At the end of February over $1.5 billion (£1.1 billion) was stolen by hackers from Bybit, one of the world’s largest cryptocurrency exchanges. The breach has drawn global attention, not just for the huge financial losses involved, but also for the lessons it offers about cybersecurity, fraud prevention and asset recovery in the cryptocurrency space.
It’s also thought likely that the hack was carried out by hackers working for the North Korean regime, who have already successfully converted at least $300m (£232m) of their record-breaking crypto heist to unrecoverable funds.
As a forensic accountant, my focus lies in understanding the systemic vulnerabilities that led to such breaches and the steps that can be taken to prevent similar incidents in the future.
How the attack unfolded
On February 22, an unknown hacker or group of hackers breached Bybit, a major cryptocurrency exchange platform, exploiting vulnerabilities within the exchange’s infrastructure. The attack targeted the platform’s wallet system, enabling the intruders to siphon off funds from both hot and cold wallets (those connected to the internet, and those which are not) which have been estimated at a record-breaking $1.5 billion.
While specific details of the hack are still relatively sparse, forensic analysis reveals that the breach was highly sophisticated and executed in a series of phases.
The first step the hackers took was gaining unauthorized access to Bybit’s internal network. This was likely through exploitation of a vulnerability in the exchange’s software, or a weakness in its authentication systems. According to reports, the hackers then bypassed Bybit’s multi-factor authentication systems by leveraging phishing attacks aimed at key employees, or exploiting weaknesses in the exchange’s administrative processes.
Once inside the network, the hackers escalated their privileges and gained access to the hot wallets, which are used for day-to-day transactions. These wallets are often connected to the exchange’s online systems, making them more vulnerable to attacks than cold wallets, which are kept offline for enhanced security.
Funds laundered
Bybit’s cold storage, which typically stores a large portion of users’ assets offline, was also breached. However, it is believed that the stolen funds were primarily drawn from hot wallets, as they are more directly linked to the exchange’s transactional systems.
The attackers used several advanced techniques to obscure the trail of stolen funds. They immediately converted the stolen assets into various altcoins, which were then laundered through a series of privacy coins and decentralized exchanges (DEXs). This allowed the perpetrators to disguise their movements, making it difficult for forensic teams to track the exact location of the stolen funds.
Bybit responded quickly, temporarily suspending all withdrawals and initiating a full internal investigation. However, the damage was already done.
From a forensic accounting standpoint, the Bybit hack is a stark reminder of the vulnerabilities inherent in cryptocurrency exchanges. In addition to the financial losses, the hack revealed deeper issues related to digital asset tracking, fraud prevention and post-breach recovery.
Here are some of the critical lessons that forensic accountants and industry stakeholders can learn from the Bybit hack.
Robust security protocols
The most glaring lesson from the Bybit hack is the importance of maintaining and continually upgrading security measures. Cryptocurrency exchanges are prime targets for cybercriminals. This is due both to the high value of assets stored on these platforms, as well as the decentralized nature of digital currencies, which make the flow of stolen funds harder to trace.
As forensic accountants, we are often tasked with investigating such hacks and identifying what went wrong. In the case of Bybit, the key questions are: How did the hackers gain access? What weaknesses were exploited in the exchange’s infrastructure? Were internal controls in place to monitor and detect unusual activities?
From a preventative perspective, exchanges must implement multi-layered security measures, including multi-factor authentication, encryption, and end-to-end transaction monitoring, and undertake regular security audits. The breach also highlights the importance of staff training and awareness to prevent social engineering tactics (when someone is tricked into doing something dangerous online), such as phishing, which are often used to gain initial access to a system.
Forensic accountants need to ensure that exchanges have a clear and robust incident response plan in place. This plan should include a real-time monitoring system capable of identifying suspicious transactions, as well as procedures for immediately halting unauthorized activities.
Transparency v privacy
A key aspect of the Bybit hack was the movement of stolen funds. Blockchain technology, by its nature, offers transparency in the form of a publicly accessible ledger. However, the pseudonymous nature of crypto transactions means that identifying the ultimate owner of assets is a complex and, in some instances, an elusive task.
In this case, the hackers employed a variety of techniques to obscure the trail of stolen funds. Forensic accountants have relied on blockchain analytics tools to trace the flow of stolen assets. These tools are highly effective in tracing assets through public blockchains, but they struggle when hackers employ privacy-enhancing techniques.
