Close Menu
    What's Hot

    E.U. Sanctions Russian Hackers for Cyber Attacks on Estonia’s Government

    March 30, 2025

    Stealthy Golang Malware Uses Telegram Bots for C2: Possible Russian Origin

    March 30, 2025

    Ghostwriter Cyber Attacks Use Obfuscated Excel Macros to Target Ukraine and Belarusian Opposition

    March 29, 2025
    Ambreen Chaudhary
    • News
    • Data Breach
    • Cyber Attack
    • Cyber Security
    • Expert Insights
    • Contact
    Youtube
    Trending Topics:
    • Home
    • Interviews
    • Cyber Attack
    • Buy Now
    Ambreen Chaudhary
    • Home
    • Interviews
    • Cyber Attack
    • Buy Now
    Home » The $1.5 Billion Bybit Cryptocurrency Heist and North Korean Hackers
    Data Breach

    The $1.5 Billion Bybit Cryptocurrency Heist and North Korean Hackers

    North Korean TraderTraitor Hackers Behind $1.5B Bybit Crypto Heist
    AmbreenChaudharyBy AmbreenChaudharyMarch 28, 2025Updated:March 28, 2025No Comments6 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Bybit $1.5 billion crypto heist linked to Safe{Wallet} breach by North Korean hackers
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The fallout from the $1.5 billion Bybit cryptocurrency heist is becoming clearer, and it’s worse than initially feared. Safe{Wallet}, a platform offering secure multi-signature services for Web3 assets, has now confirmed that the attack was not only state-sponsored but also executed with surgical precision.

    The culprit? A North Korea-linked hacking group known as TraderTraitor — also tracked as Jade Sleet, PUKCHONG, and UNC4899. This group has been tied to multiple previous crypto-focused breaches and is now being held responsible for one of the largest digital heists in history.

    How the Attack Unfolded: From Docker to Developer

    A Social Engineering Trap

    According to Safe{Wallet}, the hackers tricked a developer into downloading a Trojanized Docker project disguised as a stock investment simulator. The infected file, named MC-Based-Stock-Invest-Simulator-main, was downloaded on February 4, 2025, from a site registered just two days earlier — a key indicator of a tailored attack.

    This wasn’t random malware. It was specifically crafted to target the developer’s macOS system, compromise their credentials, and embed backdoors for remote access.

    Targeting Developer1: A High-Privilege Victim

    The victim, identified as Developer1, was one of the few with elevated privileges on the team — someone whose role granted broad AWS access. That made them a perfect target for gaining control over key systems.

    After breaching the machine, the hackers used the stolen AWS session tokens to bypass multi-factor authentication (MFA). This allowed them to act as if they were the developer, carrying out malicious activity during working hours to avoid raising alarms.

    From AWS Access to $1.5 Billion Gone

    Moving Quietly Inside the Cloud

    Once inside the AWS environment, the attackers:

    • Conducted cloud reconnaissance
    • Identified digital assets and access points
    • Hijacked active user sessions
    • Coordinated malicious activity with the developer’s real schedule

    To avoid being caught, they wiped traces of the malware, deleted bash history logs, and used obfuscation tactics like routing through ExpressVPN IPs. Their user agent string (distrib#kali.2024) even pointed to the use of Kali Linux, a toolset widely used by penetration testers and cyber attackers alike.

    JavaScript Injection on Safe{Wallet}

    The hackers weren’t done. They injected malicious JavaScript into the Safe{Wallet} website itself between February 19 and 21, potentially compromising even more users during that window.

    They also used the Mythic framework, an open-source toolkit designed for red team operations — further demonstrating how professional and adaptable this group is.

    Bybit’s Response and the Aftermath

    Assets Tracked, Some Frozen

    Bybit CEO Ben Zhou confirmed the staggering scale of the breach and provided a breakdown of the stolen assets:

    • 77% of funds still traceable
    • 20% have disappeared (“gone dark”)
    • 3% have been frozen with help from industry partners

    In total, 417,348 ETH (around 83% of the haul) has already been converted into bitcoin, then split across nearly 7,000 wallets, making recovery complex and slow.

    Zhou credited 11 organizations, including Mantle, Paraswap, and blockchain investigator ZachXBT, for their rapid assistance in freezing stolen assets.

