> series: anatomy_of_a_breach —— part: 194 —— target: bybit —— stolen: $1,400,000,000 —— attacker: lazarus_group —— record: largest_crypto_heist_ever<span class="cursor-blink">_</span>_
In February 2025, cryptocurrency exchange Bybit suffered the largest cryptocurrency theft ever recorded — approximately $1.4 billion in Ethereum (ETH) stolen from the exchange's cold wallet infrastructure. The FBI subsequently attributed the attack to North Korea's Lazarus Group, the same state-sponsored unit behind the Ronin Network heist ($620M, 2022), the Bangladesh Bank SWIFT heist ($81M, 2016), and the Sony Pictures attack (2014).
The $1.4 billion theft more than doubled the previous cryptocurrency theft record set by the Ronin/Axie Infinity heist ($620M, 2022). The attackers compromised the multi-signature signing process for Bybit's cold wallet — manipulating the transaction so that what appeared to signers as a legitimate transfer was actually redirecting funds to attacker-controlled addresses. Bybit offered a 10% bounty on recovered funds. The theft fuelled a 303% increase in cryptocurrency theft in Q1 2025 compared to the previous quarter. North Korea's cyber theft programme — now responsible for billions in cumulative cryptocurrency theft — had reached a scale where it constituted a significant funding source for the regime's weapons programmes.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallThe Bybit heist demonstrated that Lazarus Group's capabilities continue to scale — from $81 million (2016) to $620 million (2022) to $1.4 billion (2025). For organisations holding digital assets, the threat model must include state-sponsored adversaries with resources and patience that exceed commercial attackers. Penetration testing validates transaction security. Cyber Essentials provides the baseline. SOC in a Box monitors for anomalous transactions. And UK Cyber Defence provides incident response when state-sponsored theft is detected.
<a href="/penetration-testing">Penetration testing</a> validates transaction security. <a href="/cyber-essentials">Cyber Essentials</a> provides the baseline. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors transactions.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call