Crypto Policy Tracker
The Bybit Hack of 2025 — Potential Implications
March 14, 2025
By Jeremy Berkowitz, John J. Michels, Chris Daniel, Eric C. Sibbitt, Dana V. Syracuse, Josh Boehm and Meagan E. Griffin
On February 21, 2025, Dubai-based Bybit, one of the world’s leading cryptocurrency exchanges, suffered a massive security breach, resulting in the loss of approximately $1.5 billion in Ethereum (ETH). The incident, which is believed to be the largest cryptocurrency theft to date, has fueled ongoing debates about security, accountability and the need for additional regulatory oversight in the digital assets space. While the implications of the Bybit hack are still coming into focus, there could be potential consequences for both exchanges, as well as the broader cryptocurrency market.
Background
Bybit used a third-party service as a solution for moving tokens from a “cold” wallet (i.e., a wallet that is used to store cryptocurrencies offline) to a “warm” (or online) wallet via a transaction process that required multiple approvals. Hackers compromised a machine associated with the third party and used it to inject malicious JavaScript into the transaction signing process, allowing it to manipulate transactions that met certain criteria. This allowed the hackers to redirect 401,000 ETH, valued at roughly $1.5 billion at the time, to wallets under their control.
The attack has been attributed to the North Korea-sponsored threat actor Lazarus Group, which is believed to operate under the control of North Korea’s Reconnaissance General Bureau, the country’s main intelligence agency. Lazarus has been involved in numerous financial cybercrimes, espionage and disruptive cyberattacks, large-scale ransomware attacks, and cryptocurrency thefts.
In the days following the hack, Lazarus laundered the vast majority of the stolen assets through crypto mixers, which are services that allow users to obscure the origin and destination of their crypto transactions, enhancing privacy and anonymity. The crypto mixers may pool crypto assets from multiple users, then redistribute the funds to a new wallet provided by the user, often in different and randomized amounts, which can make the funds difficult to trace.
Initial Response to the Incident
Following the incident, Bybit reassured users that the exchange remained solvent and that Bybit would be able to cover all losses through a combination of internal funds and a bridge loan. ByBit has additionally published two forensic investigations into the incident, which provide technical insights into the specific attack vector. Despite the apparent lack of consumer harm, the incident has garnered significant media attention due to its size and has highlighted gaps in current practices that may leave investors and exchanges exposed.
The incident also comes on the heels of two important licensing developments relating to Bybit. First, Bybit has been pursuing a Virtual Asset Service Provider (VASP) license in Dubai and received provisional approval for a nonoperational license late last year. Second, only days before the hack on February 14, 2025, French regulators confirmed that Bybit had been removed from France’s AMF blacklist, allowing it to work toward securing a Markets in Crypto-Assets Regulation (MiCA) license necessary for operations in the EU. Neither regulator has taken any public action against Bybit in response to the incident as of yet, but doing so would not necessarily be unprecedented.
It is also unclear whether any formal regulatory investigation or action will follow from the incident in the United States, which has recently seen a major shift in crypto policy under the new administration. On the one hand, the incident comes right as the Securities and Exchange Commission (SEC) is set to pull back on cryptocurrency enforcement, recently dismissing several lawsuits and closing investigations into major crypto exchanges. On the other hand, however, the SEC has recently launched a Cyber and Emerging Technologies unit, which was formed in part to handle fraud in this area.
What’s Next?
The Bybit hack occurred in the midst of an important moment for the crypto industry in the United States. The new administration’s pledge to make the country the “crypto capital of the world” strongly signals an approach that is markedly pro-innovation, particularly when coupled with recent changes to the SEC’s enforcement priorities. On the other hand, however, incidents like the Bybit hack raise fundamental questions about the appropriate limits of deregulation and the need to balance strong cybersecurity requirements and consumer protection objectives against the development of new technologies. Given the multijurisdictional nature of cryptocurrencies and crypto exchanges, the hack also suggests a need for some degree of global consensus regarding how the tension between these concerns is mediated.
At a more technical level, the breach also demonstrates that even industry-accepted security measures like multisignature wallets and cold storage can still be fallible when paired with operational processes and third-party services. This incident may therefore push regulators toward the adoption of more concrete cybersecurity requirements designed to target these perceived weak points, such as through mandatory use of hardware security modules or real-time transaction monitoring. Such a move would not be exceptional, particularly in the United States, where regulators have increasingly been focused on cybersecurity in other segments of the financial sector. In 2023, for example, the FTC overhauled its GLBA Safeguards Rule, and the SEC proposed new cybersecurity regulations for public companies, along with similar requirements for registered broker-dealers the following year.
Regulators and legislatures may increase focus on a number of key areas from a cybersecurity standpoint, including:
- Third-Party Vendor Oversight and Management. Third-party vulnerabilities and supply chain compromises are nothing new, but this incident may contribute to a heightened interest from regulators and legislatures. The incident could prompt lawmakers to extend their oversight in substantive ways into exchanges’ use of third-party vendors, including how such vendors are vetted from a cybersecurity perspective.
- Consumer Transparency. Although Bybit had the ability to cover losses following the incident and largely appears to have mitigated harm to users, the incident may trigger additional scrutiny regarding exchange solvency in the wake of large-scale crypto theft. Such scrutiny could involve, for example, periodic solvency audits or the establishment of mandatory compensation funds. Heightened transparency regarding the causes of, and scope of, these types of incidents is also a possibility.
- Crypto Mixers. Regulators additionally may intensify scrutiny of crypto mixers, which many have argued are vehicles for laundering stolen funds. Although the United States Department of Justice (DOJ) has already brought several actions against mixers, the Bybit incident further underscores this issue and confirms that these services are capable of obfuscating the destination of very large amounts of cryptocurrency very quickly. As a result, accelerated action targeting these types of services and increased coordination among regulators and law enforcement is potentially on the horizon. This is particularly true given the apparent nexus of the incident to the Lazarus Group. The U.S. Office of Foreign Assets Control (OFAC) has previously used its authority in 2023 to sanction a cryptocurrency mixer that was used by Lazarus, following two prior OFAC designations of crypto mixers in 2022.
Conclusion
The Bybit hack is a reminder of the complexity and interconnected nature of exchange architecture and processes, and highlights weak points associated with security measures that have become industry-standard. As exchanges continue to adapt their defenses to new threat actors’ tactics, regulators and legislatures may face increasing pressure to impose standards that protect users without stifling innovation. Ultimately, the incident may accelerate a shift towards more comprehensive safeguard and vendor oversight requirements, but for now, the incident is an important reminder that even the largest and most established crypto exchanges are not immune to attack.
Practice Areas
For More Information






