Extropy Security Bytes: w8 2025
Welcome to this week’s Extropy Security Bytes — your go-to source for the latest in blockchain security. From one of the biggest hacks in crpyto history to a politically charged $LIBRA rug pull, we’ve got all the major exploits covered. We also take a look at Ethereum’s latest Geth update, which validators must install to avoid financial losses. Let’s dive in.
Bybit $1.4 Billion Hack:
Bybit confirmed that its multi-signature cold wallet was breached. The CEO, Ben Zhou, announced that hackers had infiltrated the exchange’s (ETH) multi-signature cold wallet, resulting in the draining of nearly $1.5 billion in crypto. The hack was initially detected by on-chain analyst ZachXBT, who noticed suspicious withdrawals.
Attack Details:
Technical Explanation:
Wallets and Signatures:
Funds Involved:
Response and Aftermath:
Attribution:
$LIBRA — crypto’s biggest political rugpull?
Insider Involvement: Blockchain analysts linked the $LIBRA team to previous “rug pull” schemes involving tokens like $MELANIA and $TRUMP, suggesting a pattern of manufactured hype, supply control, and liquidity draining. On-chain data analysis showed that the teams behind the LIBRA and MELANIA tokens were the same. Wallets that purchased LIBRA early on overlapped with those of the MELANIA token and were associated with other “rug pull” projects.
The Rug Pull: Insiders cashed out $87.4 million within three hours of the token’s launch, causing a price collapse. 82% of the token supply was held in a single cluster of wallets, indicating market manipulation. Instead of selling on the open market, insiders extracted funds using one-sided liquidity pools.
Entities Involved:
Losses: Many traders suffered significant losses, with some losing millions of dollars. Eight wallets associated with the LIBRA team cashed out approximately $107 million.
Aftermath: Milei deleted his tweet promoting $LIBRA and initiated an anti-corruption investigation.
Bitcoin Lightning Node Bug:
Vulnerability: A significant bug was discovered that allowed for the remote theft of Bitcoin via Lightning Network Daemon (LND) nodes.
Affected Software: The bug impacted node operators running software older than LND Version 0.18.5 or LITD Version 0.14.11.
Mechanism: Clever hackers found a way to manipulate the payment state of Lightning invoices to remotely drain funds. The vulnerability is related to how LND checks description fields for the settlement of Lightning invoices. The bug involves an inability to cancel AMP invoices if they have a settled sub-invoice.
Impact: Affected Lightning nodes could be completely drained by attackers.
The Fix: Newly released node software LND 0.18.5 and LITD 0.14.1 patch this remote threat vector. All major Lightning developers recommended upgrading to the latest version of LND, which fixes the exploit.
Timing: LND 18.5 was released just a week prior to the bug’s discovery, meaning many LND nodes were out of date and vulnerable. The development team at Lightning Labs was aware of the issue three weeks before the fix was released.
Mitigation: Merchants using Lightning Labs’ software might have been unaffected if their LND node did not interact with invoices generated by services like BTCPay. BTCPay Server had recently upgraded its LND node to 0.18.55.
Real-world instances: There were some real-world instances of actual theft of funds, although details were sparse.
Lightning Network Details: The Lightning Network is a mesh network of approximately 5,000 BTC that move faster and cheaper than regular, on-chain BTC2. It routes payments through 44,000 public channels connecting over 16,000 nodes. Lightning users sacrifice the full security and decentralization of BTC for speed, thrift, and extra functions and expose themselves to Lightning-specific bugs that don’t affect the base layer.
Geth Developers Urge Validators to Update to v1.15.2:
Urgent Update Required: Validators operating on Geth v1.15.1 were urged to immediately upgrade to v1.15.2.
Potential Financial Loss: The upgrade was necessary to prevent potential financial losses due to a critical regression identified in the previous version.
Block Creation Failures: The regression in v1.15.1 could cause block creation failures on the Ethereum mainnet. Such failures could lead to missed block production opportunities, resulting in the loss of block rewards and transaction fees for validators.
Severity: The Geth team emphasized the severity of this issue, stating that the regression in v1.15.1 could cause block creation failures, leading to missed slots.
The Fix: The v1.15.2 update was released on February 17, 2025, to solve the block-building problem in the Ethereum mainnet. This update also reinstated the Discv5 and DNS peer discovery protocols that were inadvertently turned off in v1.14.9, which are important for establishing and maintaining active network participation and the overall functioning of Ethereum nodes.
That wraps up this week’s security updates. Whether it’s high-profile rug pulls, protocol vulnerabilities, or critical software updates, staying informed is key to navigating the Web3 space safely. Keep your nodes updated, your wallets secure, and stay vigilant. See you next week for more insights into blockchain security!
Since 2017, Extropy has been at the forefront of blockchain security, auditing smart contracts across Ethereum and Zero-Knowledge (ZK) protocols. We have collaborated with leading ecosystems, including Base, Starknet, and MINA, ensuring their smart contracts are resilient, efficient, and secure.
We specialize in DeFi, on-chain games, and ZK applications, leveraging formal verification, static analysis, and deep manual reviews to uncover vulnerabilities before they become exploits. Whether you’re working with Solidity, Rust, Cairo, or zkVMs, our collaborative approach ensures your project meets the highest security standards.
- Website: security.extropy.io
- Email: [email protected]
Get in touch today — let’s build safer smart contracts together!