North Korean Hackers Were Behind Crypto's Largest 'Theft of All Time'
Lazarus Group was behind Bybit's $1.5 billion hack on Friday, Arkham Intelligence said, citing ZackXBT.

What to know:
- Arkham said the North Korean hackers Lazarus Group was behind the $1.5 billion hack, citing ZackXBT.
- The attack appeared to have been caused by something called "Blind Signing."
- The attackers first withdrew nearly $1.5 billion worth of funds from the exchange into a main wallet and then distributed the assets to several different wallets.
Blockchain analytics firm Arkham Intelligence said North Korea's Lazarus Group was behind Bybit's $1.46 billion hack.
In an earlier post on social media platform X, Arkham offered a bounty of 50,000 ARKM tokens for anyone who could identify the attackers for Friday's hack. Later, the platform said onchain sleuth ZachXBT submitted "definitive proof" that the attackers were the North Korean hacker group.
"His submission included a detailed analysis of test transactions and connected wallets used ahead of the exploit, as well as multiple forensics graphs and timing analyses," the post said.
Read more: Bybit Loses $1.5B in Hack but Can Cover Loss, CEO Confirms
The hack that rocked the crypto market and saw most prices tumbling was called the "largest crypto theft of all time, by some margin," by Elliptic's Tom Robinson, co-founder and chief scientist. "The next largest crypto theft would be the $611 million stolen from Poly Network in 2021. In fact it may even be the largest single theft of all time."
Blockchain data provider Nansen told CoinDesk that the attackers first withdrew nearly $1.5 billion worth of funds from the exchange into a main wallet and then spread the funds across several others.
"Initially, the stolen funds were transferred to a primary wallet, which then distributed them across more than 40 wallets," Nansen said. "The attackers converted all stETH, cmETH, and mETH to ETH before systematically transferring ETH in $27 million increments to over 10 additional wallets," Nansen said.
The attack appeared to have been caused by something called "Blind Signing," where a smart contract transaction is approved without the comprehensive knowledge of its contents.
"This attack vector is quickly becoming the favorite form of cyber attack used by advanced threat actors, including North Korea," said blockchain security firm Blockaid's CEO Ido Ben Natan. "It’s the same type of attack that was used in the Radiant Capital breach and the WazirX incident."
"The problem is that even with the best key management solutions, today most of the signing process is delegated to software interfaces that interact with dApps. This creates a critical vulnerability — it opens the door for malicious manipulation of the signing process, which is exactly what happened in this attack," he said.
Bybit CEO Ben Zhou wrote earlier on X that a hacker "took control of the specific ETH cold wallet and transferred all the ETH in the cold wallet to this unidentified address." He also confirmed that the exchange "is solvent even if this hack loss is not recovered."
Oliver Knight contributed to the reporting of this story
Read more: Bitcoin, Ether Slump as Crypto Prices Dip on Report of Massive $1.5B Bybit Hack
More For You
Protocol Research: GoPlus Security

What to know:
- As of October 2025, GoPlus has generated $4.7M in total revenue across its product lines. The GoPlus App is the primary revenue driver, contributing $2.5M (approx. 53%), followed by the SafeToken Protocol at $1.7M.
- GoPlus Intelligence's Token Security API averaged 717 million monthly calls year-to-date in 2025 , with a peak of nearly 1 billion calls in February 2025. Total blockchain-level requests, including transaction simulations, averaged an additional 350 million per month.
- Since its January 2025 launch , the $GPS token has registered over $5B in total spot volume and $10B in derivatives volume in 2025. Monthly spot volume peaked in March 2025 at over $1.1B , while derivatives volume peaked the same month at over $4B.
More For You
Bitcoin’s Deep Correction Sets Stage for December Rebound, Says K33 Research

K33 Research says market fear is outweighing fundamentals as bitcoin nears key levels. December could offer an entry point for bold investors.
What to know:
- K33 Research says bitcoin’s steep correction shows signs of bottoming, with December potentially marking a turning point.
- The firm has argued that the market is overreacting to long-term risks while ignoring near-term signals of strength, like low leverage and solid support levels.
- With likely policy shifts ahead and cautious positioning in futures, K33 sees more upside potential than risk of another major collapse.









