Bybit's $1.5B ETH Hack: 1 Year Later, DPRK's Threat Is More Dangerous Than Ever

WhaleScanFebruary 22, 2026

ETH cryptocurrency

The Largest Crypto Heist in History — and What Followed

On February 21, 2025, approximately 401,347 ETH — worth roughly $1.5 billion at the time — vanished from Bybit's cold wallet in what would become the single largest cryptocurrency theft ever recorded. Within days, the FBI officially attributed the attack to TraderTraitor, a subunit of North Korea's Reconnaissance General Bureau (RGB) 3rd Bureau, operating under the umbrella commonly known as the Lazarus Group. One year later, the vast majority of the stolen funds have been laundered, and North Korea's crypto threat apparatus has grown more sophisticated, more brazen, and more dangerous than ever before.

Anatomy of the Attack: A Supply Chain Masterclass

The Bybit hack was not a brute-force exploit or a smart contract vulnerability. It was a meticulously planned supply chain attack targeting Safe{Wallet}, the multi-signature wallet solution Bybit relied upon for cold storage management. On February 4, 2025 — more than two weeks before the theft — North Korean operatives compromised a macOS workstation belonging to a Safe{Wallet} developer through social engineering, likely a spear-phishing campaign disguised as a recruitment outreach or business opportunity.

With the developer's machine under their control, the attackers stole AWS session tokens, effectively bypassing multi-factor authentication (MFA). They then injected malicious JavaScript into the Safe{Wallet} user interface — code that activated exclusively when Bybit was about to execute a transaction from its cold wallet. According to technical analyses by Sygnia and NCC Group, the attack was surgically precise: Bybit employees saw what appeared to be a legitimate transfer from the cold wallet to a warm wallet. In reality, they were signing transactions that redirected all funds to attacker-controlled addresses. The elegance of the deception was its specificity — the entire Safe{Wallet} application functioned normally for every other user and every other transaction.

Following the Money: A 45-Day Laundering Machine

The speed and efficiency of the laundering operation was staggering. Within 48 hours of the theft, at least $160 million had been funneled through illicit channels. By February 26, 2025, that figure had surpassed $400 million. Bybit CEO Ben Zhou revealed on March 20, 2025 that 86.29% of the stolen ETH had been converted to Bitcoin — a strategic choice, as Bitcoin's UTXO transaction model is harder to trace than Ethereum's account-based system.

The laundering toolkit was comprehensive. According to Elliptic and Chainalysis, the hackers employed Tornado Cash and other mixing protocols, decentralized exchanges (DEXs), cross-chain bridges, and Chinese-language over-the-counter (OTC) brokers. On March 12, 2025, blockchain security firm Certik detected 400 ETH being routed through Tornado Cash. Chainalysis's 2026 report documented that DPRK laundering operations follow a remarkably consistent 45-day cycle from theft to final funds dispersal, with a 355–1,000% higher reliance on Chinese-language money movement services compared to other criminal groups.

Recovery efforts have been modest at best. Chainalysis, working with industry partners, managed to freeze approximately $40 million — just 2.7% of the total stolen amount. As the Wilson Center's analysis emphasized, the window for fund recovery is "extremely narrow," limited to three stages: BTC conversion, stablecoin exchange, or fiat cash-out.

DPRK by the Numbers: A State-Sponsored Crypto Empire

The Bybit hack, devastating as it was, represents just one data point in North Korea's escalating crypto theft campaign. According to Chainalysis's 2026 annual report, total crypto theft in 2025 reached $3.4 billion, with DPRK-linked hackers responsible for $2.02 billion — a 51% year-over-year increase. North Korea's cumulative crypto theft now stands at an estimated $6.75 billion.

What makes this trajectory particularly alarming is the efficiency gains. North Korea executed 74% fewer known attacks in 2025 while achieving record-breaking theft volumes. The top three hacks accounted for 69% of all service compromise losses, and for the first time, the ratio between the largest theft and the median exceeded 1,000x. The Lazarus Group is getting better at picking its targets and maximizing impact per operation.

A January 2026 analysis from 38 North characterized the DPRK as "the first rogue crypto-superpower," noting that based on cumulative theft volumes, Pyongyang could rank among the world's largest state-level Bitcoin holders, behind only the United States and China. This is not merely cybercrime — it is a national revenue strategy. A 2024 Biden administration official stated that approximately 50% of North Korea's foreign-currency earnings derive from cyber operations, and UN reports have documented that weapons of mass destruction (WMD) development relies substantially on these proceeds. CNN reported the White House's assessment that "half of North Korea's missile program is funded by cyberattacks and crypto theft."

2026: The Threat Evolves — From Infiltration to Creation

One year after Bybit, the threat has not subsided — it has mutated. Elliptic's February 2026 anniversary report documented that January 2026 saw twice as many crypto exploits as January 2025. But the most alarming development is a fundamental shift in tactics: North Korean operatives are no longer just infiltrating crypto projects — they are building them from scratch.

