In February 2025, North Korea’s state-sponsored Lazarus Group successfully breached Bybit, a Dubai-based cryptocurrency exchange, stealing $1.5 billion in digital assets—marking one of the largest crypto heists to date.
Bybit Crypto Exchange Loses $1.5 Billion in Heist
North Korean hackers leverage free digital storage service to execute breach.

What is the attack?
The attack exploited vulnerabilities in Bybit’s Ethereum hot wallet infrastructure, allowing attackers to manipulate transaction processes and divert funds to unauthorized addresses.
The FBI officially attributed the breach to Lazarus Group, highlighting the ongoing use of cryptocurrency theft to fund North Korea’s sanctioned nuclear and military programs.
Why did it get through?
Hot Wallet Vulnerabilities: Attackers exploited Bybit’s Ethereum hot wallet transaction process, bypassing security checks during internal fund transfers. They manipulated transaction logic to redirect assets without triggering immediate alerts.
Sophisticated Blockchain Laundering Techniques: Stolen assets were quickly converted into Bitcoin and dispersed across thousands of wallet addresses.
State-Sponsored Attack Tactics: Lazarus Group has a history of targeting crypto exchanges, leveraging nation-state capabilities to compromise supply chains, exploit vulnerabilities, and bypass security controls.
What is required to solve for this attack?
Stronger Hot Wallet Security & Transaction Monitoring:
Implement multi-layered transaction verification for high-value transfers, including behavioral AI to detect anomalies.
Use time delays and manual approvals for large transactions, limiting real-time fund extraction.
Advanced Blockchain Threat Intelligence & Wallet Tracking:
Leverage real-time blockchain analytics to flag suspicious wallet addresses and unauthorized transfers.
Collaborate with international agencies and blockchain forensic firms to track and freeze stolen assets faster.