lang icon En
Feb. 25, 2025, 12:17 a.m.
2382

Massive $1.5 Billion Ethereum Heist: Security Breach at Bybit Raises Alarms

Brief news summary

A significant cryptocurrency heist saw hackers breach an offline Ethereum wallet linked to the Bybit exchange, resulting in approximately $1.5 billion in losses, mainly in Ethereum tokens. This incident has sparked serious concerns regarding the security of cold wallets and multisignature systems that were previously considered safe. Check Point’s Blockchain Threat Intelligence reports that the attackers utilized sophisticated user interface manipulations and social engineering techniques to deceive key signers into approving fraudulent transactions rather than directly hacking the blockchain. They discovered a vulnerability in Safe Protocol’s execTransaction function, which allowed them to manipulate legitimate transaction requests. Oded Vanunu from Check Point Research highlighted the escalating vulnerability of cold wallets to advanced cyber threats and recommended that organizations enhance their transaction security measures. This breach reveals a troubling trend in cyber risks, demonstrating how social engineering exploits human errors in cryptographic systems. As threats to supply chains and UI security grow, Check Point advises organizations with substantial cryptocurrency holdings to reevaluate their security strategies and adopt traditional cybersecurity measures, including endpoint detection and real-time transaction verification to protect their digital assets.

In one of the most notable cryptocurrency heists to date, hackers breached an offline Ethereum wallet, making off with around $1. 5 billion in digital assets, predominantly Ethereum tokens. This attack, which specifically targeted the cryptocurrency exchange Bybit, has sparked fresh concerns regarding the security of even the most secure storage options. Traditionally, cold wallets and multisignature (multisig) authentication have been regarded as the gold standards in safeguarding digital assets; however, this recent incident highlights how human error and interface manipulation can compromise these protective measures. The breach was identified on February 21 by Check Point’s Blockchain Threat Intelligence system, which detected an anomaly in a transaction log on the Ethereum network. Researchers from Check Point quickly established that the attack stemmed from a sophisticated operation that exploited vulnerabilities beyond the scope of smart contract logic. Rather than directly assaulting blockchain protocols, the hackers manipulated user interfaces and employed advanced social engineering techniques to mislead key signers into approving falsified transactions. According to Check Point’s findings, the assault utilized a method first identified in July 2024, when researchers uncovered a sequence of exploits involving the Safe Protocol’s execTransaction function. Originally intended to facilitate secure multisig transactions, this function was weaponized by the attackers, who subtly modified authentic transaction requests. By altering the interface that signers used to authenticate transactions, they successfully deceived key custodians into inadvertently authorizing the massive fund transfer. "The attack on Bybit is not unexpected—last July, we discovered the very manipulation technique employed by attackers in this unprecedented heist, " noted Oded Vanunu, Chief Technologist and Head of Products Vulnerability Research at Check Point Research. "The most concerning takeaway is that even cold wallets—previously deemed the safest option—are now at risk.

This incident illustrates that a prevention-first strategy, which secures every phase of a transaction, is crucial for thwarting cybercriminals’ attempts at executing similar major attacks in the future. " This event signifies a pivotal moment regarding cyber threats to digital assets. Past significant hacks often exploited weaknesses in smart contract code or flaws in private key management. In stark contrast, the Bybit attack reveals the increasing sophistication of social engineering methods that circumvent technical security measures by exploiting human oversight. Check Point’s analysis emphasizes that no amount of cryptographic security can provide complete protection against deception, particularly if signers are misled during the transaction approval process. The ramifications of this attack reach well beyond Bybit. Researchers from Check Point caution that the rising trend of supply chain and UI manipulation attacks poses a serious risk to the security of digital assets. As attackers refine their techniques, organizations with substantial cryptocurrency holdings must reevaluate their security measures. Conventional cybersecurity tactics like endpoint threat detection, email security, and real-time transaction verification must be woven into the fabric of crypto asset protection strategies.


Watch video about

Massive $1.5 Billion Ethereum Heist: Security Breach at Bybit Raises Alarms

Try our premium solution and start getting clients — at no cost to you

Content creator image

I'm your Content Creator.
Let’s make a post or video and publish it on any social media — ready?

Language

Hot news

March 3, 2026, 1:31 p.m.

SMM Maritime Industry Report 2025: Shipowners and…

With one year remaining before SMM 2026 (Shipbuilding, Machinery and Marine Technology trade fair), the maritime industry demonstrates strong optimism and a clear willingness to invest.

March 3, 2026, 1:27 p.m.

Microsoft's 18-Month Marketing Automation Claim: …

Mustafa Suleyman, a leading AI expert, has highlighted the rapid automation of marketing through AI technologies, generating significant interest among marketers and strategists navigating this transformative shift.

March 3, 2026, 1:19 p.m.

Salesforce Strengthens AI Strategy with Bluebirds…

Salesforce, the global leader in customer relationship management (CRM) software, has announced its plan to acquire Bluebirds, an AI-driven presales prospecting platform, aiming to enhance its artificial intelligence capabilities and improve early-stage sales efficiency.

March 3, 2026, 1:19 p.m.

Meta's AI Research Lab Develops Real-Time Languag…

Meta's AI research lab has achieved a major breakthrough by developing a real-time language translation system that enables seamless communication between speakers of different languages, effectively bridging global communication gaps.

March 3, 2026, 1:13 p.m.

AI‑SEO explained: what dentists actually need to …

Join David Nelkin on 10 March at 7pm as he explores what dentists truly need to do for effective search engine optimisation (SEO) in 2026.

March 3, 2026, 1:12 p.m.

AI in Video Games: Creating More Realistic and Im…

The gaming industry is experiencing a revolutionary shift through the growing incorporation of artificial intelligence (AI) technologies.

March 3, 2026, 9:21 a.m.

AI didn’t kill SEO. It killed average content.

The emergence of artificial intelligence has fundamentally transformed the field of search engine optimization (SEO), shifting the emphasis from merely producing large volumes of content to generating high-quality, authentic material that genuinely benefits the reader.

All news

AI Company

Launch your AI-powered team to automate Marketing, Sales & Growth

AI Company welcome image

and get clients on autopilot — from social media and search engines. No ads needed

Begin getting your first leads today