

How the $1.5 Billion Bybit Hack Could Have Been Prevented - Ep. 791
9 snips Feb 28, 2025
Mudit Gupta, Chief Information Security Officer at Polygon and a specialist in blockchain security, dives into the recent $1.5 billion hack of Bybit by North Korea’s Lazarus Group. He explains how social engineering outsmarted traditional security measures, pointing out Bybit's mistake of holding too much Ethereum in a single wallet. Gupta shares crucial insights on crisis communication post-breach and offers essential security tips for crypto users, emphasizing that the industry must learn from these devastating lessons to enhance safety.
AI Snips
Chapters
Transcript
Episode notes
Bybit Hack Method
- Lazarus Group compromised a Safe developer's laptop, gaining access to Safe's AWS account.
- They pushed a malicious Safe Wallet website version, coded to only affect Bybit.
Lazarus Group Tactics
- Lazarus Group primarily uses social engineering tactics for exploits, like posing as podcast hosts or recruiters.
- They trick targets into installing malicious software through deceptive links or documents.
Verify Transactions
- Verify transactions using hardware wallets and CLI tools to prevent exploits.
- Don't solely rely on single platforms like Safe's website for transaction verification.