Bybit and Safe Custody Clash Over Responsibility for $1.5 Billion Hack

Overview of the Incident

Cryptocurrency exchange Bybit recently conducted a forensic analysis following a staggering $1.5 billion hack that left the industry in shock. The review concluded that the exchange’s own systems were not breached; instead, the attack appeared to originate from compromised infrastructure related to Safe wallet technology.

Details of the Hack

The findings from Bybit’s investigation revealed that the credentials of a developer associated with Safe were compromised. This vulnerability allowed the notorious Lazarus hacking group to infiltrate the Safe wallet, ultimately leading to the manipulation of Bybit staff into approving a fraudulent transaction.

A source familiar with the situation highlighted a critical factor: despite the breach of the wallet’s infrastructure through social engineering tactics, the hack could not have succeeded if Bybit had not employed a practice known as “blind signing.” This method involves approving a smart contract transaction without fully understanding its contents, raising concerns about security protocols in place.

Safe’s Response

In response to the allegations, Safe issued a statement asserting that its smart contracts remained intact and unaffected. They clarified that the attack was executed by compromising a developer’s machine, which in turn impacted an account managed by Bybit. Furthermore, Safe emphasized that an independent forensic review by external security experts found no vulnerabilities in its smart contracts or the source code associated with its frontend and services.

Comparisons to Previous Incidents

The ongoing back-and-forth between Bybit and Safe mirrors a similar incident involving WazirX and Liminal Custody, where both parties blamed each other following a $230 million exploit last July. This highlights a troubling trend in the cryptocurrency space, where accountability can become muddled in the aftermath of significant breaches.

Lazarus Group’s Laundering Activities

On-chain data analyzed by blockchain investigator ZachXBT indicates that the Lazarus Group is actively attempting to launder the stolen funds. Currently, 920 wallets have been identified as tainted by the illicit gains, further complicating the situation. Notably, the funds have become intertwined with those stolen from previous hacks targeting exchanges like Phemex and Poloniex, suggesting a broader pattern of criminal activity linked to the Lazarus Group.

Conclusion

As the fallout from this high-profile hack continues, Bybit has declared a “war on Lazarus,” engaging in efforts to freeze the stolen assets. The incident serves as a sobering reminder of the vulnerabilities present within the cryptocurrency ecosystem and the importance of robust security measures in safeguarding digital assets.

662