Exchanges must adopt robust security measures, develop advanced asset-tracking capabilities, implement real-time monitoring systems, and ensure proper asset segregation
In the case of the Bybit hack, funds were funnelled through privacy coins such as Monero and Zcash, making it exceedingly difficult for forensic teams to further track the transactions.
The use of decentralized exchanges (DEXs) also complicates the situation. Unlike centralized exchanges, which are regulated and often required to comply with Know-Your-Customer (KYC) regulations, DEXs operate with fewer controls and no central authority. Hackers can easily launder stolen funds by converting cryptocurrencies into stablecoins or privacy coins through these platforms.
For forensic accountants investigating such hacks, it is crucial to develop strategies to deal with these privacy techniques. This might involve working with blockchain analytics firms that specialize in both tracing transactions through privacy coins, as well as utilizing advanced software that can detect the use of obfuscation techniques across different blockchains.
Asset segregation
Another key takeaway from the Bybit hack is the importance of asset segregation (that is, keeping customer funds separate from an exchange’s operational funds). Many exchanges hold customer assets in hot wallets for liquidity purposes. However, if these wallets are not properly segregated and protected, the entire platform is at risk in the event of a hack.
Forensic accountants must scrutinize how exchanges handle asset segregation. They should ensure that cold storage systems are appropriately maintained and that a significant portion of customer funds are kept offline. A robust asset segregation policy can help mitigate losses in case of a breach and allow exchanges to isolate customer funds from other assets that may be more exposed to risk.
In the Bybit case, it appears that hot wallet funds were the primary target, but the question remains: could the hack have been prevented or mitigated if there had been a clearer distinction between hot wallet funds and the funds kept in cold storage? Forensic audits of exchange procedures are essential to ensure proper fund management and reduce the risk of a full-scale loss in the event of a breach.
Real-time transaction monitoring
Real-time transaction monitoring is an essential tool in identifying and preventing fraud within cryptocurrency exchanges. The Bybit hack illustrates how a sophisticated attacker can go undetected if transactions are not adequately monitored.
In the aftermath of such a hack, forensic accountants must analyse the movements of funds, identify irregular patterns, and assess whether transaction monitoring tools could have flagged suspicious activity earlier. Advanced monitoring tools that analyse large volumes of transactions in real time are necessary to detect outlier activity, such as large withdrawals or transfers to addresses with a history of illicit activity.
By implementing real-time transaction monitoring and establishing predefined rules for flagging suspicious transactions, exchanges can prevent or minimize the impact of hacks by swiftly identifying unauthorized movements of funds. Additionally, creating a clear audit trail that records all transactions, including any corrective actions taken, will be invaluable in post-breach investigations.
Post-breach recovery and insurance
The Bybit hack also reinforces the importance of having a comprehensive post-breach recovery plan in place. From a forensic accounting perspective, recovery involves not only identifying the extent of the financial loss, but also working with law enforcement and other stakeholders to trace the stolen funds and eventually recover them.
While the chances of full recovery may be low, exchanges should have insurance policies to protect against cybersecurity threats. This is particularly important in an industry where regulatory frameworks are still evolving, and customer protection laws are often lacking. Forensic accountants can help in determining the amount of financial exposure and assessing the effectiveness of insurance claims.
Evolution needed
The Bybit hack serves as a sobering reminder that the cryptocurrency sector must evolve quickly to address the ever-increasing threat of cybercrime.
From a forensic accountant’s perspective, the key lessons are clear. Exchanges must adopt robust security measures, develop advanced asset-tracking capabilities, implement real-time monitoring systems, and ensure proper asset segregation. Moreover, the crypto industry must continue to innovate in the field of blockchain forensics to stay ahead of criminals using privacy-enhancing techniques.
With digital assets increasingly becoming a central part of the global financial system, it is incumbent upon forensic professionals to work closely with exchanges, regulators, and law enforcement agencies to safeguard the integrity of the cryptocurrency market. Through greater diligence and proactive measures, we can ensure that the lessons learned from the Bybit hack will lead to stronger, more secure exchanges and, ultimately, a more trustworthy ecosystem for all stakeholders.
Harley Thomas is a forensic accountant and senior investigator at MKS Law, a BVI litigation practice which specialises in global asset recovery cases.
