How the Bybit Hack Happened

Step 1: The Hacker Set a Trap in Advance

On February 19, 2025, the hacker created a fake security system (a malicious contract) at address 0xbDd077f651EBe7f7b3cE16fe5F2b025BE2969516. This contract was not used immediately, but it was a setup for the real attack.

Step 2: Tricking the Multi-Signature Approval

Bybit's wallet uses a multi-signature system, meaning multiple high-level approvals are needed for any major change. However, on February 21, the hacker somehow got three key signatures (either stolen or forged). With these, they replaced the original security contract with their malicious one.

This change is recorded in the transaction hash:

0x46deef0f52e3a983b67abf4714448a41dd7ffd6d32d32da69d62081c68ad7882

Analogy: It's like a thief walking into a bank with a fake key and saying, "I'm the owner, I want to change the locks," and the bank approving it without noticing anything wrong.

Step 3: Planting a Hidden Backdoor

The hacker used a DELEGATECALL trick, which works like an invisible authorization letter. This allowed them to insert a hidden backdoor deep inside Bybit’s wallet system at STORAGE[0x0].

The backdoor’s controller address: 0x96221423681A6d52E184D440a8eFCEbB105C7242

It contained two secret functions:

sweepETH → Steals Ethereum

sweepERC20 → Steals tokens

Analogy: The hacker built a hidden compartment inside the bank's safe, which only they could access.

Step 4: Draining the Funds

With the backdoor in place, the hacker activated the hidden functions and emptied the wallet in one click, just like remotely opening a safe and taking everything inside.

End result: All the assets in Bybit’s hot wallet were drained before anyone noticed.

#BybitSecurityBreach #TradeFiRevolution $BTC $ETH $BNB