Share this article

North Korean Hackers Were Behind Crypto's Largest 'Theft of All Time'

Lazarus Group was behind Bybit's $1.5 billion hack on Friday, Arkham Intelligence said, citing ZackXBT.

(Pixabay)
(Pixabay)

What to know:

  • Arkham said the North Korean hackers Lazarus Group was behind the $1.5 billion hack, citing ZackXBT.
  • The attack appeared to have been caused by something called "Blind Signing."
  • The attackers first withdrew nearly $1.5 billion worth of funds from the exchange into a main wallet and then distributed the assets to several different wallets.

Blockchain analytics firm Arkham Intelligence said North Korea's Lazarus Group was behind Bybit's $1.46 billion hack.

In an earlier post on social media platform X, Arkham offered a bounty of 50,000 ARKM tokens for anyone who could identify the attackers for Friday's hack. Later, the platform said onchain sleuth ZachXBT submitted "definitive proof" that the attackers were the North Korean hacker group.

STORY CONTINUES BELOW
Don't miss another story.Subscribe to the Crypto Long & Short Newsletter today. See all newsletters

"His submission included a detailed analysis of test transactions and connected wallets used ahead of the exploit, as well as multiple forensics graphs and timing analyses," the post said.

Read more: Bybit Loses $1.5B in Hack but Can Cover Loss, CEO Confirms

The hack that rocked the crypto market and saw most prices tumbling was called the "largest crypto theft of all time, by some margin," by Elliptic's Tom Robinson, co-founder and chief scientist. "The next largest crypto theft would be the $611 million stolen from Poly Network in 2021. In fact it may even be the largest single theft of all time."

Blockchain data provider Nansen told CoinDesk that the attackers first withdrew nearly $1.5 billion worth of funds from the exchange into a main wallet and then spread the funds across several others.

"Initially, the stolen funds were transferred to a primary wallet, which then distributed them across more than 40 wallets," Nansen said. "The attackers converted all stETH, cmETH, and mETH to ETH before systematically transferring ETH in $27 million increments to over 10 additional wallets," Nansen said.

The attack appeared to have been caused by something called "Blind Signing," where a smart contract transaction is approved without the comprehensive knowledge of its contents.

"This attack vector is quickly becoming the favorite form of cyber attack used by advanced threat actors, including North Korea," said blockchain security firm Blockaid's CEO Ido Ben Natan. "It’s the same type of attack that was used in the Radiant Capital breach and the WazirX incident."

"The problem is that even with the best key management solutions, today most of the signing process is delegated to software interfaces that interact with dApps. This creates a critical vulnerability — it opens the door for malicious manipulation of the signing process, which is exactly what happened in this attack," he said.

Bybit CEO Ben Zhou wrote earlier on X that a hacker "took control of the specific ETH cold wallet and transferred all the ETH in the cold wallet to this unidentified address." He also confirmed that the exchange "is solvent even if this hack loss is not recovered."

Oliver Knight contributed to the reporting of this story
Read more: Bitcoin, Ether Slump as Crypto Prices Dip on Report of Massive $1.5B Bybit Hack

Oliver Knight contributed reporting.

Aoyon Ashraf

Aoyon Ashraf is CoinDesk's managing editor for Breaking News. He spent almost a decade at Bloomberg covering equities, commodities and tech. Prior to that, he spent several years on the sellside, financing small-cap companies. Aoyon graduated from University of Toronto with a degree in mining engineering. He holds ETH and BTC, as well as ALGO, ADA, SOL, OP and some other altcoins which are below CoinDesk's disclosure threshold of $1,000.

Aoyon Ashraf