Analyzing the Bybit Hack Using the Radiant Multi-Signature Attack as an Example

2/22/2025, 4:21:23 AM
Beginner
Quick Reads
On February 21, 2025, a serious security incident occurred at the cryptocurrency exchange Bybit, where over $1.5 billion in assets were stolen. This incident is similar to the attack on the Radiant Capital cross-chain lending protocol in October 2025, where attackers stole funds by controlling multi-signature private keys and exploiting contract vulnerabilities. Both incidents highlight the increasing complexity of hacker attacks and expose security vulnerabilities in the crypto industry. This article provides an in-depth analysis of the technical details of the Radiant incident, focusing on the abuse of malicious contracts and multi-signature wallets. The article concludes by emphasizing the urgent need to strengthen industry security measures to protect user assets.

Introduction

On February 21, 2025, a serious security incident occurred at the cryptocurrency exchange Bybit, resulting in the theft of over $1.5 billion in assets. Although Bybit officials responded promptly and stated that they could withstand the losses, the event still caused widespread industry shock. Against this backdrop, we cannot help but recall the theft of the Radiant Capital cross-chain lending protocol on October 17, 2025. While the two incidents differ in terms of attack methods and implementation paths, they both reveal the serious challenges that the cryptocurrency industry faces in terms of security.

Especially industry experts, SlowMist team founder Yu Xi pointed out that Bybit’s theft may be related to North Korean hacker groups (speculation only, there is currently no evidence to show that it is indeed done by North Korean hacker groups, no reference advice), and the way attackers in the Radiant incident gain control by controlling multi-signature private keys and exploiting malicious contract vulnerabilities is also similar to some North Korean hacker tactics. Whether it’s controlling cold wallets or tampering with smart contracts, both incidents indicate that hackers’ attack methods have become more complex and covert, posing a challenge to the security of the cryptocurrency market. Taking Radiant as an example, this article will analyze the process of multi-signature attacks.

Image:https://x.com/evilcos/status/1892970435194863997

Brief Description of Radiant Capital Attack

On October 17th, Radiant Capital’s cross-chain lending protocol was hit by a network attack, resulting in a loss of over $50 million. Radiant is a universal fund market across all chains where users can deposit any asset on any mainstream blockchain and borrow assets. On-chain data shows that the hacker swiftly transferred the stolen assets from Arbitrum and BNB Chain, with approximately 12,834 ETH and 32,112 BNB being deposited into two addresses respectively.

Process Analysis

The core of this attack is that the attacker has taken control of the private keys of multiple signers, thereby taking over multiple smart contracts. Next, we will delve into the specific process of this attack and the technical means behind it.

  1. The attacker invoked the multicall feature through a malicious contract (i.e. 0x57ba8957ed2ff2e7ae38f4935451e81ce1eefbf5). multicall allows multiple different operations to be executed in a single call. In this invocation, the attacker targeted two components in the Radiant system, including the Pool Address Provider and the Lending Pool.

  1. In transaction 1, the attacker controlled a Gnosis multisig wallet (GnosisSafeProxy_e471_1416). Through malicious calls, the attacker successfully executed an execTransaction, which included using transferOwnership to modify the contract address of the lending pool provider. This way, the attacker can control the lending pool contract and further carry out malicious operations.
  2. The attacker exploited the contract upgrade mechanism by calling the setLendingPoolImpl function to replace Radiant’s lending pool implementation contract with their own malicious contract 0xf0c0a1a19886791c2dd6af71307496b1e16aa232. This malicious contract contains a backdoor function that allows the attacker to further manipulate the flow of funds in the system.

A backdoor function is a type of hidden function in malicious contracts, usually designed to appear normal but actually allows attackers to bypass normal security measures and directly obtain or transfer assets.

  1. After the contract in the lending pool was replaced, the attacker called the upgradeToAndCall function to execute the backdoor logic in the malicious contract, further transferring assets from the lending market to the contract controlled by the attacker, thus profiting.

Conclusion: From Radiant to Bybit, security remains a top priority in the cryptocurrency industry

Although the theft incidents of Bybit and Radiant occurred in different projects, their attack methods have highlighted the common security risks in the cryptocurrency market. Whether it is through controlling multi-signature private keys or tampering with smart contracts, hackers have been able to easily break through traditional security defenses using sophisticated technical means.

With the increasingly sophisticated means of hacker attacks, how to enhance the security of cryptocurrency exchanges and protocols has become a problem that the entire industry must deeply consider. Whether it is through strengthening technical protection or adding more stringent security reviews during contract upgrades, future encryption projects will need to continuously enhance their own security capabilities to ensure the safety of user assets.

Gate.io is well aware of the importance of safeguarding user asset security and has always prioritized it. We regularly conduct security audits through detailed management of cold wallets and hot wallets, combined with user balance snapshots and Merkle tree structures, as well as advanced technologies, to comprehensively optimize asset storage and management processes, ensuring the security and transparency of every asset.

This theft incident once again reminds the entire industry of the security challenges. Gate.io will learn from it, continuously upgrade the security protection system, adopt more advanced technical means and risk monitoring measures, ensure the platform is always stable and reliable. We promise to spare no effort to safeguard user assets and provide users with a stable and trustworthy trading environment.

Author: Max
Reviewer(s): Wayne
* The information is not intended to be and does not constitute financial advice or any other recommendation of any sort offered or endorsed by Gate.
* This article may not be reproduced, transmitted or copied without referencing Gate. Contravention is an infringement of Copyright Act and may be subject to legal action.

