North Korea’s Lazarus Group Steals $1.5B from Bybit!
In the so-called largest crypto hacker attack in history, the infamous North Korean hacker group Lazarus and A massive $1.5 billion Utilization on bybit. Arkham Intelligence, a blockchain intelligence company, confirmed the organization’s involvement with evidence from Onchain Suluth Zachxbt.
The attacker uses a “Blind Signature“allows the transaction to be approved without a comprehensive understanding of its content. Bybit’s Eth Cold Wallet was compromised, resulting in nearly $1.5 billion in assets being transferred to one wallet and then spread across multiple wallets.
Hunt for hackers
The company provided 50,000 before Arkham confirmed Lazarus’s involvement Arkm Bounty For anyone following the perpetrator. ZachXBT provides detailed analysis to track stolen funds by testing transactions and forensic data. His discovery was undoubtedly Lazarus’s work.
Ido Ben Natan, CEO of blockchain security firm Blockaid, explained that blind signature attacks have become the preferred strategy for sophisticated hackers, including North Korea. Previous violations used similar methods such as Radiation Capital and Wazirx incidents.
Moving funds
Blockchain data company Nansen revealed that the stolen funds were initially placed in the main wallet and were then allocated to more than 40 different wallets. The attacker then converted all Steth, CMETH and METH HOUTTING to ETH, systematically shifting the $27 million chunk to more than 10 wallets. This approach makes tracking and recovering funds more difficult.
North Korea’s cyber warfare and financial motivations
10 times study Highlights Lazarus’ cyberattacks are not only criminal activities, but also state-sponsored initiatives aimed at funding North Korea’s military projects. The U.S. government estimates that encryption-related cybercrime financing accounts for 30% of North Korea’s missile program. Hackers were selected from childhood and received extensive training, so the highest was sent to China for advanced online education.
The Lazarus Group’s vulnerabilities include notorious violations such as Ronin Network ($625 million), Kucoin ($285 million) and Binance Bridge ($570 million). Their technology has not been discovered, and can adapt to the latest security protocols when using social engineering and malware to penetrate the safest platforms. Furthermore, since these platforms do not require KYC checks, they rely on Defi platforms such as Uniswap to launder money. Interestingly, if North Korea falls behind data.
- Please read also:
- PI Network clears air after Bybit CEO calls it a scam, PI coins rises 20%
- ,,,,,
Bybitt responds
Bybit, CEO of Ben Zhou Confirmed Despite the losses, the exchange remains financially stable. He admitted that the hackers had managed to seize control of the ETH cold wallet, but assured users that Baybit’s solvency was still intact even if the stolen funds were not recovered.
As North Korea’s Lazarus Group repeatedly launches high-profile crypto robberies, the industry is facing increasing pressure to strengthen security with such complex threats.
Never miss the beats in the crypto world!
Stay ahead with Breaking News, expert analysis and real-time updates to the latest trends like Bitcoin, Altcoins, Defi, NFTS, and more.