Lazarus Group Identified as the Perpetrators of Bybit Hack
In a shocking development, blockchain analytics firm Arkham Intelligence has pinpointed North Korea’s infamous Lazarus Group as the mastermind behind the staggering $1.46 billion hack on the cryptocurrency exchange Bybit. This breach has been labeled as the largest theft in the history of cryptocurrency, leaving the market reeling in its aftermath.
Incentives for Information on the Hackers
In a bid to gather more information about the attackers, Arkham Intelligence took to social media platform X to announce a bounty of 50,000 ARKM tokens. They encouraged anyone who could identify the hackers involved in Friday’s breach to come forward. Following this, renowned on-chain investigator ZachXBT provided “definitive proof” linking the attack to the Lazarus Group. His comprehensive analysis included meticulous examinations of test transactions, connected wallets, and multiple forensic graphs and timing analyses.
The Scale of the Theft
This unprecedented heist has sent shockwaves through the crypto market, with many currencies experiencing a significant downturn. Tom Robinson, co-founder and chief scientist of Elliptic, characterized the incident as “the largest crypto theft of all time, by some margin.” In comparison, the next biggest theft recorded was the $611 million stolen from Poly Network in 2021. Experts suggest that this incident may even be the most substantial single theft in history.
How the Attack Unfolded
According to blockchain data provider Nansen, the attackers executed their plan with precision. They initially siphoned off nearly $1.5 billion from Bybit into a primary wallet before dispersing the funds into over 40 additional wallets. “The stolen assets were converted from stETH, cmETH, and mETH to ETH, which were then systematically transferred in increments of $27 million to more than ten other wallets,” Nansen reported.
The Mechanism Behind the Attack: Blind Signing
The breach was reportedly facilitated by a technique known as “Blind Signing.” This method allows a smart contract transaction to be approved without full knowledge of its contents, creating vulnerabilities. Ido Ben Natan, CEO of blockchain security firm Blockaid, noted that this attack vector is becoming increasingly popular among sophisticated cybercriminals, including those from North Korea. He highlighted that similar tactics were used in previous breaches, such as the incidents involving Radiant Capital and WazirX.
Implications for Key Management and Security
Ben Natan elaborated on the challenges posed by modern key management solutions. He explained that much of the signing process is now managed through software interfaces that interact with decentralized applications (dApps). This reliance creates a critical vulnerability, allowing for potential malicious manipulation of the signing process, as evidenced by this latest attack.
Bybit’s Response and Assurance
In response to the hack, Bybit CEO Ben Zhou took to X to clarify that the hacker had gained access to a specific ETH cold wallet and transferred all its contents to an undisclosed address. However, he reassured users that the exchange remains solvent and capable of covering the loss, even if the stolen assets are not recovered.
Oliver Knight contributed to the reporting of this story.
As the crypto community grapples with the implications of this historic breach, it serves as a stark reminder of the growing threats in the digital currency landscape and the importance of robust security measures.