Bybit

Bybit

In 2025, North Korean state-sponsored hackers executed a sophisticated cyber attack on Bybit, a major cryptocurrency exchange, resulting in the theft of $1.46 billion in digital assets—the largest single incident in a year where over $2 billion was stolen from crypto platforms. The attack leveraged social engineering tactics, including impersonating recruiters, investors, and fake video calls to deploy malware, compromising both individual high-net-worth targets and organizational systems. The stolen funds are suspected to be funneling into North Korea’s nuclear and missile programs, exacerbating geopolitical tensions. Beyond financial losses, the breach undermined trust in crypto security, exposing vulnerabilities in human-centric defenses rather than technical flaws. The attack’s scale and attribution to a nation-state actor (Lazarus Group) highlight its strategic intent, extending beyond financial gain to fund illicit military ambitions, thereby posing a broader threat to global economic stability and cybersecurity infrastructure.

Source: https://www.helpnetsecurity.com/2025/10/08/north-korean-hackers-cryptocurrency-theft/

TPRM report: https://www.rankiteo.com/company/bybitexchange

"id": "byb1132111100825",
"linkid": "bybitexchange",
"type": "Cyber Attack",
"date": "6/2025",
"severity": "100",
"impact": "6",
"explanation": "Attack threatening the economy of geographical region"
{'affected_entities': [{'industry': 'Financial Services (Crypto)',
                        'location': 'Global (HQ in Dubai)',
                        'name': 'Bybit',
                        'type': 'Cryptocurrency Exchange'},
                       {'industry': 'Cryptocurrency Investors/Holders',
                        'location': 'Global',
                        'name': 'Unnamed High-Net-Worth Individuals',
                        'type': 'Individual'},
                       {'industry': 'Varied (Tech, Finance, AI, Healthcare, '
                                    'Government)',
                        'location': 'Global (US, Middle East, Australia)',
                        'name': 'Unnamed Companies with Crypto Holdings',
                        'type': 'Corporation'}],
 'attack_vector': ['Social Engineering',
                   'Phishing (fake video calls, job offers, impersonation)',
                   'Malware (via compromised repositories or command-line '
                   'code)',
                   'Insider Threat (clandestine IT workers)'],
 'data_breach': {'data_exfiltration': 'Yes (for extortion/ransom)',
                 'personally_identifiable_information': 'Likely (for targeted '
                                                        'individuals)',
                 'sensitivity_of_data': 'High (financial, administrative, and '
                                        'potentially classified data)',
                 'type_of_data_compromised': ['Cryptocurrency Private '
                                              'Keys/Wallet Credentials',
                                              'Corporate Data (via clandestine '
                                              'IT workers)',
                                              'Personally Identifiable '
                                              'Information (PII) of Targeted '
                                              'Individuals']},
 'date_publicly_disclosed': '2025',
 'description': 'North Korean hackers have stolen more than $2 billion in '
                'cryptocurrency in 2025, with the largest single attack being '
                'the February breach of cryptocurrency exchange Bybit ($1.46 '
                'billion stolen). Over thirty additional hacks have been '
                'linked to North Korea this year. The hackers are also '
                'targeting wealthy crypto holders, high-net-worth individuals, '
                'and professionals with access to organizational crypto '
                'holdings through social engineering tactics, including fake '
                'job offers, impersonation of recruiters/investors, and '
                "malware-laden 'skills tests.' The stolen funds are believed "
                "to support North Korea's nuclear weapons and missile "
                'programs. Additionally, North Korean IT workers are '
                'infiltrating organizations (including AI, financial, '
                'healthcare, and government sectors) to exfiltrate data or '
                'hold it for ransom.',
 'impact': {'brand_reputation_impact': ['Erosion of Trust in Cryptocurrency '
                                        'Security',
                                        'Reputational Damage to Affected '
                                        'Exchanges/Companies'],
            'financial_loss': '$2+ billion (2025 total, including $1.46 '
                              'billion from Bybit)',
            'identity_theft_risk': 'High (for targeted individuals and '
                                   'employees)',
            'operational_impact': ['Disruption of Cryptocurrency Transactions',
                                   'Loss of Trust in Crypto Platforms',
                                   'Potential Operational Disruptions in '
                                   'Infiltrated Organizations'],
            'payment_information_risk': 'High (cryptocurrency wallets and '
                                        'organizational funds)',
            'systems_affected': ['Cryptocurrency Exchanges (e.g., Bybit)',
                                 'Individual Crypto Wallets (high-net-worth '
                                 'targets)',
                                 'Corporate Networks (via compromised '
                                 'employees)',
                                 'AI, Financial, Healthcare, and Government '
                                 'Organizations (via clandestine IT workers)']},
 'initial_access_broker': {'backdoors_established': 'Likely (for persistent '
                                                    'access in corporate '
                                                    'networks)',
                           'data_sold_on_dark_web': 'Likely (stolen '
