APIs present a security risk—that much is a given. Attacks on APIs have caused some of the most significant security incidents of the past decades. But the question now is: How can we flip the script and leverage their power to enhance security? Bybit might just have the answer.
Bybit—one of the world’s leading cryptocurrency exchanges— recently leveraged the power of an API in the wake of a devastating security breach that resulted in a staggering $1.5 billion loss. This blog post explores how Bybit’s innovative API-driven approach is setting a new standard in cybersecurity and why API security is essential for today’s digital landscape.
On February 21, 2025, Bybit detected unauthorized activity within one of its Ethereum cold wallets during a routine transfer. Upon inspection, they found that Lazarus Group, a North Korean cybercriminal gang, had exploited vulnerabilities stemming from a compromised Safe{Wallet} developer machine. By injecting malicious JavaScript into critical infrastructure, the attackers manipulated the smart contract logic, redirecting over 400,000 ETH and stETH—totaling more than $1.5 billion—to an unknown address.
The attack rocked the crypto world and stands as the largest crypto heist in history. The past half-decade has seen a string of major crypto heists, highlighting the inherent vulnerability of these platforms and, more importantly, the dire need for improved security and response efforts.
Source: https://www.comparitech.com/crypto/biggest-cryptocurrency-heists/
However, the incident has had an unexpected silver lining. In response to the attack, Bybit released a revolutionary new API designed to help ethical security experts recover the compromised funds. Let’s dive deeper into Bybit’s response.
Collaboration is at the core of Bybit’s API-driven response. The organization immediately recognized the need for rapid and coordinated action between external and internal security experts and, in light of this, released a groundbreaking API containing a “black list” of identified suspicious wallet addresses. The black list API is foundational to Bybit’s comprehensive Recovery Bounty Program and is designed to empower ethical hackers and security professionals to intercept fraudulent transactions quickly.
Bybit’s API initiative marks an enormous step forward for coordinated, industry-wide responses to security incidents. It has the potential to completely transform the way we respond to threats and is powered by the following features:
Want to join Bybit’s initiative? Just follow these steps:
APIs have the potential to revolutionize the way organizations respond to security incidents. Bybit’s response to the $1.5B hack is a textbook example of this fact. APIs have powerful features that can transform your security strategy, including:
So, what does the Bybit incident teach us? It teaches us that the digital battleground is constantly evolving on both sides of the fence. While attackers are growing more sophisticated and rendering traditional security measures obsolete, emerging technologies – like the Bybit API – are rapidly leveling the playing field. Bybit’s strategy—integrating real-time threat intelligence, automated updates, and industry-wide collaboration—illustrates the future of cybersecurity:
Bybit’s move to deploy a real-time API for blacklisting suspicious wallet addresses is transformative. It is not only helping to mitigate the fallout of a $1.5 billion crypto heist but also setting a new benchmark for the role of APIs in cybersecurity. This incident serves as a wake-up call for all organizations to invest in advanced API security solutions. In an era where digital threats are both complex and relentless, the power of APIs lies in their ability to provide rapid, automated, and collaborative defenses that keep hackers at bay.
For API security companies, the message is clear: embrace the API revolution. Equip your clients with the tools they need to detect, respond to, and ultimately stop cyber threats before they can inflict lasting damage.
Wallarm is the only solution that unifies best-in-class API Security and real-time blocking capabilities to protect your entire API portfolio in multi-cloud, cloud-native, and on-premises environments. With Wallarm, you can worry less about the costs of an API incident. Book a demo today to find out more.