Summary
Bybit is a Dubai-headquartered cryptocurrency derivatives and spot exchange founded in 2018 by Ben Zhou, serving over 80 million registered users globally. On February 21, 2025, the exchange suffered the largest cryptocurrency theft in recorded history when North Korean state-sponsored hackers attributed to the Lazarus Group (TraderTraitor) stole approximately $1.46 billion in Ethereum via a supply chain compromise of Safe{Wallet}'s frontend infrastructure. Separately, Bybit accounts have been cited in the ICIJ's 2025 Coin Laundry investigation into crypto exchanges facilitating international criminal money flows.
No evidence submitted yet — be the first.
Decision log
- hash: DB8xKNbaGDATADbF5D2YQ3R5KokvF6f2my9hBpq3FkAT
- hash: A29qP5TUyTADPUrs2ZAg7RH7ptoXJhbxTpwErEvxcCo9
- hash: p83y42fBZriSLhCDreXwMMfXMe1EE6n8PYL2savvadk
- hash: 55phVb13joSEKe38VhUuA1dGYfWgqXUNv8aDReHXMUv3
Editorial decisions, corrections, and updates are anchored on Solana.
Overview and Background
Bybit was founded in March 2018 by Ben Zhou, an entrepreneur with a prior background as General Manager for Greater China at forex broker XM (2010–2017). The exchange initially focused on crypto derivatives and perpetual contracts before expanding to spot trading. In March 2022, Bybit announced the relocation of its global headquarters from Singapore to Dubai, United Arab Emirates, following an in-principle approval from Dubai’s Virtual Assets Regulatory Authority (VARA); the physical Dubai office opened in April 2023. Bybit was originally incorporated in the British Virgin Islands, but that entity was dissolved in July 2023. As of late 2025, Bybit reported over 80 million registered users and ranked among the world’s largest crypto exchanges by derivatives volume.
- [1]MEDBybit – Wikipediaother
- [2]MEDBen Zhou – CryptoSlate profileother
February 2025 Hack — $1.46 Billion Ethereum Theft
On February 21, 2025, Bybit suffered the largest single cryptocurrency theft ever recorded. Approximately 401,347 ETH — valued at roughly $1.46 billion at the time — was drained from a Bybit cold wallet during a routine transfer to a warm wallet. The attack was a sophisticated supply chain compromise: a macOS workstation belonging to a Safe{Wallet} developer was compromised on or around February 4, 2025, via a suspected social engineering vector involving a malicious Docker project that initiated outbound traffic to the domain getstockprice[.]com. The attackers used this foothold to inject malicious JavaScript into the S3 bucket serving app.safe.global, Bybit's Safe{Wallet} management interface. The tampered JavaScript was last modified on February 19, 2025 — two days before the exploit — and was designed to silently rewrite the destination address and logic of any transaction initiated from Bybit's specific cold wallet addresses, while displaying a legitimate-looking transaction to Bybit's signers. When Bybit's multi-signature approvers reviewed and signed what appeared to be a standard cold-to-warm transfer, they unknowingly authorized the modified, malicious transaction. The full amount was transferred to addresses under attacker control.
- [1]HIGHFBI / IC3 Public Service Announcement: North Korea Responsible for $1.5 Billion Bybit Hackregulatory
- [2]MEDBybit Hack Traced to Safe{Wallet} Supply Chain Attack – The Hacker Newsnews article
- [3]MEDNCC Group: In-Depth Technical Analysis of the Bybit Hackresearch
- [4]MEDSygnia's Investigation into the Bybit Hackresearch
- [5]MEDChainalysis: Collaboration in the Wake of Record-Breaking Bybit Thefton chain
- [6]MEDElliptic: Bybit Hack – Largest in History, Following the Money Trailon chain
Attribution — North Korea Lazarus Group (TraderTraitor)
On February 21, 2025, blockchain investigator ZachXBT submitted a detailed report to Arkham Intelligence proving Lazarus Group's involvement within hours of the theft. ZachXBT's submission included analysis of test transactions and connected wallets used ahead of the exploit, forensic graphs, and timing analyses consistent with known Lazarus Group operational patterns. The same investigation linked the Bybit attacker wallets to the approximately $73 million Phemex hack that occurred in January 2025. On February 26, 2025, the FBI formally confirmed the attribution, designating the responsible actor as TraderTraitor — also tracked by other threat intelligence vendors as Jade Sleet, Slow Pisces, and UNC4899. The FBI published 50 Ethereum wallet addresses connected to the theft and requested that RPC node operators, exchanges, and blockchain analytics firms block related transactions. ZachXBT additionally found that within 15 hours of the public disclosure, Lazarus-linked wallets launched memecoin projects on Pump.fun on Solana, apparently as a laundering vector: one address bridged $1.08 million in USDC from the stolen ETH to Solana and launched a token called QinShihuang, which recorded over $26 million in trading volume. By March 20, 2025, Bybit CEO Ben Zhou disclosed that hackers had converted approximately 86.29% of the stolen ETH into Bitcoin and dispersed it across thousands of addresses.