                                                    'credentials or '
                                                    'exfiltrated data)',
                           'entry_point': ['Social Media Impersonation',
                                           'Fake Video Calls',
                                           'Malicious Code Repositories (via '
                                           "'skills tests')",
                                           'Compromised Employee Accounts '
                                           '(clandestine IT workers)'],
                           'high_value_targets': ['Cryptocurrency Exchanges',
                                                  'High-Net-Worth Individuals',
                                                  'Employees with '
                                                  'Administrative Access to '
                                                  'Crypto Assets',
                                                  'AI/FinTech/Healthcare/Government '
                                                  'Organizations (via IT '
                                                  'workers)']},
 'investigation_status': 'Ongoing (Elliptic and other firms continue to '
                         'attribute attacks)',
 'lessons_learned': ['Social engineering is the dominant attack vector, '
                     'replacing technical exploits in blockchain code.',
                     'High-net-worth individuals and employees with access to '
                     'crypto assets are prime targets.',
                     'Clandestine IT workers pose a dual threat: financial '
                     'fraud and data exfiltration.',
                     'Multi-layered authentication and skepticism toward '
                     'unsolicited interactions are critical.'],
 'motivation': ["Financial Gain (funding North Korea's isolated economy)",
                'Support for Nuclear Weapons and Missile Programs',
                'Data Exfiltration for Extortion/Ransom'],
 'post_incident_analysis': {'corrective_actions': ['Shift focus to '
                                                   'human-centric security '
                                                   '(e.g., anti-phishing '
                                                   'training, behavioral '
                                                   'analysis).',
                                                   'Adopt zero-trust '
                                                   'frameworks for high-value '
                                                   'transactions and '
                                                   'administrative access.',
                                                   'Collaborate with '
                                                   'blockchain analytics firms '
                                                   'to trace and recover '
                                                   'stolen funds.',
                                                   'Implement stricter KYC '
                                                   '(Know Your Customer) and '
                                                   'background checks for IT '
                                                   'hires.'],
                            'root_causes': ['Over-reliance on technical '
                                            'security without addressing human '
                                            'vulnerabilities.',
                                            'Inadequate vetting of remote '
                                            'workers, enabling insider '
                                            'threats.',
                                            'Lack of real-time monitoring for '
                                            'social engineering attacks (e.g., '
                                            'fake video calls).',
                                            'High cryptocurrency valuations '
                                            'increasing incentive for theft.']},
 'ransomware': {'data_exfiltration': 'Yes (via clandestine IT workers)'},
 'recommendations': ['Implement stricter vetting for remote IT workers, '
                     'especially in high-risk sectors (crypto, AI, finance).',
                     'Enhance employee training on social engineering tactics '
                     '(e.g., fake job offers, impersonation).',
                     'Use behavioral analytics to detect anomalies in video '
                     'calls or code repository access.',
                     'Enforce multi-factor authentication (MFA) for all '
                     'high-value transactions and administrative access.',
                     'Monitor dark web for stolen credentials or data linked '
                     'to organizational assets.'],
 'references': [{'date_accessed': '2025',
                 'source': 'Elliptic (Blockchain Analytics Firm)'},
                {'date_accessed': '2025', 'source': 'Okta Research'}],
 'response': {'third_party_assistance': ['Elliptic (blockchain analytics)',
                                         'Okta (research on clandestine IT '
                                         'workers)']},
 'threat_actor': 'North Korean State-Sponsored Hackers (e.g., Lazarus Group, '
                 'APT38)',
 'title': 'North Korean Hackers Steal Over $2 Billion in Cryptocurrency in '
          '2025',
 'type': ['Cyber Theft',
          'Social Engineering',
          'Cryptocurrency Heist',
          'Espionage (via clandestine IT workers)',
          'Ransomware/Extortion'],
 'vulnerability_exploited': ['Human Error (lack of skepticism toward '
                             'unsolicited interactions)',
                             'Weak Authentication (compromised social media '
                             'accounts)',
                             'Lack of Multi-Factor Authentication (MFA) for '
                             'high-value targets',
                             'Insufficient Vetting of Remote IT Workers']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.