Crypto losses skyrocket to $1.5B in February after Bybit hack

Thu Le

Mar, 21, 2025

9 min read

The crypto market in early 2025 has seen remarkable growth, with increasing adoption, innovative DeFi projects, and rising institutional interest. But alongside this momentum, the industry’s long-standing vulnerability to security breaches has come back into sharp focus.

February 2025 was a particularly turbulent month, witnessing a staggering $1.53 billion in losses from cryptocurrency hacks, scams, and exploits. According to blockchain security firm CertiK, this figure represents a 1,500% surge compared to January’s $98 million in losses, an unprecedented spike that shook confidence across the crypto ecosystem.

At the heart of this dramatic rise was the record-breaking $1.4 billion hack of Bybit, one of the world’s largest crypto exchanges. Allegedly orchestrated by North Korea’s infamous Lazarus Group, the attack not only exposed critical vulnerabilities in Bybit’s security infrastructure but also highlighted how sophisticated and coordinated cyber threats are evolving in the crypto space.

In this article, we’ll dive deeper into the Bybit hack, explore the broader landscape of crypto losses in February 2025, and analyze what this means for the future of crypto security.

Overview of the Bybit hack

Overview of the Bybit hack

The Bybit hack on February 21, 2025, stands as one of the largest crypto security incidents to date, resulting in the loss of nearly $1.5 billion in assets. The attack specifically targeted one of Bybit’s Ethereum multisig cold wallets, and the scale and sophistication of the exploit sent shockwaves across the crypto industry.

Timeline of events

The breach began at 13:30 UTC on February 21, 2025, when Bybit performed a routine transfer of 30,000 ETH from an Ethereum multisig cold wallet to a warm wallet. However, within less than an hour, the situation escalated.

At 14:13 UTC, hackers successfully launched a phishing attack on the cold wallet signers. They exploited the Safe multisig wallet’s UI, masking a malicious transaction that changed the smart contract logic governing the wallet. This critical manipulation allowed the attackers to take control of the cold wallet and systematically drain its contents. The stolen funds amounting to approximately $1.46 billion USD were then distributed across 39 addresses to obfuscate the trail.

Breakdown of the damage

The specific assets lost in the attack were significant:

  • 401,347 ETH (~$1.12 billion)
  • 90,375 stETH (~$253.16 million)
  • 15,000 cmETH (~$44.13 million)
  • 8,000 mETH (~$23 million)

Despite the magnitude of the breach, Bybit acted swiftly and decisively.

Bybit’s response

Shortly after the attack was detected, Bybit’s co-founder and CEO, Ben Zhou, addressed the community directly via Twitter (X) at 15:44 UTC, confirming the breach and assuring users that Bybit remained solvent. He emphasized that all client assets were backed 1:1 and that Bybit’s reserves were sufficient to cover the losses even if the stolen funds were not recovered.

By 17:15 UTC, Ben hosted a livestream, transparently explaining the situation, outlining the steps being taken, and reassuring users that withdrawals, deposits, and trading services remained unaffected.

In the following hours and days:

  • Bybit successfully processed 99.994% of over 350,000 withdrawal requests within just 10 hours of the incident.
  • Multiple industry partners, including Bitget, stepped up, depositing 40,000 ETH to support Bybit’s liquidity.
  • Tether froze $181,000 USDT linked to the hack, while collaborative efforts with platforms like THORChain, Avalanche, Bitget, Circle, and others led to freezing and recovery of nearly $42.89 million in stolen assets.
  • Within 72 hours, Bybit secured $1.23 billion in ETH through strategic partnerships, bridge loans, OTC deals, and whale deposits, fully covering the ETH shortfall.

Additionally, Bybit launched the LazarusBounty program, the first-of-its-kind bounty initiative specifically aimed at recovering funds from the North Korean state-backed Lazarus Group, identified as the likely perpetrators of the attack by blockchain investigator ZachXBT.

By February 28, Bybit released preliminary investigation reports conducted by Sygnia Labs and Verichains, indicating that the hack stemmed from malicious JavaScript code on the Safe{Wallet} platform, rather than vulnerabilities within Bybit’s infrastructure itself.