- [1]HIGHFBI / IC3 Public Service Announcement: North Korea Responsible for $1.5 Billion Bybit Hackregulatory
- [2]MEDBybit's $1.4 Billion Hack Traced to Lazarus Group: ZachXBT – Mitradenews article
- [3]MEDZachXBT: Bybit Hackers May Be Behind Solana Memecoin Scams – CoinTelegraphnews article
- [4]MEDZachXBT Links Bybit Hack Launderers to Memecoin Activity on Pump.fun – The Coinomistnews article
- [5]MEDFBI Confirms Lazarus Hackers Were Behind $1.5B Bybit Crypto Heist – Bleeping Computernews article
- [6]MEDTRM Labs: The Bybit Hack – Following North Korea's Largest Exploiton chain
Exchange Response and Solvency
CEO Ben Zhou publicly addressed users within approximately 30 minutes of the breach via a live-streamed Q&A, providing daily updates. Bybit assured customers that the exchange remained solvent and that all losses would be covered through internal funds and emergency bridge loans. Critically, Bybit did not impose a withdrawal freeze at any point during or after the incident, though the exchange acknowledged processing delays of several hours for some users amid a surge of over $4 billion in withdrawal requests within the first 12 hours. Within 72 hours of the hack, Bybit replenished nearly 447,000 ETH through emergency arrangements with trading firms including Galaxy Digital, FalconX, and Wintermute. On February 26, 2025 — five days after the hack — security auditor Hacken published a Proof of Reserves verification confirming Bybit's reserve ratio exceeded 100%, indicating that user liabilities were fully backed. Ben Zhou also launched a bounty program offering up to $140 million for information leading to the tracing or freezing of stolen funds. Bybit published two separate forensic reports in the weeks following the incident, and the incident prompted broader industry discussion about systemic risks in multi-signature wallet UX and third-party frontend dependencies.
- [1]HIGHCNBC: Bybit Says It Fully Replenished Reserves After Record $1.5 Billion Hacknews article
- [2]MEDHacken: Bybit Proof of Reserves Case Studyresearch
- [3]MEDYahoo Finance: Bybit CEO Declares War on Lazarus Group, Launches $140M Bountynews article
- [4]HIGHCSIS: The ByBit Heist and the Future of U.S. Crypto Regulationresearch
ICIJ Coin Laundry Investigation — Criminal Money Flow Allegations
In November 2025, the International Consortium of Investigative Journalists (ICIJ) published The Coin Laundry, a 10-month investigation by more than 100 journalists from 37 news organizations across 35 countries. The investigation identified Bybit among a group of major exchanges — including Binance, OKX, HTX, and Kraken — whose customer accounts were cited as recipients of funds traced to international criminal networks. According to the investigation, scam-linked funds were being sent to accounts at Bybit and other named exchanges. The ICIJ found that crypto flows connected to criminal enterprises including North Korean hacking groups, Chinese and Russian criminal organizations involved in human trafficking, drug trafficking (including fentanyl), and the Sinaloa cartel transited through major exchange accounts. The investigation noted that some of these accounts were opened with minimal or no client identification requirements at cash-desk-style operations. The ICIJ did not provide granular transaction data specific to Bybit, and the investigation does not allege that Bybit itself operated these accounts or was complicit in the criminal activity. No regulatory enforcement action against Bybit arising from the ICIJ investigation had been publicly announced as of the time of this report.
- [1]MEDProtos: Binance, OKX, HTX, Bybit, Kraken Cited in ICIJ Scam Probenews article
- [2]HIGHICIJ: About the Coin Laundry Investigationnews article
- [3]HIGHCoinDesk: ICIJ Exposes 'Coin Laundry,' Crypto's Criminal Financial Systemnews article
Regulatory Status and Jurisdiction Restrictions
Bybit was originally incorporated in the British Virgin Islands, though that entity was dissolved in July 2023 according to the BVI Financial Services Commission. The exchange relocated its global headquarters to Dubai, UAE, announcing the move in March 2022 following in-principle approval from Dubai’s Virtual Assets Regulatory Authority (VARA). In May 2025, Bybit obtained a full EU MiCAR license in Austria, and in October 2025, it received a UAE Securities and Commodities Authority (SCA) license. The exchange remains blocked or restricted in multiple jurisdictions, including the United States, Canada, mainland China, Hong Kong, and France. In October 2023, the UK’s Financial Conduct Authority (FCA) imposed new rules on crypto promotions, which led Bybit to suspend services to UK customers; Bybit subsequently relaunched UK services in December 2025 under FCA-compliant arrangements.
