
Bybit Unveils 2025 Security Milestones: New AI-Driven Risk Framework Blocks $300 Million in Fraud-Related Funds
TechFlow Selected TechFlow Selected

Bybit Unveils 2025 Security Milestones: New AI-Driven Risk Framework Blocks $300 Million in Fraud-Related Funds
Bybit firmly believes that security should not be a competitive barrier but a shared responsibility across the entire industry.
Bybit, the world’s second-largest cryptocurrency exchange by trading volume, today officially unveiled the comprehensive results of its 2025 Security Initiative. Bybit has built an industry-leading, multi-layered defense architecture that successfully protected tens of thousands of users—setting a new benchmark for proactive risk management in the digital asset space. According to a Chainalysis report, global cryptocurrency losses due to scams and fraud reached $17 billion in 2025.
Redefining Industry Standards: A Three-Tier Withdrawal Fraud Defense Framework
To overcome the limitations of traditional “reactive remediation” risk controls, Bybit pioneered a dynamic risk-tiered protection system that proactively intervenes *before* financial loss occurs. This system classifies potential scam scenarios into three distinct risk levels, each matched with tailored response strategies—ensuring both secure withdrawals and seamless, uninterrupted trading experiences for users.
Tier 1: Early Warning (Low Risk)
Leveraging big-data-driven heuristic algorithms to detect anomalous behavioral patterns—for example, concentrated large-value withdrawals to a single new address—Bybit automatically triggers a risk assessment questionnaire. Insights gathered from these surveys empower the risk operations team to proactively blacklist high-risk addresses at the source, enabling early interception.
Tier 2: Real-Time Alert (Medium Risk)
When an account is flagged—either via credential stuffing database matches (cross-referencing external data breaches) or association with suspicious withdrawal addresses—Bybit triggers a real-time pop-up alert during the withdrawal process. This mechanism prompts users to pause their action and re-verify transaction details, effectively countering social engineering attacks that rely on urgency or emotional pressure.
Tier 3: Instant Interception + Cooling-Off Period (High Risk)
For wallet addresses confirmed to be involved in scams—including so-called “pig-butchering” investment frauds—Bybit enforces real-time withdrawal interception and mandates a one-hour cooling-off period. This critical time window gives users vital breathing room to regain rational judgment and reconfirm the authenticity of their transactions.
2025 Performance Highlights & Key Metrics
The above measures, rolled out in Q4 2025, delivered breakthrough outcomes for user security:
Q4 Fraudulent Fund Interception & Recovery: Through proactive alerts, Bybit successfully intercepted and recovered $300 million, safeguarding the life savings of over 4,000 users;
Q4 AI-Driven Risk Identification: Bybit’s proprietary AI algorithms, analyzing on-chain data, precisely identified 350 high-risk investment scam addresses—helping 8,000 users avoid potential withdrawal losses;
2025 Full-Year Infrastructure Resilience: The platform successfully repelled over 3 million credential-stuffing (account takeover) attacks;
Q4 On-Chain Proactive Monitoring: The system automatically flagged 350 risky addresses; the ticket-based operations team manually reviewed and tagged an additional 600 addresses—collectively preventing nearly $1 million in immediate scam-related losses.
Building a Shared Security Ecosystem: Industry Collaboration & Public-Private Partnerships
Bybit firmly believes security should not be a competitive barrier—but a shared responsibility across the entire industry. In 2025, strategic emphasis centered on deep integration of external intelligence:
“In 2025, our mission is to evolve our risk control system from a ‘silent shield’ into an active, intelligent security guardian,” said David Zong, Group Head of Risk Management at Bybit. “By deeply integrating AI-powered on-chain monitoring with real-time intelligence from industry partners such as TRM, Elliptic, and Chainalysis, we’re not only protecting Bybit users—we’re helping map the ‘genetic blueprint’ of fraud networks. We are openly sharing these standardized monitoring signals across the broader ecosystem—because industry-wide security begins with the security of every participant.”
Join TechFlow official community to stay tuned
Telegram:https://t.me/TechFlowDaily
X (Twitter):https://x.com/TechFlowPost
X (Twitter) EN:https://x.com/BlockFlow_News














