The February hack towards Bybit despatched ripples by way of the business after $1.4 billion in Ether-related tokens was stolen from the centralized trade, reportedly by the North Korean hacking collective Lazarus Group, in what was the most expensive crypto theft ever.
The fallout from the hack has left many individuals questioning what went fallacious, whether or not their very own funds are protected, and what must be executed to stop such an occasion from taking place once more.
In response to blockchain safety firm CertiK, the huge heist represented roughly 92% of all losses for February, which noticed a virtually 1,500% improve in whole misplaced crypto from January because of the incident.
On Episode 57 of Contelegraph’s The Agenda podcast, hosts Jonathan DeYoung and Ray Salmond converse with CertiK’s chief enterprise officer, Jason Jiang, to interrupt down how the Bybit hack occurred, the fallout from the exploit, what customers and exchanges can do to maintain their crypto safe, and extra.
Are crypto wallets nonetheless protected after Bybit hack?
Put merely, Lazarus Group was capable of pull off the huge hack towards Bybit as a result of it managed to compromise the units of all three signers who managed the multisignature SafeWallet Bybit was utilizing, in line with Jiang. The group then tricked them into signing a malicious transaction that they believed was legit.
Does this imply that SafeWallet can not be trusted? Nicely, it’s not so easy, stated Jiang. “It's potential that when the Protected developer’s pc received hacked, extra data was leaked from that pc. However I feel for the people, the probability of this taking place is fairly low.”
He stated there are a number of issues the typical consumer can do to drastically improve their crypto safety, together with storing property on chilly wallets and being conscious of potential phishing assaults on social media.
Supply: CertiK
When requested whether or not hodlers may see their Ledger or Trezor {hardware} wallets exploited in an identical method, Jiang once more stated that it’s not an enormous danger for the typical consumer — so long as they do their due diligence and transact fastidiously.
“One of many causes that this occurred was that the signers had been like a blind-send-signing the order, simply just because their machine didn't present the complete handle,” he stated, including, “Make it possible for the handle you might be sending to is what you’re aspiring to, and also you need to double verify and triple verify, particularly for bigger transactions.”
“I feel after this incident, that is most likely going to be one of many issues the business will attempt to right itself, to make the signing extra clear and simpler to acknowledge. There are such a lot of different classes being discovered, however that is actually one in every of them.”

stop the following multibillion-dollar trade hack
Jiang pointed to an absence of complete laws and safeguards as a possible component contributing to the continuing fallout from the hack, which fueled debates over the boundaries of decentralization after several validators from crosschain bridge THORChain refused to roll again or block any of Lazarus Group’s efforts to make use of the protocol to transform its funds into Bitcoin (BTC).
“Welcome to the Wild West,” stated Jiang. “That is the place we're proper now.”
“From our view, we expect crypto, whether it is to be flourishing, it must hug the regulation,” he argued. “To make it straightforward to be adopted by the mass normal right here, we have to hug the regulation, and we have to determine methods to make this area safer.”
Associated: Financial freedom means stopping crypto MEV attacks — Shutter Network contributor
Jiang counseled Bybit CEO Ben Zhou on his response to the incident, however he additionally identified that the trade’s bug bounty program previous to the hack had a reward of simply $4,000. He stated that whereas most individuals in cybersecurity aren't motivated by cash alone, having bigger bug bounties can doubtlessly assist exchanges keep safer.
When requested concerning the methods exchanges and protocols can encourage and retain top-tier expertise to assist shield their methods, Jiang steered that safety engineers don’t at all times get the credit score they deserve.
“Lots of people say that the first-degree expertise goes to the builders as a result of that’s the place they may get most rewarding,” he stated. “Nevertheless it’s additionally about us giving sufficient consideration to the safety engineers. They carry an enormous accountability.”
“Minimize them some slack and attempt to give them extra credit score. Whether or not it’s financial or whether or not it’s recognition, give them what we will afford, and make it affordable.”
To listen to extra from Jiang’s dialog with The Agenda — together with how CertiK carries out audits, how quantum computing and AI will influence cybersecurity, and extra — hearken to the complete episode on Cointelegraph’s Podcasts page, Apple Podcasts or Spotify. And don’t overlook to take a look at Cointelegraph’s full lineup of different reveals!
Journal: Bitcoin vs. the quantum computer threat — Timeline and solutions (2025–2035)
This text is for normal data functions and isn't meant to be and shouldn't be taken as authorized or funding recommendation. The views, ideas, and opinions expressed listed here are the creator’s alone and don't essentially replicate or symbolize the views and opinions of Cointelegraph.