    TraderTraitor: North Korea’s Crypto Crime Machine

    A Familiar Tactic with New Wrinkles

    The attack fits the pattern of TraderTraitor’s earlier campaigns. These hackers have a well-documented history of targeting developers in the crypto space, often using:

    • Fake job offers
    • Telegram chats with “tech collaborators”
    • Booby-trapped projects and shared tools

    Their tool of choice for persistence in this attack was PLOTTWIST, a custom backdoor malware that enables remote control of infected machines.

    While the exact infection vector this time remains unclear, Safe{Wallet} noted that signs point to a social engineering playbook—starting with that fake Docker project and ending with an empty audit trail.

    Web3 Heists Surge: $1.6B Lost in Just Two Months

    2025 Is Already a Record Year

    With this incident, crypto theft in 2025 has already hit $1.6 billion — just two months into the year. That’s eight times more than the total for the same period in 2024.

    According to blockchain security firm Immunefi, the spike reflects:

    • Increased sophistication of threat actors
    • Inadequate safeguards in some Web3 protocols
    • Poor transaction verification flows

    The attack proves that multi-signature wallets, while more secure than basic wallets, are not invincible, especially when endpoint security is weak or when developers are manipulated.

    Safe{Wallet} Calls for Industry-Wide Action

    It’s Not Just a User Problem

    Following the attack, Safe{Wallet} released a sobering statement:

    “Verifying that the transaction you are signing will result in the intended outcome remains one of the biggest security challenges in Web3. And this is not just a user or education problem — it is an industry-wide issue.”

    The platform is now working closely with Google Cloud’s Mandiant team to fully understand the breach, prevent future occurrences, and share its findings with the wider Web3 community.

    How This Attack Highlights Critical Web3 Flaws

    Security Weak Spots Exposed

    This attack lays bare several ongoing issues in the crypto and DeFi space:

    • Session hijacking still bypasses MFA in many cloud environments
    • Developer endpoints remain vulnerable to social engineering
    • Widespread trust in “helpful” open-source projects leads to easy malware entry
    • Transaction previews and confirmations are still confusing to many users
    • Even “secure” wallets are only as safe as the machines they run on

    FAQs

    Who carried out the Bybit $1.5 billion heist?
    A North Korean hacking group known as TraderTraitor, also referred to as Jade Sleet or UNC4899.

    How did the hackers gain access?
    They tricked a developer into downloading a malicious Docker project, compromised their macOS system, and hijacked active AWS sessions to move within the cloud.

    Was multi-factor authentication bypassed?
    Yes. By using stolen AWS session tokens, the hackers avoided MFA and acted as if they were the authorized user.

    What tools were used in the attack?
    Key tools included the PLOTTWIST malware, the Mythic framework, ExpressVPN, and JavaScript injection. The attackers also wiped logs to hinder investigation.

    How much of the stolen crypto has been recovered?
    Roughly 3% of the funds have been frozen, while 77% remains traceable. About 20% is currently unaccounted for.

    What does this mean for crypto security in 2025?
    This attack signals a new level of sophistication and volume in crypto crime. It shows that the industry must improve endpoint security, session protection, and transaction validation.

    Bybit Crypto Heist Hackers
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    AmbreenChaudhary
    • Website

    Related Posts

    Blind Eagle Hacks Colombian Institutions Using GitHub, RATs, and Windows NTLM Exploit

    March 28, 2025

    Microsoft Warns of ClickFix Phishing Attack Targeting Booking(.)com Users in Hospitality Sector

    March 28, 2025

    AC Weekly Cybersecurity News Recap – March 2025

    March 28, 2025
    Leave A Reply Cancel Reply

    Demo
    Latest Posts

    E.U. Sanctions Russian Hackers for Cyber Attacks on Estonia’s Government

    March 30, 2025

    Stealthy Golang Malware Uses Telegram Bots for C2: Possible Russian Origin

    March 30, 2025

    Ghostwriter Cyber Attacks Use Obfuscated Excel Macros to Target Ukraine and Belarusian Opposition

    March 29, 2025

    FamousSparrow Returns: New SparrowDoor Variants Target U.S., Mexico

    March 29, 2025
    Latest Posts

    Subscribe to News

    Get the latest sports news from NewsSite about world, sports and politics.

    Advertisement
    Demo

    Ambreen Chaudhary is a Cyber Crime expert dedicated to cybersecurity awareness and digital safety. This is Pakistan’s #1 platform for cybersecurity news, blogs, and expert insights, helping individuals and businesses stay secure online.

    Facebook Pinterest YouTube
    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Interviews
    • Cyber Attack
    • Buy Now
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.