Bybit Crypto Exchange Hit by $1.5 Billion Ethereum Hack – Largest Digital Heist in History

Feb 25, 2025

Bybit Suffers Historic $1.5 Billion Ethereum Heist

In an unprecedented security breach, Dubai-based cryptocurrency exchange Bybit has fallen victim to a massive hack, resulting in the theft of approximately $1.5 billion worth of Ethereum. This incident is being labeled as the largest single digital heist in history.

Bybit Suffers Historic $1.5 Billion Ethereum Heist  In an unprecedented security breach, Dubai-based cryptocurrency exchange Bybit has fallen victim to a massive hack, resulting in the theft of approximately $1.5 billion worth of Ethereum. This incident is being labeled as the largest single digital heist in history.  Details of the Breach  The attack occurred during a routine transfer of Ethereum from Bybit's offline "cold" wallet to a "warm" wallet designated for daily trading activities. Hackers exploited vulnerabilities in the security protocols during this process, gaining unauthorized access to the cold wallet and transferring 401,000 Ethereum to an unknown address. Notably, all other wallets on the platform remained secure and unaffected.  Company's Response  In the wake of the breach, Bybit's CEO, Ben Zhou, took to social media to reassure clients, stating, "Bybit is solvent even if this hack loss is not recovered; all client assets are 1-to-1 backed. We can cover the loss." The company holds $20 billion in customer assets and has indicated its capability to absorb the financial impact independently or through partner loans.  The announcement of the hack led to a surge in withdrawal requests, with over 350,000 users attempting to retrieve their funds, causing potential delays in processing. Despite this, Bybit has maintained that customer assets remain secure and that they are taking measures to address the situation promptly.  Bounty and Recovery Efforts  Bybit is actively seeking assistance from the global cybersecurity and crypto analytics communities to recover the stolen assets. The company has announced a bounty program, offering a 10% reward of the recovered amount to individuals or groups who can aid in retrieving the stolen funds. This initiative underscores Bybit's commitment to enhancing its security infrastructure and collaborating with experts to prevent future incidents.  Potential Perpetrators  While the identity of the attackers remains unconfirmed, there is speculation about the involvement of North Korean state-sponsored hacking groups, such as the Lazarus Group. This group has been implicated in previous large-scale cryptocurrency thefts, including the $615 million Ronin Network hack in 2022. Investigations are ongoing to determine the exact perpetrators behind this significant breach.  Impact on the Cryptocurrency Industry  This event serves as a stark reminder of the vulnerabilities present in the rapidly evolving cryptocurrency landscape. It highlights the critical need for robust security measures and continuous vigilance to protect digital assets. The incident has sent ripples through the crypto community, prompting exchanges and users alike to reassess their security protocols and asset protection strategies.  Bybit's proactive approach in addressing the breach and its commitment to safeguarding user assets will be closely monitored as the situation develops. The broader industry may also see increased regulatory scrutiny and a push for enhanced security standards in the aftermath of this historic theft.

Details of the Breach

The attack occurred during a routine transfer of Ethereum from Bybit's offline "cold" wallet to a "warm" wallet designated for daily trading activities. Hackers exploited vulnerabilities in the security protocols during this process, gaining unauthorized access to the cold wallet and transferring 401,000 Ethereum to an unknown address. Notably, all other wallets on the platform remained secure and unaffected.

Company's Response

In the wake of the breach, Bybit's CEO, Ben Zhou, took to social media to reassure clients, stating, "Bybit is solvent even if this hack loss is not recovered; all client assets are 1-to-1 backed. We can cover the loss." The company holds $20 billion in customer assets and has indicated its capability to absorb the financial impact independently or through partner loans.

The announcement of the hack led to a surge in withdrawal requests, with over 350,000 users attempting to retrieve their funds, causing potential delays in processing. Despite this, Bybit has maintained that customer assets remain secure and that they are taking measures to address the situation promptly.

Bounty and Recovery Efforts

Bybit is actively seeking assistance from the global cybersecurity and crypto analytics communities to recover the stolen assets. The company has announced a bounty program, offering a 10% reward of the recovered amount to individuals or groups who can aid in retrieving the stolen funds. This initiative underscores Bybit's commitment to enhancing its security infrastructure and collaborating with experts to prevent future incidents.