The Tenexium incident stands as the clearest example. On January 1, 2026, a trading protocol launched on the Bittensor (TAO) network, led by what investigators later identified as a DPRK IT worker using a fabricated persona. The platform attracted liquidity until its website abruptly went offline, resulting in $2.5 million in suspicious withdrawals. Elliptic's investigation concluded with high confidence that DPRK operatives were responsible and that this represented an evolution from infiltrating existing projects to creating honeypot platforms from inception.

Simultaneously, two active social engineering campaigns continue to harvest victims. DangerousPassword compromises social media accounts and uses fake software audio errors during video calls to trick targets into executing command-line malware installations. Contagious Interview baits victims with fabricated job opportunities, embedding malware in coding assessment repositories. Between January 1 and February 20, 2026, these two campaigns alone extracted $37.5 million.

The DPRK's IT worker infiltration program also continues to expand. Operatives use cloned accounts, fabricated employment histories, and "rented" laptops routed through intermediary countries to embed themselves in legitimate crypto companies. 38 North reported that North Korea has purchased over 2,000 computers and graphics cards, suggesting an expansion of its hacker training pipeline and offensive cyber capabilities.

Industry and Regulatory Response: Progress, but Not Enough

The Bybit incident catalyzed meaningful changes in crypto custody practices. According to CSIS, most top-tier centralized exchanges have migrated from traditional smart-contract multi-signature systems to Multi-Party Computation (MPC) technology, which distributes cryptographic key fragments across multiple parties and eliminates the single-signer vulnerability that Lazarus exploited. Additional security measures gaining adoption include time-lock mechanisms for large transfers, AI-driven real-time transaction monitoring, and pre-signing transaction simulations.

The FBI's Internet Crime Complaint Center (IC3) issued formal guidance urging RPC node operators, exchanges, bridges, blockchain analytics firms, and DeFi services to block transactions associated with TraderTraitor addresses. The U.S. Treasury has expanded sanctions targeting DPRK bankers and front companies laundering cybercrime proceeds.

Yet significant gaps remain. As Paul Hastings noted in its legal analysis, most jurisdictions maintain largely unregulated crypto environments despite existing AML/KYC guidelines from the Financial Action Task Force (FATF). Decentralized exchanges lack economic incentives to reject suspicious transactions — the exchange eXch, for instance, processed Bybit-linked swaps generating hundreds of thousands in fees. CSIS identified the fundamental tension: the Trump administration's push to make America the "crypto capital of the planet" sits uneasily alongside the demonstrated national security risks. Their recommendation: "regulate the downsides of crypto so investors can benefit from the upsides."

The absence of a coordinated global regulatory framework remains perhaps the most critical vulnerability. Cross-border information sharing is slow, KYC requirements are inconsistent across jurisdictions, and the 45-day laundering window typically closes long before international law enforcement can coordinate a response.

Outlook: Preparing for the Next Bybit

The uncomfortable truth, one year after the Bybit hack, is that the conditions enabling such an attack have improved only marginally. North Korea's crypto theft apparatus is not a criminal enterprise in the traditional sense — it is a state-sponsored intelligence operation backed by the resources and patience of a nuclear-armed regime. The shift from infiltration to project creation, the doubling of attack frequency in January 2026, and the continued expansion of IT worker pipelines all point in the same direction: the next Bybit-scale incident is not a matter of if, but when.

For institutional investors, crypto companies, and policymakers, the lessons are clear. Technical security — cold wallets, multi-sig, even MPC — is necessary but not sufficient. The Bybit hack was not a failure of cryptographic security; it was a failure of human and supply chain security. Organizations must invest in social engineering resilience training, rigorously vet third-party software providers, implement transaction delay mechanisms for large transfers, and assume that the most skilled state-sponsored hackers in the world are actively probing their defenses. The anniversary of the Bybit hack is not a commemoration — it is a warning that the war for crypto security has only intensified, and the adversary is learning faster than the industry.

You might also like

SEC DeFi Interface Breakthrough: Decentralized Trading Wins Official Green Light
2026년 4월 25일

SEC DeFi Interface Breakthrough: Decentralized Trading Wins Official Green Light

A Watershed Moment for U.S. DeFi On April 13, 2026, the U.S. Securities and Exchange Commission's D...

Kelp DAO $293M Exploit Exposes Critical Cross-Chain DeFi Security Flaws
2026년 4월 20일

Kelp DAO $293M Exploit Exposes Critical Cross-Chain DeFi Security Flaws

$293 Million Vanishes in 46 Minutes in 2026's Largest DeFi Catastrophe At 17:35 UTC on April 18, 20...

SEC Approves Decentralized Trading Interfaces: The DeFi Regulatory Revolution Begins
2026년 4월 19일

SEC Approves Decentralized Trading Interfaces: The DeFi Regulatory Revolution Begins

Introduction On April 13, 2026, the U.S. Securities and Exchange Commission's Division of Trading a...

SEC Innovation Exemption Launches in 2026: A Revolutionary Signal for Crypto Startups
2026년 4월 19일

SEC Innovation Exemption Launches in 2026: A Revolutionary Signal for Crypto Startups

Introduction: A Watershed Moment for U.S. Crypto Regulation In January 2026, the U.S. Securities an...