Article Details

Scrape Timestamp (UTC): 2025-02-26 23:12:58.462

Source: https://www.theregister.com/2025/02/26/bybit_lazarus_bounty/

Original Article Text

Click to Toggle View

Bybit declares war on North Korea's Lazarus crime-ring to regain $1.5B stolen from wallet. Up to $140M in bounty rewards for return of Ethereum allegedly pilfered by hermit nation. Cryptocurrency exchange Bybit, just days after suspected North Korean operatives stole $1.5 billion in Ethereum from it, has launched a bounty program to help recover its funds. In announcing the initiative, CEO and co-founder Ben Zhou claimed Kim Jong Un's crack cyber-crime ring Lazarus pilfered the digital dosh, which would be a record for the Norks. The lazarusbounty.com program claims to have already paid out more than $4 million in rewards to those who have helped Bybit in its quest to claw back its stolen coins. "We will not stop until Lazarus or bad actors in the industry are eliminated," Zhou said. "In the future we will open it up to other victims of Lazarus as well." Here's how the program works: If someone spots and reports a blockchain transaction or transfer involving currency that can be traced back to the theft from Bybit's wallet, they'll get five percent of the crypto-cash upon its recovery, and the exchange or mixer that facilitated the retrieval will get a five percent cut, too. That means about $140 million is up for grabs total. Zhou also said his biz is setting up a "HackBounty platform," for the whole industry to get involved with and hunt down criminals profiting from such thefts. “I am energized by the incredible camaraderie on-chain and in real life. This can be a transformative moment for our industry if we get it right. Together, we can build a stronger defense system against cyber threats,” said Zhou. Bybit insists it is still liquid, its customer accounts are unaffected, and that it has enough funds on hand to cover transactions despite the theft. Bybit's problems began on February 21 at approximately 1230 UTC when funds that were supposed to be transferred from an offline Ethereum (ETH) cold wallet to an online hot one were diverted, its postmortem explains. "The transaction was manipulated by a sophisticated attack that altered the smart contract logic and masked the signing interface, enabling the attacker to gain control of the ETH cold wallet. As a result, over 400,000 ETH and stETH worth more than $1.5 billion were transferred to an unidentified address." According to an analysis of the incident by forensic security outfit Sygnia Labs and financial investigators Verichains, the heist was pulled off by miscreants who were able to alter the JavaScript code of SafeWallet, which is used by Bybit to manage its funds, so that the Ethereum in transit ultimately ended up in North Koreans' pockets. Allegedly. It's believed the code was changed by compromising an AWS S3 or CloudFront account used by SafeWallet to host its software. This analysis has since been confirmed by the wallet maker itself, which said one of its developer machines was compromised – likely leading to the cloud storage tampering. "The forensic review into the targeted attack by the Lazarus Group on Bybit concluded that this attack targeted to the Bybit Safe was achieved through a compromised machine of a SafeWallet developer resulting in the proposal of a disguised malicious transaction," SafeWallet said. "Lazarus is a state-sponsored North Korean hacker group that is well known for sophisticated social engineering attacks on developer credentials, sometimes combined with zero-day exploits. Important! The forensic review of external security researchers did NOT indicate any vulnerabilities in the Safe smart contracts or source code of the frontend and services." Nevertheless the wallet site urged caution and said it was taking steps to hopefully avoid further attacks such as these.

Daily Brief Summary

NATION STATE ACTIVITY // Bybit Sets $140M Bounty on Stolen Ethereum, Targets Lazarus Group

Bybit cryptocurrency exchange launched a bounty program offering up to $140 million to recover $1.5 billion in Ethereum allegedly stolen by North Korea's hacker group, Lazarus.

CEO Ben Zhou claimed the theft was executed by North Korea’s renowned cyber-crime unit, describing the incident as one of the largest heists attributed to the group.

The Lazarusbounty.com program has already disbursed over $4 million in rewards to individuals aiding in the recovery of the stolen cryptocurrency.

Bybit announced a new "HackBounty platform" intended for industry-wide participation to track down and apprehend cyber criminals.

Despite the massive theft, Bybit maintains that it has sufficient liquidity and that customer accounts remain secure and unaffected.

The theft occurred during a compromised transaction between Bybit’s offline cold wallet and an online hot wallet, manipulated by altering the smart contract’s JavaScript code.

SafeWallet, the tool used by Bybit to manage funds, confirmed the breach stemmed from a compromised developer machine, which led to unauthorized cloud storage access and subsequent fund diversion.