemex hack. This fact is taken as proof of Lazarus Group involvement in the Bybit hack. Considering that a hacker or group of hackers was crushing the funds and withdrawing them through various bridges and mixers, the researcher has done a Herculean task.

In turn, Dexaran draws attention to the chain of addresses, through which the hacker’s addresses were replenished to pay for gas for calls to test contracts and send a transaction with a signature to withdraw funds from the exchange’s cold wallet. It turns out the hacker funded his addresses through the Binance exchange. Binance is fully compliant with KYC/AML policies and is quite willing to work with various law enforcement agencies. Of course, hackers use the so-called “money mule”, but it’s still a clue when an exchange cooperates with law enforcement.

As soon as it became known that the exchange had been hacked and an astronomical amount of ETH had been withdrawn, the market experienced selling pressure. Traders obviously rushed to hedge their bets believing that hackers would cash out the stolen money.

CoinMarketCap

After the opening of withdrawals from the exchange, users also rushed to withdraw their funds, resulting in an outflow of $5.3 billion (DeFi Llama).

Various companies have gotten involved in tagging stolen funds and limiting the ability for hackers to use different platforms to mix and transfer funds between blockchains. Tether – the issuer of USDt – block hackers’ funds (Paolo Ardoino).

However, not everyone is moving in unison. Cryptomixer eXch has refused to cooperate with the exchange.

“In light of these circumstances, we would like an explanation as to why we should partner with an organization that has actively defamed our reputation,” eXch wrote in a response posted on the Bitcointalk forum.

Amazingly, there are people calling for a rollback of the Ethereum blockchain to recover Bybit funds,

one of them Jan3 CEO Samson Mow.

These calls sound a bit strange, when ordinary users who lose their funds are accused of negligence. It’s not uncommon for users to mistakenly send funds to the exchange from the wrong EVM network, and all the exchange needs to do is use a public node to send the user’s funds back, but in 99.9% of cases they refuse. Plus Bybit has assured that it has enough reserves to cover all losses.

These people unknowingly call for burying all the efforts made by the blockchain industry by completely abolishing decentralization, thus reducing the very value of public blockchain technology to 0.

Fortunately, the developers of Ethereum themselves are against such a move, and have more than justified their position.

for example, kernel developer Tim Beiko.

And they have enough supporters on this issue advocating decentralization and cryptopunk philosophy,

such as Justin Bons.

Bybit itself launched a bounty program, thus announcing a hunt for hackers involved in the hack.

Conclusion

The community is used to periodic hacks of DeFi protocols. On these platforms developers often neglect testing procedures and audits, choose modules whose code and logic they don’t fully know. All in favor of development speed and fear of missing the wave. That’s why CEX hack, especially a large one, is always a high-profile event that leaves a lasting impression on the whole industry.

Developers at all levels should not forget that the race of defense mechanisms and hacking tools is non-stop and should be on guard.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Enterprises waste millions on underused tech: WalkMe report
Next Article Need a power station? Today’s best deals come from DJI, EcoFlow, and GRECELL
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

South Africa’s fintech startups make FT fastest-growing firms list
Computing
Google Cloud Enhances AI/ML Workflows with Hierarchical Namespace in Cloud Storage
News
Material 3 Expressive: What’s new with Android 16’s visual overhaul?
Gadget
Readers reply: If you were prepping, what would your top five items be?
News

You Might also Like

Computing

South Africa’s fintech startups make FT fastest-growing firms list

4 Min Read
Computing

Top 50 AI Tools Transforming Businesses in 2025 |

88 Min Read
Computing

Why I Ditched JavaScript and Built a SaaS Stack With HTMX, Go & Postgres That Just Works | HackerNoon

8 Min Read
Computing

Horabot Malware Targets 6 Latin American Nations Using Invoice-Themed Phishing Emails

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?