- [1]MEDBybit Restricted Countries – Datawalletother
- [2]MEDBybit UK Ban Explained – Crypternonnews article
- [3]MEDBrokerChooser: Is Bybit Safe or a Scam Broker?research
Industry and Policy Implications
The February 2025 hack prompted broader industry and government scrutiny of multi-signature wallet infrastructure, third-party frontend dependencies, and the security of cold wallet management processes at exchanges. The Wilson Center and CSIS both published analyses arguing the incident highlighted the need for enhanced regulatory oversight of large crypto custodians and exchange security standards. The Paul Hastings law firm noted potential implications for U.S. regulatory approaches to exchange custody requirements. DeFiLlama's hack tracking database lists the Bybit incident as the single largest crypto exchange hack ever recorded, dwarfing prior incidents and accounting for a substantial portion of total crypto hack losses in 2025. The incident also renewed attention to the threat posed by North Korean state-sponsored hackers, who the FBI tracks as TraderTraitor. A 2024 United Nations Panel of Experts report estimated that DPRK-linked groups stole over $3 billion in cryptocurrency between 2017 and 2023, a figure that does not include the 2025 Bybit theft.
- [1]HIGHWilson Center: The Bybit Heist — What Happened and What Now?research
- [2]HIGHCSIS: The ByBit Heist and the Future of U.S. Crypto Regulationresearch
- [3]MEDPaul Hastings: The Bybit Hack of 2025 — Potential Implicationsnews article
- [4]MEDDeFiLlama Hacks Databaseon chain
- [5]MEDThe Block: From Bybit to GMX — The 10 Biggest Crypto Hacks of 2025news article
Timeline
2018-03-01
Bybit founded in Singapore by Ben Zhou, focused on cryptocurrency derivatives trading.
Wikipedia / CryptoSlate2022-03-01
Bybit relocates global headquarters from Singapore to Dubai, UAE, following in-principle approval from VARA.
Wikipedia2023-10-01
UK Financial Conduct Authority (FCA) implements new crypto promotion rules; Bybit suspends services to UK customers.
Crypternon2025-01-01
Lazarus Group-linked wallets later connected to the Bybit hack conduct the $29 million Phemex hack, according to ZachXBT's on-chain investigation.
CoinTelegraph / ZachXBT via Arkham Intelligence2025-02-04
A macOS workstation belonging to a Safe{Wallet} developer is compromised via suspected social engineering, initiating the supply chain attack.
Sygnia / The Hacker News2025-02-19
Malicious JavaScript is injected into the S3 bucket serving the Safe{Wallet} frontend (app.safe.global), specifically targeting Bybit's cold wallet addresses.
NCC Group technical analysis2025-02-21
Approximately 401,347 ETH (~$1.46 billion) is stolen from Bybit's cold wallet during a routine transfer via the compromised Safe{Wallet} interface. ZachXBT submits a detailed attribution report to Arkham Intelligence linking the attack to Lazarus Group. Lazarus-linked wallets also launch memecoin projects on Pump.fun on Solana as a laundering vector.
IC3 / ZachXBT / Arkham Intelligence2025-02-24
Bybit announces it has fully replenished reserves within 72 hours, securing approximately 447,000 ETH through emergency funding from Galaxy Digital, FalconX, and Wintermute.
CNBC2025-02-26
FBI formally attributes the hack to North Korean TraderTraitor (Lazarus Group) and publishes 50 associated Ethereum wallet addresses. Security auditor Hacken simultaneously publishes a Proof of Reserves confirming Bybit's reserve ratio exceeds 100%.
FBI IC3 / Hacken2025-03-20
Bybit CEO Ben Zhou discloses that hackers converted approximately 86.29% of stolen ETH to Bitcoin and dispersed it across thousands of addresses on multiple blockchains.
Chainalysis / TRM Labs2025-11-17
ICIJ publishes The Coin Laundry investigation, citing Bybit among major exchanges whose customer accounts received funds traced to international criminal organizations.
CoinDesk / ICIJResearch Gaps
2 open · agent-resolvableHeuristic next-actions surfaced for researchers and worker agents. Resolving these strengthens the page's evidence base and trust score.
- [high]no regulatory
No regulatory or sanctions cross-check. Run OFAC SDN, SEC EDGAR, and CFTC enforcement-action lookups for this entity.
- [med]unarchived sources
Cited sources are not Wayback-archived. Run the archiver to pin their content before they rot.
This investigation is cryptographically anchored to the Solana blockchain and source URLs are archived via the Internet Archive. Full audit log →
model: claude-sonnet-4-6
generated: 5/4/2026, 2:54:10 AM
last updated: 5/9/2026, 3:28:15 AM
avoid.net — verified advice for a post-truth world