CATEGORIES

The Bybit Incident

The Bybit Incident: When Research Meets Reality

February 23, 2025

Research by Dikla Barda, Roman Ziakin and Oded Vanunu

On February 21st, Check Point Blockchain Threat Intel System alerted on a critical attack log on the  Ethereum blockchain network.

The log indicated that the AI engine identify anomality change with this transaction and categorize it as critical attack in real time. It was indicated that ByBit cold wallet got hacked, resulting in the theft of approximately $1.5 billion worth of digital assets, primarily in Ethereum tokens. This incident marks one of the largest thefts in the history of the digital asset industry.

Executive Summary:

  • In one of the largest thefts in digital asset history, hackers gained access to an offline Ethereum wallet and stole $1.5 billion worth of digital assets, primarily consisting of Ethereum tokens.
  • The recent incident with Bybit marks a new phase in attack methods, featuring advanced techniques for manipulating user interfaces. Rather than just targeting protocol flaws, the attackers used clever social engineering to trick users, which led to the compromise of a major institutional multisig setup.
  • This past July, Check Point’s Threat Intelligence Blockchain system identified and published a concerning new findings where attackers manipulating legitimate transactions through the Safe Protocol’s execTransaction function.
  • The recent hack highlights that multisig cold wallets are not secure if signers can be deceived or compromised, emphasizing the growing sophistication of supply chain and user interface manipulation attacks.
  • The Bybit hack challenges previous beliefs about crypto security, showing that despite strong smart contracts and multisig protections, the human factor is often the weakest link. This incident highlights how UI manipulation and social engineering can compromise even the most secure wallets.

The Evolution of Protocol Exploitation

Published in July 2024, the research provided technical analysis of how the function operates within the Safe framework and documented cases where it was used in attack chains.

The research focused on understanding the technical mechanics of the Safe Protocol’s execTransaction function and its potential for misuse, highlighting the importance of understanding how legitimate protocol features could be leveraged unexpectedly.

The recent Bybit incident represents a significant evolution of these attack patterns, introducing sophisticated UI manipulation techniques not previously seen. Instead of just exploiting protocol mechanics, the attackers employed advanced social engineering through manipulated interfaces, allowing them to compromise a significant institutional multisig setup.

The Attack Breakdown

Initial Compromise

The attack originated from wallet address 0x47666fab8bd0ac7003bce3f5c3585383f09486e2, which executed an ExecTransaction on the Gnosis Safe multisig proxy contract.

This widely used multisig implementation relies on externally provided bytes signatures to authorize actions on behalf of the multisig.

A critical vulnerability in this setup stems from Gnosis Safe’s reliance on externally generated signatures rather than on-chain voting. This design choice makes it susceptible to:

  • UI manipulation
  • Malware infection
  • Unauthorized signature generation

Attack Execution Flow

  1. The attacker identified each multisig signers responsible for approving transactions. They likely used malware, phishing, or a supply-chain compromise to access to their devices.
  2. The signers interacted with a fake UI that appeared to show a legitimate transaction. The details and even the URL seemed to come from @safe, a trusted multisig wallet provider.
  3. After approving the transaction, the signers unknowingly handed over control of the cold wallet to the attacker.
  4. The attacker then executed a delegate call using stolen keys to their contract at 0xbdd077f651ebe7f7b3ce16fe5f2b025be2969516, triggering the transfer function.
  5. Since the malicious contract was unverified, it needed to be decoded to understand the function of the transfer:

    It contained code that overwrote the _transfer address in SLOT[0] of the contract, which executes the function in the original ByBit contract. Since the attacker’s contract declares _transfer as its first state variable, when called via delegatecall, this storage slot maps to the target contract’s SLOT[0]. This means that when the Safe multisig executes the delegatecall to this contract, the malicious contract’s code runs in the context of the Safe contract. By overwriting this slot, the attacker could alter the contract’s behavior.
  6. This manipulation redirected further delegations to the attacker’s contract at 0xbDd077f651EBe7f7b3cE16fe5F2b025BE2969516
  7. The attacker’s contract includes Sweep functions, which were executed via delegation to transfer funds.
  8. This series of transactions resulted in the theft of over $1 billion in assets, including 400,000 ETH

This transaction is responsible for stealing over 1 billion dollars in lost:

For example, 400,000 ETH:

Why This Attack is So Significant

This hack sets a new precedent in crypto security by bypassing a multisig cold wallet without exploiting any smart contract vulnerability. Instead, it exploited human trust and UI deception:

  • Multisigs are no longer a security guarantee if signers can be compromised.
  • Cold wallets aren’t automatically safe if an attacker can manipulate what a signer sees.
  • Supply chain and UI manipulation attacks are becoming more sophisticated.

Conclusion

The Bybit hack has shattered long-held assumptions about crypto security. No matter how strong your smart contract logic or multisig protections are, the human element remains the weakest link. This attack proves that UI manipulation and social engineering can bypass even the most secure wallets. The industry needs to move to end to end prevention, each transaction must be validated.

POPULAR POSTS

BLOGS AND PUBLICATIONS

  • Check Point Research Publications
  • Global Cyber Attack Reports
  • Threat Research
February 17, 2020

“The Turkish Rat” Evolved Adwind in a Massive Ongoing Phishing Campaign

  • Check Point Research Publications
August 11, 2017

“The Next WannaCry” Vulnerability is Here

  • Check Point Research Publications
January 11, 2018

‘RubyMiner’ Cryptominer Affects 30% of WW Networks