The Bybit Hack: Why Crypto Security Must Evolve and How Xapo Bank Stays Ahead

News

February 28, 2025

Written by Andrew Mannoukas

The history of cryptocurrency exchanges is littered with headline-grabbing hacks and thefts. Every day, we entrust our money and digital assets to online platforms on the assumption that they are safe. But are they?

Bybit Hack featured image

Share this article

Mt Gox. Coincheck. Bitfinex. Binance. The history of cryptocurrency exchanges is littered with headline-grabbing hacks and thefts. Every day, we entrust our money and digital assets to online platforms on the assumption that they are safe. But are they? The $1.4 billion Bybit hack — perhaps the largest single theft of any kind, ever — highlights just how critical security is.

How did it happen?

We are all subject to the risk that, at some point, we blithely agree to terms and conditions we haven’t consciously read, or dismiss a computer warning without a second thought. The contents may be complex, time is short, and eventually we assume everything is fine. Usually, it is.

The Bybit hack was not typical. It wasn’t a brute-force attack but a deception that exploited trust, human error, and UI manipulation. It was meticulously planned and precisely executed by a state-backed actor, North Korea’s Lazarus Group, the shadowy outfit behind the WannaCry ransomware attack on the NHS, the Sony Pictures hack that shook Hollywood, and the audacious theft of $101 million from Bangladesh’s central bank. As in those incidents, Lazarus Group didn’t rely on brute force. They studied their target, mapped its weaknesses, and exploited routine operational processes.

Bybit hack image 1

Multisig

Bybit secured each of its signers’ private keys in cold storage wallets, meaning that withdrawals required multiple employees to manually approve them. Moreover, cold wallets are not constantly connected to the internet, shielding them from potential malware. This setup is designed to prevent a single point of failure — one person cannot unilaterally transfer assets. However, the system assumes that the approval process itself is trustworthy. The hackers’ strategy wasn’t to bypass multisig, but to hijack it.

UI manipulation

The hackers had infected a Safe{Wallet} staff computer long before the attack began. Using malware or a supply-chain compromise, they altered a very specific file that changed the approval interface the Bybit team relied on to review transactions. On the surface, everything appeared routine — staff saw a transaction with the correct destination and amount. But beneath the interface lurked a hidden smart contract upgrade that their approval would deploy. This would rewrite the wallet’s fundamental rules, granting the attackers control over future transactions.

Blind approval

Staff members believed everything was normal. The interface showed a familiar transaction format, and the approval process followed standard procedure. But a crucial security step was overlooked. They didn’t manually verify each digit of the transaction on the Ledger hardware wallet against the data on their computer screens—a tedious but essential safeguard. Unknowingly, they “approve” the contract that changed how the wallet operated.

Redirection

Once the signatures were collected, the malicious code took over. Instead of sending funds to Bybit’s internal warm wallet, the assets were rerouted to the hackers’ address. 401,000 ETH—USD 1.4 billion on the day of the attack—was gone in minutes. By the time the deception was discovered, it was too late.

What makes this hack so significant is that the attackers didn’t steal any Bybit’s passwords or break cryptography. They simply deceived the funds’ guardians. Bybit’s security was defeated by clever social engineering and interface trickery—not through a flaw in blockchain technology. It’s a powerful reminder that you can open even the strongest vault if you target the people with the keys.

Could Xapo Bank suffer a similar hack?

The short answer is: no.

On paper, Bybit’s security was strong, but it left crucial steps vulnerable to human error. The problem wasn’t the technology—it was the trust placed in manual approvals and human oversight. Xapo Bank takes no such chances.

Xapo Bank’s security model is fundamentally different. While Bybit relied on multisig wallets and solely on human approvals, Xapo does not rely only on individual discretion for such processes. Instead, we rely on cryptographic certainty, automated policy enforcement, and a zero-trust security culture designed to prevent deception.

Security isn’t just about technology and culture. It’s also about accountability. While Bybit operates as an exchange under a Virtual Asset Service Provider (VASP) registration, Xapo Bank is a fully licensed and regulated bank. That means we don’t just follow security best practices. We follow legal and regulatory requirements designed to protect customer funds.

What does all this mean in practice?

At Xapo Bank, security isn't just a feature—it’s fundamental to our operational architecture. Every transaction, every approval, and every system interaction is designed to remove human error. Here’s how.

MPC-CMP

Unlike Bybit’s multisig implementation, which required human approvals, Xapo Bank uses Multi-Party Computation (MPC-CMP). This system is fundamentally different because:

  • No single person or system ever holds the entire private key. Instead, the key is split in cryptographic “shards”, each held by separate, independent organisations.