Bybit’s handling of the crisis showcased resilience and transparency, restoring user confidence in record time. Yet, the sheer scale of the attack, the largest in crypto history to date, has reignited urgent conversations about the importance of robust multisig wallet security, phishing attack prevention, and cross-platform collaboration to safeguard the broader crypto ecosystem.

Market reactions & immediate consequences

Market reactions & immediate consequences

The aftermath of the Bybit hack sent ripples far beyond the exchange itself, shaking investor confidence and stirring conversations across the entire crypto landscape.

Impact on Bybit’s credibility & user base

While Bybit’s swift response and transparent crisis management earned praise, the sheer scale of the $1.46 billion loss inevitably dented its reputation. For long-time users, assurances of solvency and rapid withdrawal processing were critical in retaining trust. However, for new or cautious investors, the incident served as a stark reminder of the risks tied to centralized exchanges. The hack became a litmus test not just for Bybit’s resilience, but for the crypto community’s tolerance for operational risk.

Price volatility across the market

As news of the exploit broke, major cryptocurrencies reacted sharply. Ethereum, the primary asset compromised, saw a noticeable dip as panic briefly gripped the market. Other major coins like Bitcoin and altcoins experienced similar volatility, reflecting broader investor anxiety. However, thanks to the industry’s fast mobilization, including capital inflows and asset recovery efforts, prices stabilized within days. Nevertheless, the market’s knee-jerk reaction highlighted how even a single platform’s breach can trigger chain reactions across global crypto valuations.

Shifts in market sentiment

The incident had a measurable effect on overall market sentiment. Fear indicators, including the Crypto Fear & Greed Index, swung toward extreme fear in the immediate hours after the hack, as traders questioned the safety of custodial platforms. Social media buzzed with renewed debates around decentralization, self-custody, and whether users should trust centralized entities with their assets at all.

Regulatory conversations reignited

Perhaps most significantly, the Bybit hack reignited global regulatory discussions. Lawmakers and financial authorities seized on the event as a case study underscoring the urgent need for stricter oversight, particularly regarding custodial practices, KYC/AML compliance, and security audit standards. Some regions began re-evaluating licensing requirements for exchanges, while others fast-tracked blockchain security frameworks. The hack became a rallying cry for both regulators and crypto advocates: one side pushing for tighter control, the other calling for better self-regulation and technical accountability.

In short, the Bybit hack didn’t just shake one platform it left an indelible mark on the industry, catalyzing shifts in trust, trading behavior, and the regulatory landscape.

Why is the crypto sector still vulnerable?

Despite rapid innovation and growing institutional adoption, the crypto industry continues to grapple with persistent security risks. The Bybit hack in February 2025 is just the latest reminder that even the most prominent platforms remain exposed. But why does this vulnerability persist?

1. Common weaknesses: Multisig loopholes, smart contract bugs & oracle exploits

At the core of many breaches are familiar, yet still unresolved, technical flaws. Multisig wallets, often viewed as a secure option, can be compromised if the signing process or UI is manipulated as seen in the Bybit attack. Similarly, smart contracts, the foundation of DeFi protocols, are highly susceptible to coding errors or logic bugs. Once deployed, these contracts are immutable, meaning a single overlooked vulnerability can result in millions drained within minutes.

Another frequent target is oracle manipulation, where attackers exploit the mechanisms used to fetch external data (like price feeds). If an oracle isn’t properly decentralized or secured, it becomes a weak link that hackers can manipulate to siphon funds.

2. Hackers are becoming more sophisticated

Gone are the days of simple brute-force hacks. Today’s attackers operate like highly organized cybercriminal enterprises. Groups such as the Lazarus Group, allegedly behind the Bybit exploit, use phishing schemes, social engineering, and malware designed specifically to infiltrate the unique architecture of crypto platforms. Their ability to coordinate large-scale, multi-step attacks often leaving minimal traces poses a serious challenge to existing defense strategies.

3. Gaps in regular security audits & standards

While many crypto projects undergo initial audits before launch, regular, ongoing audits are often neglected. As platforms evolve integrating new tokens, features, and services their attack surface expands. Without continuous testing, vulnerabilities may go unnoticed until it’s too late.

Moreover, the crypto space lacks universally enforced security standards. Unlike traditional financial institutions, which are subject to rigorous compliance and regulatory checks, many blockchain projects operate in a regulatory gray area, making adherence to best practices voluntary rather than mandatory.