Share

Crypto Calendar

Proje Güncellemeleri
Etherex, 6 Ağustos'ta REX token'ını piyasaya sürecek.
REX
22.27%
2025-08-06
Nadir Geliştirici ve Yönetim Günü Las Vegas'ta
Cardano, 6-7 Ağustos tarihleri arasında Las Vegas'ta Rare Dev & Governance Day etkinliği düzenleyecek. Etkinlik, teknik gelişim ve yönetişim konularına odaklanan atölye çalışmaları, hackathonlar ve panel tartışmaları içerecek.
ADA
-3.44%
2025-08-06
Blok Zinciri.Rio Rio de Janeiro'da
Stellar, 5-7 Ağustos tarihlerinde Rio de Janeiro'da gerçekleştirilecek Blockchain.Rio konferansına katılacak. Program, Stellar ekosisteminin temsilcilerini, Cheesecake Labs ve NearX ortakları ile birlikte içeren anahtar konuşmalar ve panel tartışmaları içerecek.
XLM
-3.18%
2025-08-06
Webinar
Circle, 7 Ağustos 2025 tarihinde, UTC 14:00'te "GENIUS Yasası Dönemi Başlıyor" başlıklı bir canlı Yönetici İçgörüleri web semineri düzenleyeceğini duyurdu. Oturum, Amerika Birleşik Devletleri'nde ödeme stablecoin'leri için ilk federal düzenleyici çerçeve olan yeni kabul edilen GENIUS Yasası'nın etkilerini inceleyecek. Circle'ın Dante Disparte ve Corey Then, yasaların dijital varlık inovasyonu, düzenleyici netlik ve ABD'nin küresel finansal altyapıdaki liderliği üzerindeki etkilerini tartışacak.
USDC
-0.03%
2025-08-06
X üzerinde AMA
Ankr, 7 Ağustos'ta UTC 16:00'da X üzerinde bir AMA düzenleyecek ve DogeOS'nin DOGE için uygulama katmanını inşa etme çalışmalarına odaklanacak.
ANKR
-3.23%
2025-08-06

Related Articles

Pi Coin Transaction Guide: How to Transfer to Gate.io
Beginner

Pi Coin Transaction Guide: How to Transfer to Gate.io

Pi Network is a decentralized cryptocurrency network for the general public, using the Stellar Consensus Protocol (SCP) consensus mechanism, which allows users to easily mine Pi tokens from their mobile devices and use them for payments and transactions. With the official opening of the mainnet on February 20, 2025, investors can deposit and trade $PI on exchanges such as Gate.io. This article details how to securely transfer Pi Coins to Gate.io, including obtaining a deposit address, completing the transfer using the Pi Network mainnet wallet, and the exchange's arrival confirmation process. In addition, we have analysed $PI investment risks, including market volatility, compliance and potential fraud risks, to remind investors to take risk management before trading.
2/25/2025, 8:21:43 AM
What is N2: An AI-Driven Layer 2 Solution
Beginner

What is N2: An AI-Driven Layer 2 Solution

This article introduces N2 (Niggachain AI Layer 2), the world's first AI-driven Layer 2 blockchain solution. N2 combines AI technology and quantum computing resistance to address the limitations of traditional blockchains in scalability, transaction speed, and cost. Its core technologies include '0-second block time', AI-driven network optimization, and quantum-resistant security protection, aiming to improve transaction efficiency and ensure system stability.
12/23/2024, 7:21:00 AM
Grok AI, GrokCoin & Grok: the Hype and Reality
Beginner

Grok AI, GrokCoin & Grok: the Hype and Reality

Discover Grok AI, GrokCoin, and Grok Crypto—from Elon Musk's AI chatbot to the viral meme coin inspired by it. Learn about GrokCoin’s rise, its connection to Grok AI, and the risks of investing in meme coins.
3/7/2025, 10:33:07 AM
How to Sell Pi Coin: A Beginner's Guide
Beginner

How to Sell Pi Coin: A Beginner's Guide

This article provides detailed information about Pi Coin, how to complete KYC verification, and choose the right exchange to sell Pi Coin. We also provide specific steps for selling Pi Coin and remind of important matters to pay attention to when selling, helping novice users complete Pi Coin transactions smoothly.
2/26/2025, 9:20:50 AM
Crypto Trends in 2025
Beginner

Crypto Trends in 2025

As 2025 arrives, the cryptocurrency market stands at a new crossroads of development. This article delves into five key trends shaping the current crypto landscape, covering significant regulatory changes, the transformational impact of Bitcoin spot ETFs, the deep integration of AI and blockchain, Ethereum’s technical upgrades, and the rise of emerging markets. Through analysis of these trends, the goal is to provide investors, professionals, and enthusiasts with clear insights into the future direction of the crypto market, helping them better seize opportunities and face challenges. Real-world examples are included to help readers understand the dynamics of how the market is developing under each trend.
4/10/2025, 9:55:53 AM
What is Official Elon Coin (ELON)?
Beginner

What is Official Elon Coin (ELON)?

Official ELON Coin is an innovative project launched on the Solana blockchain, connecting the future of cryptocurrency and fan concepts through the $ELON token. After its launch, the project quickly gained strong community support and market confidence, with a maximum market value of $26 million. Through its unique token distribution mechanism and long-term development plan, the project ensures market stability and sustainability.
1/20/2025, 5:08:32 AM
Start Now
Sign up and get a
$100
Voucher!