Potential Perpetrators

Bybit Suffers Historic $1.5 Billion Ethereum Heist  In an unprecedented security breach, Dubai-based cryptocurrency exchange Bybit has fallen victim to a massive hack, resulting in the theft of approximately $1.5 billion worth of Ethereum. This incident is being labeled as the largest single digital heist in history.  Details of the Breach  The attack occurred during a routine transfer of Ethereum from Bybit's offline "cold" wallet to a "warm" wallet designated for daily trading activities. Hackers exploited vulnerabilities in the security protocols during this process, gaining unauthorized access to the cold wallet and transferring 401,000 Ethereum to an unknown address. Notably, all other wallets on the platform remained secure and unaffected.  Company's Response  In the wake of the breach, Bybit's CEO, Ben Zhou, took to social media to reassure clients, stating, "Bybit is solvent even if this hack loss is not recovered; all client assets are 1-to-1 backed. We can cover the loss." The company holds $20 billion in customer assets and has indicated its capability to absorb the financial impact independently or through partner loans.  The announcement of the hack led to a surge in withdrawal requests, with over 350,000 users attempting to retrieve their funds, causing potential delays in processing. Despite this, Bybit has maintained that customer assets remain secure and that they are taking measures to address the situation promptly.  Bounty and Recovery Efforts  Bybit is actively seeking assistance from the global cybersecurity and crypto analytics communities to recover the stolen assets. The company has announced a bounty program, offering a 10% reward of the recovered amount to individuals or groups who can aid in retrieving the stolen funds. This initiative underscores Bybit's commitment to enhancing its security infrastructure and collaborating with experts to prevent future incidents.  Potential Perpetrators  While the identity of the attackers remains unconfirmed, there is speculation about the involvement of North Korean state-sponsored hacking groups, such as the Lazarus Group. This group has been implicated in previous large-scale cryptocurrency thefts, including the $615 million Ronin Network hack in 2022. Investigations are ongoing to determine the exact perpetrators behind this significant breach.  Impact on the Cryptocurrency Industry  This event serves as a stark reminder of the vulnerabilities present in the rapidly evolving cryptocurrency landscape. It highlights the critical need for robust security measures and continuous vigilance to protect digital assets. The incident has sent ripples through the crypto community, prompting exchanges and users alike to reassess their security protocols and asset protection strategies.  Bybit's proactive approach in addressing the breach and its commitment to safeguarding user assets will be closely monitored as the situation develops. The broader industry may also see increased regulatory scrutiny and a push for enhanced security standards in the aftermath of this historic theft.

While the identity of the attackers remains unconfirmed, there is speculation about the involvement of North Korean state-sponsored hacking groups, such as the Lazarus Group. This group has been implicated in previous large-scale cryptocurrency thefts, including the $615 million Ronin Network hack in 2022. Investigations are ongoing to determine the exact perpetrators behind this significant breach.

Impact on the Cryptocurrency Industry

This event serves as a stark reminder of the vulnerabilities present in the rapidly evolving cryptocurrency landscape. It highlights the critical need for robust security measures and continuous vigilance to protect digital assets. The incident has sent ripples through the crypto community, prompting exchanges and users alike to reassess their security protocols and asset protection strategies.

Bybit's proactive approach in addressing the breach and its commitment to safeguarding user assets will be closely monitored as the situation develops. The broader industry may also see increased regulatory scrutiny and a push for enhanced security standards in the aftermath of this historic theft.

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack
Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack
Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack
Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack

Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack

Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack

Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack

Figure Data Breach Exposes Nearly 1 Million Accounts in Social Engineering Attack

Feb 19, 2026

Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks
Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks
Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks
Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks

Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks

Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks

Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks

Google Patches First Chrome Zero-Day of 2026 Actively Exploited in Attacks

Feb 17, 2026

Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown
Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown
Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown
Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown

Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown

Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown

Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown

Russia Moves to Block WhatsApp and Telegram in Expanding Communication Crackdown

Feb 13, 2026

Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails
Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails
Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails
Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails

Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails

Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails

Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails

Fake AI Chrome Extensions With 300K Installs Steal Credentials and Gmail Emails

Feb 13, 2026

China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers
China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers
China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers
China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers

China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers

China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers

China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers

China-Linked UNC3886 Breaches Singapore’s Four Largest Telecom Providers

Feb 11, 2026

Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery
Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery
Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery
Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery

Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery

Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery

Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery

Ransomware Gangs Abuse ISPsystem VMs for Stealthy Payload Delivery

Feb 9, 2026

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.