  • To sign a transaction, multiple organisations must act simultaneously. Even if one organisation were compromised, an attacker would not have access to the others.

  • The key shards refresh every minute. Even if an attacker somehow accessed one part of the key, it would become invalid before they could collect the rest.

is-self-custody-the-answer-mpc-image

TAP rules

Transaction Authorisation Policy (TAP) rules constitute our answer to the risks of blind signing. These policies automatically enforce transaction limits, restrict counterparties, and prevent unauthorised contract upgrades or changes to wallet permissions. They work at the transaction level—not the user interface—so no matter what a human sees, the underlying detail must comply for it to be enacted. If a transfer doesn’t match pre-approved limits or whitelisted addresses, it’s automatically blocked and this cannot be overridden. Meanwhile, changing the TAP itself requires many multi-layered, offline approvals from separate devices.

Zero trust

At Xapo Bank, we assume that any and every step in the system could be compromised. Our security is built on constant verification—even for internal transfers. Typically, systems authenticate users when they log in. Our zero trust model re-validates every action, continuously checking if the request is coming from the right device, location, and context. Here, trust isn’t a factor—only real-time security verification matters.

Banking regulations

Security isn’t just about preventing hacks. It’s ensuring customer assets remain protected—no matter what happens. Many crypto platforms operate under a Virtual Asset Service Provider (VASP) registration, which focus on basic compliance rather than full financial oversight.

Xapo Bank is a registered bank with internationally recognised banking standards such as Basel II capital requirements, PSD 2 SCA, SOC2 type 2, PCI DSS and more. These guardrails ensure our operations are subject to continuous oversight and enforcement. To support our compliance, we undergo regular external audits by one of the Big Four accounting firms.

Finally, we do not lend, leverage, or risk customer deposits. Funds are always available and protected.

Xapo Bank expands to UK slideshow Image 1
Bitcoin hedge slideshow 1

Xapo Bank: ahead of the curve

We can all fall on it. Assume the systems we use will protect us. Just click “I agree”. The Bybit hack proved that even the strongest-looking security can fail if it relies on human trust. Xapo Bank has moved beyond trust. We verify through cryptography.

No blind approvals

We don’t create situations where people can potentially be deceived. Instead, we insist on automated, policy-enforced certainty through MPC-CMP and TAP rules.

No hidden risks

We back every deposit to the full extent to deliver full-reserve banking with independent auditing.

No assumptions

Even internal transactions are probed as diligently as external ones. We verify at every step.

We are built for the future of crypto security, where trust-based systems and self-custody risks are replaced with cryptographic certainty.

Xapo Bank, the only way to bank your bitcoin.

Learn how we protect your Bitcoin.

Disclaimer

This article is for general information purposes only and is not intended to constitute legal or other professional advice or a recommendation of any kind whatsoever and should not be relied upon or treated as a substitute for specific advice relevant to particular circumstances. We make no warranties, representations or undertakings about any of the content of this article (including, without limitation, as to the quality, accuracy, completeness or fitness for any particular purpose of such content), or any content of any other material referred to or accessed by hyperlinks through this article. We make no representations, warranties or guarantees, whether express or implied, that the content on our site is accurate, complete or up-to-date.

Share this article

tanding woman engaging with the Xapo Bank app on her mobile phone, overlaid with an orange hue.
Apply now
Join
Xapo Bank
Become a member
Ready to upgrade your finances?

The Xapo
Insider

Catch up on the latest crypto news, and get the inside scoop on our products and services.

Explore The Xapo Insider
Xapo Since {{2013}}
Xapo Bank
Article - Feb 25, 2025

Xapo Since 2013

Read Article
Secure your Bitcoin with {{security keys}}
Cryptocurrency
Article - Jan 17, 2025

Secure your Bitcoin with security keys

Read Article
Set Up a Hardware Security Key and Strengthen {{Your Bitcoin Security}}
Cryptocurrency
Article - Jan 17, 2025

Set Up a Hardware Security Key and Strengthen Your Bitcoin Security

Read Article
Celebrating Bitcoin’s Journey to {{USD 100,000}}
News
Article - Dec 05, 2024

Celebrating Bitcoin’s Journey to USD 100,000

Read Article
Understanding Bitcoin dust attacks, {{and how to avoid them?}}
Cryptocurrency
Article - Nov 20, 2024

Understanding Bitcoin dust attacks, and how to avoid them?

Read Article
{{Planning for tomorrow:}} How to Nominate Bitcoin Beneficiaries
News
Article - Nov 14, 2024

Planning for tomorrow: How to Nominate Bitcoin Beneficiaries

Read Article