Bybit Launches Global Effort to Combat Crypto Laundering by Lazarus Group

-

Bybit has introduced a new initiative to combat illicit cryptocurrency laundering linked to North Korea’s notorious Lazarus Group.

Announced by Bybit CEO Ben Zhou, the program aims to enhance security measures and aid in the recovery of stolen digital assets, following one of the largest crypto hacks in history.

Bybit’s New Approach to Tracking Stolen Crypto

To incentivize the retrieval of stolen assets, Bybit has pledged a bounty equaling 10% of any successfully recovered funds, potentially amounting to as much as $140 million.

bybit
X

This bounty will be split, with 5% allocated to those who manage to freeze illicit funds and another 5% to contributors assisting in tracing unauthorized transactions.

The move follows a major breach on February 21, when Bybit, a Dubai-based exchange, suffered an Ethereum exploit suspected to have been carried out by Lazarus Group.

The hack resulted in an estimated $1.4 billion loss, making it a landmark case in cryptocurrency security concerns.

The Mechanics of Lazarus Group’s Crypto Laundering

Blockchain investigator ZachXBT was among the first to attribute the attack to Lazarus Group, a conclusion later verified by crypto intelligence firm Arkham Intelligence.

ZachXBT also connected the group to a similar breach in January, where Singapore-based exchange Phemex lost more than $69 million.

Reports from blockchain analytics firm Elliptic highlight the intricate laundering methods used by Lazarus.

Their operation typically follows a two-phase process to disguise the origins of stolen assets.

Initially, stolen cryptocurrencies are swapped for native blockchain tokens, such as Ether, to bypass freezing measures from issuers.

Subsequently, these funds are distributed across numerous wallets in a practice known as “layering,” complicating efforts to trace and retrieve stolen funds.

Within two hours of the Bybit hack, the group had moved assets across 50 different wallets, each containing about 10,000 ETH.

A Legacy of Cybercrime

Lazarus Group has long been associated with high-profile cybercrimes, with strong ties to North Korea’s state-sponsored hacking operations.

The group first gained global notoriety in 2009 and became infamous in 2016 after orchestrating an $81 million theft from Bangladesh Bank.

A year later, it was linked to the devastating WannaCry ransomware attack, which affected over 300,000 computers in 150 countries.

Now, with its continued targeting of the cryptocurrency sector, Lazarus Group remains one of the most formidable cybercriminal organizations worldwide.

Have you read it yet? SEC drops OpenSea investigation

Disclosure:This article does not contain investment advice or recommendations. Every investment and trading move involves risk, and readers should conduct their own research when making a decision.

Kriptoworld.com accepts no liability for any errors in the articles or for any financial loss resulting from incorrect information.

LATEST POSTS

Schwab is going all in on crypto?

Let me tell you a not-so-average Wall Street bedtime story. Charles Schwab, the buttoned-up, old-school titan of finance is about to wade knee-deep into the...

Pi Network’s new roadmap is here, but people say it’s a big pile of sh*t

The Pi Network, the one you mine on your phone by tapping a button like you’re playing Candy Crush, finally released its long-awaited roadmap. You’d...

Coinbase warns of a new crypto winter

Let’s talk straight,this crypto market, it’s caught a chill. And not the kind you shake off with a hot espresso. We’re talking about the kind of...

Uniswap’s founder thinks there’s a fight for DeFi’s soul

Hayden Adams, the boss behind Uniswap got opinions, and loud ones. He’s looking at the DeFi sector, and he’s not mincing words. According to Adams,...

Most Popular

Guest posts