Bybit Detects And Stops Fake Deposits Saving Over 1B In DOT Funds
Bybit reported that attackers used complex transaction methods to simulate fake deposits. These methods targeted how exchanges track and confirm incoming funds. The attacks were carried out across several blockchain networks.
One method involved batch transactions. Attackers grouped multiple transfers into one operation. A large transfer failed, while smaller ones succeeded. Some systems may treat the full batch as successful.
Another method used multi-step transactions. Attackers changed ownership within the process. This created the appearance of incoming funds. However, there was no real balance increase.
These tactics are designed to trick systems that rely on logs. They do not always reflect actual asset movement. Bybit stated that its systems avoided this issue by verifying real balances.
The exchange confirmed that all attempts were stopped in real time. No incorrect credits were issued. Users were not affected at any stage of the attacks.
Sources: Bybit Debuts Yield Generating Tokenized and Bybit Ramps Up Middle East.
Multi-Layer System Enables Real-Time DetectionBybit uses a multi-layer validation system to monitor deposits. This system checks transactions at different levels. It ensures that only real asset movements are recorded.
The first stage provides full on-chain visibility. Bybit scans blockchain data across supported networks, including complex and failed transactions.
The second stage filters transactions. It matches them with user deposit addresses. It also tracks related account structures.
The third stage focuses on validation. Each transaction is broken into smaller parts. These parts are verified independently. The system checks execution outcomes and transfer methods.
It also tracks ownership changes. This is important for networks like Solana. Balance checks confirm that assets have truly moved.
The final stage uses anomaly detection. Transactions are analyzed based on structure and risk. Alerts are triggered for unusual patterns.
David Zong, Head of Group Risk Control and Security at Bybit, said,“Our system validates transactions at every level of execution.” He added that each operation is verified independently.
Ongoing Security Measures Across Crypto PlatformsFake deposit attacks have existed in the crypto industry for years. Earlier cases include the Mt. Gox exploit and the Silk Road bug. These incidents led to large Bitcoin losses.
The recent attacks show how methods have evolved. Attackers now adapt to modern blockchain designs. They use more complex transaction flows.
Bybit stated that its system is built to handle these changes. It focuses on transaction analysis and balance verification. Ownership tracking also plays a key role.
The exchange continues to improve its risk control systems. It aims to detect both known and new attack patterns. Real-time monitoring helps reduce risks across networks.
Bybit said its approach ensures that only valid deposits are credited. This reduces the chance of system manipulation. It also supports safer trading conditions for users.
The incident reflects ongoing efforts to secure crypto platforms. Exchanges continue to upgrade systems as attack methods change.
Risk & affiliate notice: Crypto assets are volatile and capital is at risk. This article may contain affiliate links. Legal Disclaimer:
MENAFN provides the
information “as is” without warranty of any kind. We do not accept
any responsibility or liability for the accuracy, content, images,
videos, licenses, completeness, legality, or reliability of the information
contained in this article. If you have any complaints or copyright
issues related to this article, kindly contact the provider above.

Comments
No comment