Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 30, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 30, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 30, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 30, 2025

      Does Elden Ring Nightreign have crossplay or cross-platform play?

      May 30, 2025

      Cyberpunk 2077 sequel enters pre-production as Phantom Liberty crosses 10 million copies sold

      May 30, 2025

      EA has canceled yet another game, shuttered its developer, and started more layoffs

      May 30, 2025

      The Witcher 3: Wild Hunt reaches 60 million copies sold as work continues on The Witcher 4

      May 30, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      How Remix is shaking things up

      May 30, 2025
      Recent

      How Remix is shaking things up

      May 30, 2025

      Perficient at Kscope25: Let’s Meet in Texas!

      May 30, 2025

      Salesforce + Informatica: What It Means for Data Cloud and Our Customers

      May 30, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Does Elden Ring Nightreign have crossplay or cross-platform play?

      May 30, 2025
      Recent

      Does Elden Ring Nightreign have crossplay or cross-platform play?

      May 30, 2025

      Cyberpunk 2077 sequel enters pre-production as Phantom Liberty crosses 10 million copies sold

      May 30, 2025

      EA has canceled yet another game, shuttered its developer, and started more layoffs

      May 30, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Bybit ETH Cold Wallet Compromised in Complex Cyberattack, Platform Secures Funds

    Bybit ETH Cold Wallet Compromised in Complex Cyberattack, Platform Secures Funds

    February 24, 2025

    Bybit Cyberattack

    Bybit, one of the leading cryptocurrency exchanges, detected unauthorized activity within one of its ETH cold wallets. The malicious actor successfully gained control of the affected cold wallet and transferred its holdings to an unidentified address. This Bybit cyberattack has targeted many crypto communities, but the exchange has been quick to respond, ensuring user funds and the overall platform’s security remain intact. 

    The cyberattack on Bybit targeted its Ethereum (ETH) multisig cold wallet. The incident began when a legitimate transfer to the platform’s warm wallet was manipulated. The attacker altered the underlying smart contract logic, while keeping the signing interface seemingly unchanged, masking the real intent behind the transaction. This allowed the attacker to take control of the wallet and transfer the assets—amounting to a large amount of ETH—to a fraudulent address. 

    Response to the Bybit Cyberattack 

    In response to this breach, Bybit’s security team partnered with leading blockchain forensic experts and partners to investigate the attack. The platform is actively working with any team with blockchain analytics expertise and fund recovery capabilities to trace and possibly recover the stolen assets.  

    Bybit Cyberattack 
    Bybit Cyberattack Details (Source: Bybit)

    The company has been transparent in sharing updates with its users and partners, assuring them that their funds are safe and that the breach did not affect other cold wallets. “We want to assure our users and partners that all other Bybit cold wallets remain fully secure. All client funds are safe, and our operations continue as usual without any disruption,” a statement from the company read. 

    Collaboration and Quick Response 

    The quick response from Bybit, along with its partners in the crypto community, played a critical role in mitigating the damage caused by the Bybit cyberattack. Bybit’s efforts were supported by multiple organizations, including Tether, THORChain, ChangeNOW, FixedFloat, and CoinEx, among others. These teams acted quickly to freeze and block the stolen assets, limiting the attacker’s ability to move the funds further. In a single day, $42.89 million was successfully frozen, marking a key victory in the battle against cybercrime in the crypto space. 

    The mETH Protocol team also played a crucial role in the recovery process. Through their prompt actions, they successfully retrieved 15,000 cmETH tokens, valued at around $43 million, which were subsequently returned to Bybit. This operation was pivotal in demonstrating the power of collaboration in fighting cyberattacks in the crypto world. 

    Ben Zhou, the CEO of Bybit, also provided regular updates on the progress of recovery, including reassuring the public that Bybit was working to close the gap caused by the breach. “Bybit has already fully closed the ETH gap, and a new audited Proof of Reserves (POR) report will be published very soon to show that Bybit is again back to 100% 1:1 on client assets,” he shared in a tweet, noting that Bybit had received a total of 446,870 ETH, worth $1.23 billion, through loans and deposits to bolster its reserves. 

    Transparency and Security 

    Despite the severity of the incident, Bybit has emerged resilient. The platform’s response to the data breach at Bybit has been quick and transparent. Within hours of the attack, Bybit processed over 350,000 withdrawal requests and completed 99.9% of them by 1:45 AM UTC. In total, the exchange processed over 580,000 successful withdrawal requests. 

    The company’s security team worked relentlessly to restore all services, and by February 22, 2025, Bybit’s deposit and withdrawal activity had returned to pre-incident levels. Total deposits slightly exceeded withdrawals, further indicating the market’s confidence in Bybit’s operations. Additionally, Bybit observed a surge in crypto asset deposits worth approximately $1.5 billion, reinforcing the platform’s reliability. 

    Although the incident led to a temporary spike in trading volumes, which saw users reallocating assets, the market has since stabilized. Bybit’s trading environment is now back to normal, with no unusual liquidations or sell-offs being reported. 

    Continuous Improvement in Security Measures 

    As part of its ongoing commitment to user security, Bybit has reassured its community that the platform is working to strengthen its security infrastructure. The exchange has promised to implement further measures to prevent future incidents and upgrade trust levels in its platform.

    Bybit’s approach to handling the cyberattack also highlights the importance of collaboration within the crypto community. Throughout the crisis, the platform received support from industry peers and partners, with many offering assistance in freezing the attacker’s stolen assets and blocking blacklisted addresses. This kind of teamwork has been instrumental in preventing the cyberattack from spiraling into a larger-scale disaster for the platform and its users.

    In addition to restoring its systems, Bybit has committed to publishing an audited Proof of Reserves report to demonstrate the complete recovery of its ETH reserves, offering users further transparency into the platform’s operations. Bybit has also urged users to stay vigilant and protect themselves against scams, reminding them that Bybit will never ask for personal information, deposits, or passwords. 

    With strong support from both users and partners, Bybit’s prompt actions have limited the attack’s damage and reinforced the importance of collaboration within the crypto community.

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleGoogle Cloud KMS Adds Quantum-Safe Digital Signatures to Defend Against Future Threats
    Next Article Australia Bans Kaspersky Software Over National Security and Espionage Concerns

    Related Posts

    Security

    China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

    May 31, 2025
    Security

    New Apache InLong Vulnerability (CVE-2025-27522) Exposes Systems to Remote Code Execution Risks

    May 31, 2025
    Leave A Reply Cancel Reply

    Hostinger

    Continue Reading

    Understanding Modern Development Frameworks: A Guide for Developers and Technical Decision-makers

    Development

    AMD’s next mobile chipset promises to provide faster 3D rendering than Apple’s M4 Pro

    Development

    LLMs Can Now Reason in Parallel: UC Berkeley and UCSF Researchers Introduce Adaptive Parallel Reasoning to Scale Inference Efficiently Without Exceeding Context Windows

    Machine Learning

    Solve forecasting challenges for the retail and CPG industry using Amazon SageMaker Canvas

    Machine Learning

    Highlights

    Artificial Intelligence

    Millions of new materials discovered with deep learning

    May 13, 2025

    We share the discovery of 2.2 million new crystals – equivalent to nearly 800 years’…

    PHP 8.4 Alpha 1 is now out!

    July 10, 2024

    Recover from Ransomware in 5 Minutes—We will Teach You How!

    April 18, 2024

    How to Fix Google Maps API Error: ApiNotActivatedMapError

    June 24, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.