
Bybit suffered a $1.5 billion crypto hack via "Blind Signing," exploiting a compromised ETH cold wallet.
Attackers used a delegate call within a seemingly normal transaction to replace Bybit's master contract, enabling them to drain assets.
Security lapses indicate potential insider knowledge and highlight the need for stronger security protocols.
Bybit has suffered a massive security breach, with hackers stealing nearly $1.5 billion in crypto assets. This is one of the biggest crypto heists ever, and the way it happened is both shocking and sophisticated.
Reports reveal that the attackers exploited a critical weakness in Bybitโs system, using a clever trick to drain funds before anyone could react. Crypto analyst David Leung has broken down exactly what went wrong, exposing major security flaws that left Bybit vulnerable.
So, how did the hackers pull this off? And what does this mean for crypto security? Letโs dive in.
How Did the Hack Happen?
According to Arkham, the breach was carried out using โBlind Signingโ – a method where transactions get approved without showing full details. The attackers used this weakness to access Bybitโs ETH cold wallet, transferring nearly $1.5 billion into one wallet before splitting it across multiple addresses.
This hack raises concerns about crypto security and asset recovery. Since there are no uniform international laws for such crimes, recovering stolen funds will be difficult. In response, Bybit has offered a 50,000 ARKM bounty for any information on the hackers, while investigations continue.
Trojan and Backdoor Contracts
The hackers used a trojan contract along with a backdoor contract, targeting Bybitโs upgradeable multisig wallet. They tricked the walletโs signers into approving what looked like a regular ERC-20 token transfer. However, hidden inside the transaction was a delegate callโa function that altered the walletโs core logic.
Instead of just transferring tokens, the hackers swapped Bybitโs master contract with their own malicious version, giving them full control over the wallet. Once inside, they quickly drained all ETH, mETH, stETH, and cmETH tokens before Bybit could react.
Missed Warning Signs
Leung pointed out several red flags that should have blocked the attack:
- The transaction was sent to an unlisted contract that wasnโt ERC-20 compliant.
- It involved zero tokens, which is unusual.
- It used a delegate call, which modifies contract logicโsomething that should have raised alarms.
Despite these warning signs, the transaction was approvedโsuggesting that the attackers had inside knowledge of Bybitโs system.
What This Means for Crypto Security
Leung stressed that stronger security checks before and after signing transactions could have stopped the attack. If independent reviews had been in place, the suspicious elements could have been flagged before approval.
This attack shows how crypto hacks are becoming more advanced, highlighting the urgent need for better security practices across the industry. Crypto exchanges must tighten security measures to prevent similar breaches in the future.
This breach is a stark reminder: in crypto, even the most โsecureโ platforms can have hidden cracks.
Never Miss a Beat in the Crypto World!
Stay ahead with breaking news, expert analysis, and real-time updates on the latest trends in Bitcoin, altcoins, DeFi, NFTs, and more.