Skip to main content
Crypto Heist $1.5B Stolen Cold Wallet

Bye-Bye, Big-Dollar ETH
Inside the $1.5B ByBit Heist That Shattered Cold Storage Myth

In the time it takes a Dubai barista to frost a single cronut, a North Korean hacker forged a cold-wallet signature and spirited away 401,116 ETH—more than the GDP of Greenland.

Cryptocurrency Security
17 min read

Critical Crypto Alert

North Korean Lazarus Group exploited macOS malware "RustBucket 3.0" to steal private keys from ByBit's cold wallet, draining 401,116 ETH ($1.51B) in the largest cryptocurrency theft in history.

$1.5B
Total Stolen
2 min
Sig Forgery
401k
ETH Drained

When "Cold" Became Lukewarm in One Block

Date (May 2025) Event
06 May 08:37 ByBit ops wallet 0xA1… signs multi-sig transfer of 401k ETH to cold-vault 0xC2…
06 May 08:39 Malicious transaction appears with identical nonce but recipient 0xBAD…; valid ECDSA sig
06 May 08:41 $1.46B in ETH lands in attacker wallet; peel-chain starts within 60 seconds
06-07 May Tornado Cash forks (Railgun, Typhoon) atomise 160k ETH; $190M bridged to BTC via ThorChain
07 May 14:00 ByBit pauses ALL withdrawals; CEO Ben Zhou live-streams "We are solvent, user funds SAFU"
08 May 09:00 Insurance claim filed for $450M; on-chain sleuths tag 58% of stolen coins
10 May UN Security Council adds breach to DPRK sanctions report
"ByBit can confirm that a highly sophisticated attack targeted our ETH cold-wallet interface… no user funds were lost, but the company treasury suffered a significant loss."

— Ben Zhou, CEO, ByBit

Fallout: From Blockchain to Bank Run

401,116

ETH stolen ($1.51B at $3,770/ETH) – largest crypto theft in history, >Mt. Gox + Ronin combined

$190M

Laundered through BTC, USDT, BNB bridges – chain-hopping in <6h

$2.8B

ByBit withdrawal queue peaks – 24-hour freeze triggers social-media panic

10%

Staff reduction after insurance payout capped at $450M balance sheet hit

ETH Price Impact

7% dip in 4h – $4.2B in long positions liquidated across exchanges

FBI Attribution

Lazarus Group – private-key exfil via macOS malware "RustBucket 3.0"

Kill-Chain Deconstructed: Malware → Key Exfil → Sig Forgery → Peel-Chain

MITRE Tactic Technique ByBit Reality
Initial Access T1566.002 macOS malware "RustBucket 3.0" in fake PDF "Salary-2025.pdf"
Collection T1555.003 Chrome SafeStorage decrypted; Bitwarden vault dumped → cold-wallet seed exposed
Command & Control T1071.001 HTTPS beacon to cdn-images[.]xyz – CloudFlare proxy
Impact T1487 Malware wipes ~/Library/Logs to erase artifact trail
Exfiltration T1041 Private key + chain-path sent inside TLS 1.3 DNS-over-HTTPS

Root Causes: When "Air-Gapped" MacBooks Breathe Wi-Fi

  • 1

    Offline laptop used for keygen but re-connected to corporate Wi-Fi monthly for patches

  • 2

    Bitwarden unlocked during patch window – malware snapshot vault in 2s

  • 3

    Multi-sig UI trusted hardware-wallet screen – attackers swapped recipient address in-flight via USB-C packet injection

  • 4

    No address-whitelist on Gnosis Safe – any ETH address could be entered

  • 5

    Manual verification skipped – ops team pressed "Sign" after glance at first/last 4 chars (visual fatigue)

Expert Insight: "The Keyboard Is the New Vault Door"

"ByBit proves cold storage isn't cold if the human holding the key warms up to Wi-Fi. When $1.5B hinges on one macOS unlock, you need hardware isolation, not good intentions."

— Dr. Merav Ozair, blockchain security expert, Rutgers University

Six NIST Controls That Turn a MacBook into a Mission-Control Vault

PR.DS-2

Hardware Security Module (HSM)

Private key never leaves FIPS-140-3 HSM; USB-C sign-request only

PR.AC-3

Address whitelisting

Gnosis Safe allows max 3 pre-approved addresses; addition requires 2-of-3 hardware sig

PR.AC-2

Transaction dual-control

Two humans in two rooms scan QR of full recipient address; video recorded

PR.IP-3

Air-gap + Faraday

Signing laptop never connects to any network; stored in Faraday bag, seal logged

PR.IP-4

Immutable backup of signed tx

Daily snapshot of Safe config to WORM storage; restore test monthly

ID.SC-3

Crypto-insurance + attestation

Third-party SOC 2 Type II; $1B crime insurance; public attestation of reserves

Quick-Start Playbook: What to Do Before the Frosting Sets

Today

Move remaining treasury to new 3-of-5 HSM wallet; old addresses burnt

This Week

Enable address-whitelist; additions require in-person board resolution

Next Sprint

Deploy air-gapped Qubes + Faraday signing room; USB-C data pins physically removed

Next Month

Dual-control video verification of every outgoing tx >$10M

Quarterly

Publish Merkle-tree proof-of-reserves; third-party audit of cold-wallet controls

The Cronut Challenge

Lazarus spent 48 hours laundering eight-figure sums, but the fatal signature took the same 120 seconds your barista needs to pipe frosting onto a cronut.

If crypto's biggest "cold wallet" can be emptied between frost and sprinkle, ask yourself:

"What am I doing during the time it takes to frost a single cronut?"

Verified Sources

  1. 1.
    ByBit official incident statement ByBit blog, 07 May 2025
  2. 2.
  3. 3.
  4. 4.
  5. 5.

Secure Your Crypto Assets from Cold Wallet Attacks

Don't let your cold storage become lukewarm. Get a free cryptocurrency security assessment to identify wallet vulnerabilities and implement proper air-gapped key management.