Verichains

Share this post

Verichains
Technical Analysis of the Bybit Hot Wallet Exploit
Copy link
Facebook
Email
Notes
More

Technical Analysis of the Bybit Hot Wallet Exploit

th13vn
Feb 25, 2025
2

Share this post

Verichains
Technical Analysis of the Bybit Hot Wallet Exploit
Copy link
Facebook
Email
Notes
More
Share

Overview

On February 21, 2025, at 14:13:35 UTC, a malicious transaction was executed that upgraded the implementation of the Bybit Hot Wallet Proxy via a call from SafeWallet. This analysis details the sequence of events, on-chain operations, and potential attacker methodology.

Compromised Transaction Details

Malicious transaction that upgrade implementation of Bybit Hot Wallet called from SafeWallet:

  • Timestamp: Feb-21-2025, 14:13:35 UTC

  • Transaction: 0x46dee (Etherscan)

Key Addresses:

  • Bybit Hot Wallet Proxy: 0x1db92e2eebc8e0c075a02bea49a2935bcd2dfcf4

  • GnosisSafe (v1.1.1): 0x34cfac646f301356faa8b21e94227e3583fe3f5f

    Source code of Hot Wallet Bybit Proxy
  • Malicious Implementation Contract: 0x96221423681a6d52e184d440a8efcebb105c7242

Decompiled source code of 0x96221423681a6d52e184d440a8efcebb105c7242

On-Chain Flow of the Exploit

  1. Initiation by the Hacker:

    • Hacker Address: 0x0fa09c3a328792253f8dee7116848723b72a6d2e

    • The attacker initiates a call to the Hot Wallet Proxy (0x1db92e2eebc8e0c075a02bea49a2935bcd2dfcf4).

  2. Delegated Calls:

    • The proxy executes a delegatecall to the legitimate GnosisSafe contract (0x34cfac646f301356faa8b21e94227e3583fe3f5f).

    • Next, a further delegatecall is made to the malicious implementation contract using the following JSON payload:

      {
        "to": "0x96221423681a6d52e184d440a8efcebb105c7242", // Malicious Implementation Contract
        "operation": 1, // DelegateCall operation
        "data": "0xa9059cbb000000000000000000000000bdd077f651ebe7f7b3ce16fe5f2b025be29695160000000000000000000000000000000000000000000000000000000000000000"
        // Encodes a call to transfer(address,uint256):
        // transfer(0xbdd077f651ebe7f7b3ce16fe5f2b025be2969516, 0)
      }
      
  3. State Modification:

    • Within the malicious contract’s transfer function:

    def transfer(address _to, uint256 _value) payable:
        require calldata.size - 4 >= 64
        require _to = _to
        stor0 = _to

    This function updates slot0 of the proxy, effectively replacing the legitimate GnosisSafe implementation with the malicious contract at 0xbdd077f651ebe7f7b3ce16fe5f2b025be2969516.

    • The state change is confirmed by the following screenshot:

      Proxy implementation’s slot change confirmation
  4. Asset Exfiltration:

    • Test Transfer: A preliminary transaction transferred 90 USDT to verify functionality. View on Etherscan

      Test transfer screenshot
    • Massive ETH Drain: Following the test, a transaction was executed that transferred 401,346.76 ETH from the compromised wallet. View on Etherscan

      ETH transfer screenshot

Final Thoughts

The incident is still under investigation. The key details above show how the attacker drained the wallet’s fund and used crafted delegatecall transactions to hide their actions.

This information is crucial for understanding the breach. Stay alert and monitor your wallet closely, as even zero-value transactions might signal hidden threats. Further updates will follow as more details emerge.

2 Likes
2

Share this post

Verichains
Technical Analysis of the Bybit Hot Wallet Exploit
Copy link
Facebook
Email
Notes
More
Share

Discussion about this post

Binance Chain Bridge Exploitation Writeup - Part 1
Binance Chain was hacked with almost $600M of asset value with roughly $90M being moved out of the Binance ecosystem. In this writeup, we write an…
Oct 7, 2022 • 
Thanh Nguyen
9

Share this post

Verichains
Binance Chain Bridge Exploitation Writeup - Part 1
Copy link
Facebook
Email
Notes
More
1
[VSA-2022-120] Multichain: Key Extraction Vulnerability in fastMPC's Secure Multi-Party Client (smpc)
Since October 2022, Verichains has been conducting extensive research on threshold ECDSA security.
Mar 27, 2023 • 
Verichains
 and 
Thanh Nguyen
4

Share this post

Verichains
[VSA-2022-120] Multichain: Key Extraction Vulnerability in fastMPC's Secure Multi-Party Client (smpc)
Copy link
Facebook
Email
Notes
More
Verichains Discovers Critical Key Extraction Attacks in Popular Threshold Signature Scheme for MPC Wallets and Digital Asset Custody
Verichains announced today that it discovered critical Key Extraction Attacks in many popular Threshold Signature Scheme (TSS) implementations, a…
Mar 28, 2023 • 
Verichains
2

Share this post

Verichains
Verichains Discovers Critical Key Extraction Attacks in Popular Threshold Signature Scheme for MPC Wallets and Digital Asset Custody
Copy link
Facebook
Email
Notes
More

Ready for more?

© 2025 Verichains
Privacy ∙ Terms ∙ Collection notice
Start WritingGet the app
Substack is the home for great culture

Share

Copy link
Facebook
Email
Notes
More

Create your profile

undefined subscriptions will be displayed on your profile (edit)

Skip for now

Only paid subscribers can comment on this post

Already a paid subscriber? Sign in

Check your email

For your security, we need to re-authenticate you.

Click the link we sent to , or click here to sign in.