BTC $71 776,75 +3.85%
ETH $2 255,68 +6.09%
USDT $0,9999 0%
XRP $1,38 +4.65%
BNB $613,85 +1.59%
USDC $0,9999 +0.01%
SOL $84,84 +5.57%
TRX $0,3163 +0.08%
DOGE $0,0948 +3.86%
HYPE $39,52 +8.06%
ADA $0,2605 +6.23%
LEO $10,11 0.09%
BCH $445,84 +2.93%
LINK $9,25 +4.23%
XMR $338,61 +2.29%
USDe $0,9998 0%
CC $0,1439 2.42%
ZEC $328,98 +21.45%
XLM $0,1633 +3.94%
DAI $0,9999 +0.01%

Bybit Says It Blocked Fake Deposit Attacks Worth Over 1 Billion DOT

Bybit Says It Blocked Fake Deposit Attacks

Bybit says it detected and blocked a coordinated wave of fake deposit attacks across multiple blockchain networks, preventing potential losses of more than 1 billion DOT. The exchange said all attempts were stopped in real time, no funds were wrongly credited, and no users were affected.

The stronger news angle is not just the size of the blocked exposure. It is that Bybit is describing a newer generation of fake deposit attacks aimed at how exchanges scan and validate deposits, rather than at user wallets directly. In other words, this was a systems-security test of exchange infrastructure, not a customer account breach.

 

A direct attack on deposit validation logic

According to Bybit, the attackers used techniques designed to trick exchange systems into crediting deposits that were never actually received. The company says these attacks exploit the way transactions are processed and validated, making them appear legitimate even though they fail or produce no real balance change.

That matters because deposit systems sit at the core of exchange operations. If an attacker can make a platform credit non-existent funds, the problem is not just one bad transaction. It becomes a capital and risk-control issue across the exchange itself. This is an analytical reading of the attack type Bybit described.

How the attacks were structured

Bybit says one attack pattern used batch transaction mechanics. In that setup, a large transfer was intentionally structured to fail while smaller transfers inside the same batch succeeded. Systems that look only at the overall transaction status, rather than each internal step, could misread that activity as a valid deposit.

The company says a second pattern used multi-step transactions combined with ownership changes to create the appearance of incoming funds even though there was no actual net balance increase. Bybit says platforms that rely too heavily on transaction logs instead of balance validation could wrongly treat those flows as legitimate deposits.

That is the real security lesson in the release: attackers are no longer just probing simple edge cases. They are targeting the assumptions exchanges make when they interpret increasingly complex blockchain transactions. This is an analytical conclusion based on the methods Bybit outlined.

Bybit says its defense starts at the atomic level

Bybit says its system validates transactions “at every level of execution” by breaking them down into atomic components and verifying each independently. The exchange says that is what allowed it to catch the attacks before any false credits were issued.

The company describes a four-stage defense model. First comes full onchain visibility across supported networks, including failed, batched and complex transactions. Second comes filtering against user deposit addresses and related account structures. Third comes a multi-layer validation engine that checks inner transaction execution, batch decomposition, transfer methods, ownership changes and actual balance movement. Fourth comes anomaly detection and risk scoring, which triggers real-time alerts when transactions look abnormal.

In practical terms, Bybit is saying that deposit security can no longer rely on surface-level transaction parsing. Exchanges now need to inspect intent, structure and final balance effect at the same time if they want to withstand more advanced multi-chain attacks. This is an analytical reading of the framework Bybit described.

A reminder that an old exploit class is evolving

Bybit says fake deposit attacks are not new to crypto and points to earlier cases including Mt. Gox’s transaction malleability-era losses and a 2012 Silk Road deposit bug. But the exchange argues the latest attempts represent a newer version of the same general threat, adapted to the transaction models of modern blockchains.

That makes this announcement more than a company security brag. It suggests one of crypto’s older infrastructure attack categories is evolving again as chains adopt more complex transaction logic and exchanges support a wider range of deposit formats. This is an analytical conclusion based on the historical comparison in the release.

Why the 1 billion DOT figure needs to be read carefully

Bybit says it prevented “potential losses exceeding 1 billion DOT,” but the release does not explain how many attack attempts that figure aggregates, how the exposure was calculated, or whether 1 billion DOT reflects a maximum theoretical crediting scenario rather than a near-realized loss amount.

That does not weaken the core incident, but it does matter for interpretation. The release clearly presents 1 billion DOT as prevented potential exposure, not as funds that actually left the exchange or were ever credited to attackers.

What we don’t know yet

Bybit does not name the affected blockchain networks, does not say how long the campaign lasted, and does not disclose whether the attackers targeted only Bybit or whether similar attempts were seen across multiple exchanges. It also does not provide a technical post-mortem beyond the summary in the release.

Why it matters for crypto

  • It shows exchange security risk increasingly sits in transaction interpretation and deposit validation, not only in wallet custody.
  • It suggests modern fake deposit attacks are adapting to batched, multi-step and ownership-sensitive transaction models across newer blockchains.
  • The release reinforces that balance-based validation is becoming more important than simple transaction-log parsing for exchange infrastructure.
  • It is also a reminder that large centralized platforms are still key points of failure or resilience in crypto market structure. This is an analytical inference from the nature of the attack.

What to watch next

  • Whether Bybit publishes a deeper technical breakdown or indicators that other exchanges can use to harden their own deposit systems.
  • Whether rival exchanges acknowledge seeing similar attack patterns across multi-chain deposit infrastructure. This is an inference based on Bybit’s description of an evolving exploit class.
  • Whether exchange risk teams move faster toward atomic-level validation and real balance-change checks rather than status-based deposit logic.
  • Whether regulators and institutional clients start asking for more transparency around exchange deposit scanning and validation controls after incidents like this. This is an analytical inference from the scale of the prevented exposure described by Bybit.