
In late February, hackers breached the Dubai-based Bybit, one of the world’s largest cryptocurrency exchanges, and stole about $1.5 billion of Ethereum. It was the largest hack in crypto’s Bitcoin. Specifically, the firm builds open-source software that companies like Bybit use to create online wallets to store their crypto. The wallets are akin to bank vaults that need multiple keys to be unlocked.
Bybit used Safe to safeguard at least $1.5 billion of Ethereum, the world’s second largest cryptocurrency by market capitalization. Any time an employee from Bybit wanted to move the exchange’s Ethereum to another location, he or she signed into Safe’s website. Because Safe’s software is open-source, the company and Bybit had no formal business relationship, Stefan George, one of the original developers behind Safe’s technology, told Fortune.
Malware download
Even as Bybit was placing stores of Ethereum in Safe’s digital vault, North Korea’s group of elite hackers lay in wait, watching their moves. “They prepared it over a very long period of time, like definitely more than a month … probably many months,” George said.
Then they pounced. The Safe team has about 30 engineers, and a handful of them are “sys admins,” or system administrators. Sys admins are senior developers who are able to update Safe’s live website and code.
North Korean hackers targeted one admin in what was likely a phishing attack, George said, probably by tricking them into downloading an application or divulging personal info. The FBI has called the tactic North Korean hackers use “TraderTraitor.” George wouldn’t disclose any more details about how a Safe employee was tricked, citing an ongoing investigation.
Site update
After hackers duped the Safe system admin, they used their access to the person’s controls to download malware to the developer’s machine, which gave North Korea control over the admin’s computer, George said. From there, hackers updated Safe’s website with a snippet of code designed exclusively for Bybit, like a virus that activates when in contact with the right host.
In late February, the dormant code detected that a Bybit employee had opened its Safe account and was about to authorize a transaction. At the last moment, hackers swapped in a new command to drain Bybit’s crypto holdings. The employee unknowingly authorized the command, and North Korea was suddenly flush with $1.5 billion in crypto. Two minutes after the heist, Safe’s website was updated to hide the hackers’ tracks and erase the code snippet, according to a security investigation Bybit commissioned.
The investigation into how North Korea compromised a Safe developer’s computer is still ongoing, George told Fortune.
Goldberg, the CEO of Chaos Labs, told Fortune that the hack of Bybit is indicative of a broader problem in software. The vast majority of programmers use code from other programmers, who reference apps built by yet another batch of developers. “We're building on houses of cards, and you know what you build,” he said. “You don’t know what’s going on underneath.”