The Federal Bureau of Investigation has officially attributed the massive $1.5 billion cryptocurrency theft from Bybit exchange to North Korea’s notorious hacking group TraderTraitor, also known as Lazarus and APT38. The incident, which occurred on February 21, 2025, represents one of the largest cryptocurrency heists in the industry’s history, highlighting the evolving sophistication of state-sponsored cyber threats.
Technical Analysis of the Attack Vector
Security researchers from Sygnia and Verichains have revealed that the attackers executed a sophisticated compromise of the Safe{Wallet} multi-signature wallet platform. The breach involved a carefully crafted malicious JavaScript injection into the app.safe.global interface, implementing conditional execution parameters that enabled the code to remain undetected for an extended period.
Attack Infrastructure and Compromise Methodology
The initial breach vector has been traced to a compromised workstation belonging to a Safe{Wallet} developer, which provided the threat actors with unauthorized access to the platform’s AWS S3 bucket. Notably, Bybit’s core infrastructure remained uncompromised, as the attackers specifically targeted the third-party wallet management system rather than the exchange itself.
Post-Exploitation Activities and Fund Movement
FBI investigators have documented the attackers’ sophisticated fund laundering operation, involving rapid conversion of stolen assets into Bitcoin and various other cryptocurrencies. The stolen funds were systematically distributed across thousands of addresses on multiple blockchain networks, demonstrating advanced operational security measures. Law enforcement has identified and published a list of 51 Ethereum addresses linked to the stolen assets.
Security Response and Risk Mitigation
In response to the incident, Safe Ecosystem Foundation has implemented comprehensive security measures, including a complete infrastructure reconfiguration and credential rotation. The organization has also enhanced its security monitoring capabilities and implemented additional access controls to prevent similar security breaches.
This unprecedented attack serves as a critical reminder of the sophisticated threats facing the cryptocurrency sector. Security experts recommend that cryptocurrency platforms implement robust security frameworks, including regular security audits of third-party integrations, enhanced access controls, and comprehensive incident response plans. The incident underscores the critical importance of maintaining vigilant security practices in an increasingly complex threat landscape, particularly when dealing with high-value digital assets and financial infrastructure.