• Newsletter
  • Contact
  • Press Releases
Friday, May 1, 2026
Stay Ahead with Heaptalk: Your Go-To Source for Business News
  • Login
  • Register
  • Whats on
  • News
  • Events
  • Technology
  • Industry
  • GovAct
  • Expert Talk
  • Insight
  • Sustainability
No Result
View All Result
Stay Ahead with Heaptalk: Your Go-To Source for Business News
  • Whats on
  • News
  • Events
  • Technology
  • Industry
  • GovAct
  • Expert Talk
  • Insight
  • Sustainability
No Result
View All Result
Stay Ahead with Heaptalk: Your Go-To Source for Business News
No Result
View All Result
Home Insight

Crypto security alert: How to protect your assets after the $1.5B Bybit hack

Sinta by Sinta
March 31, 2025
in Insight, News
0
Illustration of crypto security. Credit: Traxer/Unsplash

Illustration of crypto security. Credit: Traxer/Unsplash

Share on FacebookShare on Twitter

Heaptalk, Jakarta — In February 2025, the most significant cryptocurrency theft in history was recorded. The attackers stole approximately $1.5 billion from Bybit, the second-largest cryptocurrency exchange in the world, based in Dubai. This case has raised concerns about crypto security.

The FBI officially identified a North Korean group codenamed ‘TraderTraitor’ as the culprit. This group is known as Lazarus, APT38, or BlueNoroff within the information security community. Their hallmark involves relentless, sophisticated, and ongoing attacks in the crypto asset space: hacking wallet developers, robbing exchanges, stealing from regular users, and even creating fake games.

Kaspersky revealed some tips for securely storing crypto assets, including purchasing a hardware wallet with a screen, which is considered the most effective way to protect crypto assets. Asset owners must first research the vendor to ensure a good reputation. Purchases should be made directly, avoiding second-hand wallets or marketplace buys.

Avoiding putting all crypto assets in one place

Storing the wallet’s seed phrase electronically, including using computer files or photos in galleries, is not recommended. Modern Trojans have learned to infiltrate Google Play and App Store and can recognize data in photos stored on your smartphone. Only paper notes or metal engravings stored in a safe or other physically secure place, protected from unauthorized access and natural disasters, are practical.

Avoid putting all your ‘crypto eggs’ in one basket like other assets. For holders of large or diverse types of crypto assets, it makes sense to use multiple wallets. Small amounts for transaction needs can be kept on exchanges, while the majority can be split among several hardware crypto wallets.

Owners should use a dedicated computer for crypto transactions if possible. However, if that is not feasible, maintain strict digital hygiene on your primary computer. Create separate accounts with low privileges (non-administrator) for crypto operations and use another account—also non-administrator—for work, chatting, and gaming.

Installing robust security tools

Crypto asset owners should exercise caution when choosing crypto wallet software. Carefully review software descriptions, ensure the app has been available in the market for a long time, and check if the source is from an official website and if its digital signature matches the vendor’s website and name. Conduct a deep scan of your computer with the latest security tools before installing and running crypto wallet software. Owners are advised to install robust security tools on both computers and smartphones.

Additionally, owners should be cautious about updates in crypto applications. After releasing a new version, wait about a week and read reviews before installing it. This gives the community time to identify any bugs or Trojans that might have infiltrated the update.

Lastly, phishing is a significant concern for crypto asset owners. Cryptocurrency fraud can be multifaceted and sophisticated, so unexpected messages via email, messenger apps, and similar platforms should be regarded as potential initial attempts at fraud.

Tags: Bybit hackKasperskystoring crypto assets

Related Posts

The Stranglehold at the Hormuz Strait: How a Distant War Is Quietly Breaking Southeast Asia's Economy

The Stranglehold at the Strait: How a Distant War Is Quietly Breaking Southeast Asia’s Economy

April 30, 2026
Global Youth Diplomacy: 1,200 Delegates Convene for the 20th AYIMUN in Kuala Lumpur

Global Youth Diplomacy: 1,200 Delegates Convene for the 20th AYIMUN in Kuala Lumpur

February 3, 2026
How Billing Software for Hospitals Is Transforming Healthcare Finance

How Billing Software for Hospitals Is Transforming Healthcare Finance

January 1, 2026
What is the best office layout for a growing team?

What is the best office layout for a growing team?

January 1, 2026
Indonesian Ministry of Creative Economy Launches 12 Fashion Brands to Global Market Through ASIK Fashion Connect

Indonesian Ministry of Creative Economy Launches 12 Fashion Brands to Global Market Through ASIK Fashion Connect

December 10, 2025
The Comprehensive Guide to Choosing Your First Dental Implant Course: A Checklist for Dentists

The Comprehensive Guide to Choosing Your First Dental Implant Course: A Checklist for Dentists

April 10, 2026
Seedbacklink
Heaptalk business news logo

We Build an Ecosystem by Sharing Business News, Headlines and Expert Talks in Professional Perspective and Positive Point of View. Latest business news media headlines platform today.

Recent Posts

  • The Stranglehold at the Strait: How a Distant War Is Quietly Breaking Southeast Asia’s Economy
  • Indonesia Sets USD 17.5 Billion Target for 41st Trade Expo Indonesia 2026
  • Datacentre Innovation Series 2026: Pioneering the Future of Digital Infrastructure
  • Global Youth Diplomacy: 1,200 Delegates Convene for the 20th AYIMUN in Kuala Lumpur
  • Infinite Wonders: Modinity Fashion Parade 2026 at Borobudur Redefines Southeast Asian Heritage

Follow Us

Facebook
Twitter
LinkedIn Youtube Instagram RSS

Newsletter

  • About Us
  • Editorial
  • Newsletter
  • Contact
  • Privacy Policy
  • Cyber Media Guidelines
  • Disclaimer
  • SOP Perlindungan Wartawan

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • News
  • Technology
  • Industry
  • GovAct
  • Events
  • Whats on
  • Expert Talk
  • Insight
  • Video
  • Sustainability
  • Newsletter
  • Press Releases
  • Login
  • Sign Up

© 2024 Heaptalk.com

Go to mobile version