Ultimately, the crypto sector’s decentralized nature is both its greatest strength and its biggest challenge. Without centralized oversight, ensuring universal security compliance falls on individual projects, many of which prioritize speed and growth over airtight protection. Unless the industry collectively raises the bar on security protocols, auditing frequency, and community awareness, these vulnerabilities will continue to be exploited.

How platforms and users can strengthen security

How platforms and users can strengthen security

The Bybit hack serves as a sobering wake-up call not just for exchanges, but for the entire crypto ecosystem. While the decentralized nature of blockchain technology offers unprecedented freedom, it also demands an equally strong commitment to safeguarding assets. So, how can platforms and users fortify their defenses against increasingly sophisticated threats?

1. Rigorous, continuous smart contract audits

Smart contracts are the backbone of decentralized finance, yet they are also a prime target for attackers. One overlooked bug or unchecked logic flaw can open the door to catastrophic losses. For platforms, conducting one-time audits before launch is no longer enough.

What’s crucial now is a culture of continuous auditing every time protocols are updated, integrated with new tokens, or scaled. Leveraging reputable third-party auditors and adopting formal verification methods can significantly reduce vulnerabilities. Platforms that treat audits as an ongoing process, not a checkbox, will stay one step ahead of attackers.

2. Multi-layer security protocols: Beyond the basics

In 2025, relying solely on traditional safeguards like passwords is a recipe for disaster. Platforms need to enforce multi-layered security frameworks, combining:

  • Multi-factor authentication (MFA) or 2FA to ensure account access remains tightly controlled
  • Cold wallets for storing the majority of funds offline, insulated from internet-based attacks
  • Rate-limiting and whitelisting withdrawals to prevent mass outflows
  • Internal access control systems, ensuring only essential personnel have permissions to critical assets and smart contracts

The emphasis should be on defense in depth creating multiple barriers that attackers must breach, each reducing the odds of a successful exploit.

3. The rise of AI-driven threat detection

One of the most promising developments in crypto security is the integration of AI-powered threat detection systems. Machine learning models can now analyze transaction patterns in real-time, flagging anomalies that may indicate hacks, phishing attempts, or insider threats long before traditional systems react.

Platforms adopting AI-driven security analytics can not only detect irregularities but also predict vulnerabilities based on past incidents, network activity, and behavioral trends. As attacks grow more complex, having automated, intelligent monitoring becomes indispensable.

4. Security best practices for individual users & investors

While platforms bear much of the responsibility, crypto users themselves must take proactive steps to protect their assets:

  • Self-custody: Use hardware wallets or reputable non-custodial wallets for long-term holdings. Avoid leaving significant funds on exchanges.
  • Vigilance against phishing: Always double-check URLs, avoid clicking suspicious links, and use browser extensions that block known scam sites.
  • Private key management: Never share or store private keys online. Back them up securely and offline.
  • Regular updates: Keep wallets, apps, and security tools updated to benefit from the latest patches and protections.
  • Limit exposure: Spread assets across wallets, avoid putting all your holdings in one place, and set withdrawal limits where possible.

Strengthening crypto security requires a joint effort. Platforms need to embed rigorous security measures into their DNA, while users must adopt a security-first mindset. In an industry where one breach can cost billions, complacency is no longer an option. Proactive defense, constant vigilance, and embracing next-gen security tools like AI will be the keys to ensuring a safer, more resilient crypto future.

Conclusion

February 2025 will be remembered as a defining moment in crypto history, a month that exposed both the industry’s rapid growth and its lingering vulnerabilities. With total losses soaring to a staggering $1.53 billion, fueled primarily by the unprecedented $1.46 billion Bybit hack, the events of this month sent a clear message: no platform, regardless of its size or reputation, is immune to sophisticated cyber threats.

The Bybit incident not only shook market confidence but also underscored the urgent need for a collective security overhaul. From rigorous smart contract audits to AI-driven threat detection and multi-layered defense systems, stronger frameworks are no longer optional, they are the foundation upon which the future of decentralized finance must be built.

For platforms, developers, and investors alike, the lesson is clear: the battle for security is ongoing, and complacency is costly.

Have An Innovative Blockchain Idea?
Leave your contact details below and we’ll get back to you within 24 hours. Let’s discuss about your project!