Based on the information available from posts on X and web sources as of today, February 21, 2025, 5:07 PM WAT, there are reports and claims suggesting a significant security breach at Bybit, the cryptocurrency exchange, involving the outflow of approximately $1.4 billion to $1.46 billion in digital assets, including ETH, stETH, cmETH, and mETH. Here’s a detailed response to your query, while critically examining the information and treating it as inconclusive until officially verified by Bybit or credible blockchain security entities.

Bybit Hack Overview
-
Reported Incident: Posts on X and web reports indicate that Bybit experienced a security breach, with unauthorized activity detected in one of its ETH cold wallets. The incident reportedly involved a sophisticated attack, possibly a phishing or transaction manipulation scheme, as mentioned in Bybit’s official X statement and corroborated by on-chain analysts like ZachXBT. The total value of the stolen funds is cited as $1.4 billion to $1.46 billion, including ETH, stETH (Lido Staked Ethereum), cmETH (Mantle Network’s composable liquid restaking token), and mETH (another liquid restaking token associated with Bybit’s offerings).
-
Outflow Details: The hacker is allegedly exchanging stETH, cmETH, and mETH for ETH on decentralized exchanges (DEXs), as noted in posts on X and web reports. This activity is being tracked to specific Ethereum addresses you provided:
-
0x47666fab8bd0ac7003bce3f5c3585383f09486e2
-
0xa4b2fd68593b6f34e51cb9edb66e71c1b4ab449e
-
0xdd90071d52f20e85c89802e5dc1ec0a7b6475f92 These addresses are mentioned in connection with the suspicious outflows and swapping activities, but their exact role (e.g., hacker wallets, intermediary addresses, or exchange-related accounts) is not fully confirmed and requires further investigation by blockchain analytics firms.
-
-
Current Status: Bybit has acknowledged the incident on X, stating that a multisig cold wallet executed a transfer to a warm wallet, which was then manipulated. However, the full scope, confirmation of the exact amounts, and the status of the hacker’s actions are still under investigation. Posts on X suggest the hacker is actively swapping the stolen assets for ETH, but this information is speculative and based on on-chain observations, not official Bybit statements.
Is $ETH on Discount?
-
Market Impact: The idea of $ETH being “on discount” due to this hack is speculative and not supported by conclusive evidence at this time. If the hacker is selling large amounts of stETH, cmETH, and mETH for ETH on DEXs, it could theoretically increase selling pressure on ETH, potentially driving its price down temporarily due to market panic or liquidity absorption. However, several factors could counteract this:
-
Market Resilience: The crypto market, including ETH, has shown resilience to hacks in the past. Large-scale sell-offs by hackers often get absorbed by buyers, especially if the market perceives the incident as isolated to Bybit and not a broader Ethereum network issue.
-
Whale Activity: Recent posts on X and web data (e.g., Santiment reports) mention significant ETH accumulation by whales (over 1 million ETH in the past week), which could stabilize or even drive up ETH prices despite the hack.
-
Exchange Response: If Bybit or other exchanges freeze related assets, implement insurance, or recover funds, the market impact could be minimized. Bybit’s history of offering insurance funds for user losses (as seen in past incidents) might mitigate panic selling.
-
Speculative Nature: Without real-time price data or official confirmation of the hack’s impact, it’s impossible to confirm if ETH is “on discount.” Crypto prices are highly volatile and influenced by numerous factors beyond this single event, such as macroeconomic conditions, ETF flows, or regulatory news.
-
-
Caution: The notion of $ETH being “on discount” is a market sentiment or trading strategy hypothesis, not a factual outcome. Hacks can create fear, uncertainty, and doubt (FUD), leading to temporary price drops, but they can also trigger buying opportunities if the market stabilizes quickly. However, buying assets tied to a hack carries significant risk, especially if the funds are frozen, traced, or recovered by authorities or the exchange.
Critical Examination
-
Unverified Claims: The reports of a $1.4 billion to $1.46 billion hack, the specific assets stolen (ETH, stETH, cmETH, mETH), and the hacker’s swapping activities are based on posts on X and web articles, many of which cite on-chain detective ZachXBT. However, these claims are not yet confirmed by Bybit or independent blockchain security firms like Chainalysis or TRM Labs. The accuracy of the amounts, the nature of the attack (e.g., phishing, cold wallet compromise), and the addresses’ involvement require official verification.
-
Addresses Provided: The Ethereum addresses you listed (0x47666fab8bd0ac7003bce3f5c3585383f09486e2, 0xa4b2fd68593b6f34e51cb9edb66e71c1b4ab449e, 0xdd90071d52f20e85c89802e5dc1ec0a7b6475f92) are mentioned in connection with the suspicious outflows. However, their exact role (e.g., hacker wallets, laundering addresses, or unrelated accounts) is unclear. Blockchain explorers like Etherscan or Dune Analytics could provide transaction history, but interpreting these addresses requires expertise and official confirmation to avoid misattribution.
-
Historical Context: Crypto exchanges have faced numerous hacks (e.g., FTX, Mt. Gox, Poly Network), but the scale of this alleged Bybit hack ($1.4B–$1.46B) would be one of the largest in history if confirmed. Past incidents show hackers often swap stolen assets for more liquid tokens like ETH or Bitcoin to launder funds, but exchanges and law enforcement (e.g., via the FBI or Interpol) frequently trace and recover such assets.
What You Should Do
-
Verify Official Sources: Check Bybit’s official website, X account (@Bybit_Official
), or press releases for updates on the hack, the status of ETH/stETH/cmETH/mETH withdrawals, and any impact on user funds. As of 5:07 PM WAT today, Bybit has acknowledged unauthorized activity but has not provided full details.
-
Monitor Blockchain Data: Use blockchain explorers (e.g., Etherscan, Dune Analytics) to track the provided addresses and related transactions. However, interpreting this data requires caution, as it could involve legitimate exchange activity or unrelated transactions.
-
Assess Market Risks: If you’re considering trading ETH or related tokens based on this “discount” hypothesis, be aware of the high risks, including potential price volatility, regulatory actions, or asset freezes. Consult real-time market data (e.g., from CoinMarketCap, CoinGecko) and avoid acting solely on unverified social media reports.
-
Stay Cautious: The crypto space is prone to misinformation, especially during high-profile incidents. Avoid making investment decisions based on unconfirmed reports or speculative posts on X.
Limitations
-
The information from X posts and web sources is inconclusive and speculative. Bybit’s official statement confirms unauthorized activity but does not specify the exact amounts ($1.4B–$1.46B), the full scope of assets (ETH, stETH, cmETH, mETH), or the current status of the hacker’s actions.
-
I cannot access real-time market data, blockchain transaction details, or Bybit’s internal systems to confirm if ETH is “on discount” or if the hacker’s swapping activities are ongoing. For accurate, up-to-date information, you’d need to consult official Bybit announcements, blockchain analytics platforms, or financial news outlets.
-
The addresses you provided are part of the reported activity, but their association with the hack or the hacker requires verification from credible sources, not just social media or web reports.
If you want me to search the web or X for the latest official updates, analyze specific posts, or provide more context on the addresses or market trends, let me know, and I’ll assist further!