The Bybit hack was a carefully orchestrated attack that involved planting a fake security system, bypassing multi-signature approvals, inserting a backdoor, and draining funds. Hereâs a step-by-step breakdown of how it unfolded:
đ Step 1: The Hacker Set a Trap
đ
Date: February 19, 2025
đš The attacker deployed a malicious contract at 0xbDd077f651EBe7f7b3cE16fe5F2b025BE2969516.
đš This contract wasnât used immediatelyâit was a setup for the actual attack.
---
đ Step 2: Exploiting Multi-Signature Approval
đ
Date: February 21, 2025
đš Bybitâs wallet operates with a multi-signature system, requiring multiple approvals for major changes.
đš The hacker somehow obtained three key signatures (either stolen or forged).
đš Using these, they replaced Bybitâs original security contract with their malicious one.
đš This change was recorded in the transaction hash:
0x46deef0f52e3a983b67abf4714448a41dd7ffd6d32d32da69d62081c68ad7882
đ Analogy: Itâs like a thief walking into a bank with fake credentials, requesting to change the locks, and getting approval without suspicion.
đŞ Step 3: Planting a Hidden Backdoor
đš The hacker used a DELEGATECALL trick, a method that allowed them to insert a hidden backdoor deep inside Bybitâs wallet system at STORAGE[0x0].
đš The backdoorâs controller address was 0x96221423681A6d52E184D440a8eFCEbB105C7242.
đš It contained two hidden functions:
sweepETH â Stole Ethereum
sweepERC20 â Stole other tokens
đ Analogy: The hacker installed a secret compartment inside the bankâs vault, which only they could access.
đ° Step 4: Draining the Funds
đš With the backdoor in place, the hacker activated the hidden functions and emptied Bybitâs wallet in a single transaction.
đš This was like remotely opening a vault and taking everything inside.
đĽ End Result: All assets in Bybitâs hot wallet were drained before anyone noticed.
đ Market Prices After the Hack
đ° BTC: $96,554.49 (+1.53%)
đ° ETH: $2,765.33 (+5.36%)
đ° SOL: $172.82 (+2.9%)
This hack highlights the importance of rigorous security audits, stricter multi-signature verification, and continuous monitoring to prevent similar a
ttacks in the future.
#BybitHack #CryptoSecurityAlert #blockchain