Bybit Hack Analysis: Strengthening Crypto Exchange Security
By
Ben Kim
November 17, 2025
4-minute read
By
Ben Kim
November 17, 2025
4-minute read
.png)

The $1.4 billion hacking incident that occurred on February 21, 2025, at the cryptocurrency exchange Bybit sent shockwaves throughout the cryptocurrency industry. The theft of a massive amount of cryptocurrency assets, including 401,347 Ethereum, shows that even the top 10 global cryptocurrency exchanges, presumed to maintain high security, are not immune to hacking.
This blog post aims to provide a detailed analysis of the Bybit hacking incident, examining the causes, impact, and potential security enhancement measures.
This hacking incident was a highly sophisticated attack that exploited vulnerabilities between the Safe{Wallet} platform and Bybit's internal systems. The attacker injected malicious JavaScript code into the app.safe.global platform, which Bybit signers used for transaction management. This malicious code was designed to remain dormant until specific conditions were met, activating at a specific time to target high-value assets.
The attacker injected malicious JavaScript code into app.safe.global, accessed by Bybit signers. This code was designed to operate only under specific conditions, remaining undetected by ordinary users while targeting high-value assets.
Two key JavaScript files were modified for the attack: _app-52c9031bfa03da47.js and 6514.b556851795a4cbaa.js. These files were subtly altered to manipulate critical functions related to transaction execution, signing, and gas limit calculations.
The malicious code targeted specific addresses and transaction types. It verified the signer and Safe addresses against a predefined target list. If a signer's address was identified as a target, the page would reload to prevent the signing of proposals.
The core of the hack focused on the Safe address. If the Safe address was a target and the current transaction operation was set to its default value (0), the malicious code would be executed.
The attackers exploited vulnerabilities in the Safe{Wallet} platform. By injecting malicious code into the transaction signing process, they were able to alter transaction details while displaying a normal address on the UI, deceiving signers into approving malicious transactions.
The attackers bypassed the multi-signature mechanism by manipulating the UI and altering transaction data, tricking signers into authorizing the transfer of funds to the attacker's control. The UI displayed a normal transaction, but the actual data was modified to transfer funds to the attacker.
Investigations suggest a potential compromise of Safe.Global's AWS infrastructure, with the possibility of the AWS S3 or CloudFront account/API Key being leaked or compromised. This could have allowed the attacker to modify JavaScript files hosted on Safe.Global's infrastructure.
Leaked API keys or compromised AWS S3 accounts can have severe consequences, allowing attackers to:
The FBI has attributed the Bybit hack to the North Korean hacking group TraderTraitor, also known as the Lazarus Group. The Lazarus Group has a history of sophisticated cyberattacks targeting cryptocurrency exchanges and financial institutions for financial gain.
Bybit has taken several steps to address the breach and restore user trust:
Safe{Wallet} also acknowledged the system breach and took the following actions:
The Bybit hacking incident highlights crucial areas for improvement in the cryptocurrency industry:
The Bybit hacking incident serves as a stark reminder of the risks faced by the cryptocurrency industry. This incident should be a catalyst for all stakeholders, including exchanges and related businesses, to reinforce security measures. Collective wisdom and collaboration are crucial for building a more secure and trustworthy cryptocurrency ecosystem.
While investigations are ongoing, the Bybit hacking incident may have been caused by the leakage of an API key that granted access to Safe{Wallet}’s S3 or CloudFront. With the increasing use of cloud systems and SaaS services, hacking incidents caused by the leakage of non-human identities like API keys are on the rise. Therefore, it is critical to monitor API key leakage centrally and implement measures to mitigate threats related to non-human identities.
Cremit provides internal monitoring for non-human identity leaks and accurate API key detection. If you need assistance, start here or contact us
.png)
Need answers? We’ve got you covered.
Below are some of the most common questions people ask us. If you can’t find what you’re looking for, feel free to reach out!
We specialize in high-converting website design, UX/UI strategy, and fast-launch solutions for SaaS and startup founders.
Helping SaaS and startup founders succeed with conversion-focused design, UX strategy, and quick deployment.
Designing sleek, user-focused websites that help SaaS and startup teams launch faster and convert better.
We design and launch beautiful, conversion-optimized websites for ambitious SaaS and startup founders.
