Bybit Launches Global Effort to Combat Crypto Laundering by Lazarus Group

-

Bybit has introduced a new initiative to combat illicit cryptocurrency laundering linked to North Korea’s notorious Lazarus Group.

Announced by Bybit CEO Ben Zhou, the program aims to enhance security measures and aid in the recovery of stolen digital assets, following one of the largest crypto hacks in history.

Bybit’s New Approach to Tracking Stolen Crypto

To incentivize the retrieval of stolen assets, Bybit has pledged a bounty equaling 10% of any successfully recovered funds, potentially amounting to as much as $140 million.

bybit
X

This bounty will be split, with 5% allocated to those who manage to freeze illicit funds and another 5% to contributors assisting in tracing unauthorized transactions.

The move follows a major breach on February 21, when Bybit, a Dubai-based exchange, suffered an Ethereum exploit suspected to have been carried out by Lazarus Group.

The hack resulted in an estimated $1.4 billion loss, making it a landmark case in cryptocurrency security concerns.

The Mechanics of Lazarus Group’s Crypto Laundering

Blockchain investigator ZachXBT was among the first to attribute the attack to Lazarus Group, a conclusion later verified by crypto intelligence firm Arkham Intelligence.

ZachXBT also connected the group to a similar breach in January, where Singapore-based exchange Phemex lost more than $69 million.

Reports from blockchain analytics firm Elliptic highlight the intricate laundering methods used by Lazarus.

Their operation typically follows a two-phase process to disguise the origins of stolen assets.

Initially, stolen cryptocurrencies are swapped for native blockchain tokens, such as Ether, to bypass freezing measures from issuers.

Subsequently, these funds are distributed across numerous wallets in a practice known as “layering,” complicating efforts to trace and retrieve stolen funds.

Within two hours of the Bybit hack, the group had moved assets across 50 different wallets, each containing about 10,000 ETH.

A Legacy of Cybercrime

Lazarus Group has long been associated with high-profile cybercrimes, with strong ties to North Korea’s state-sponsored hacking operations.

The group first gained global notoriety in 2009 and became infamous in 2016 after orchestrating an $81 million theft from Bangladesh Bank.

A year later, it was linked to the devastating WannaCry ransomware attack, which affected over 300,000 computers in 150 countries.

Now, with its continued targeting of the cryptocurrency sector, Lazarus Group remains one of the most formidable cybercriminal organizations worldwide.

Have you read it yet? SEC drops OpenSea investigation

Disclosure:This article does not contain investment advice or recommendations. Every investment and trading move involves risk, and readers should conduct their own research when making a decision.

Kriptoworld.com accepts no liability for any errors in the articles or for any financial loss resulting from incorrect information.

LATEST POSTS

4 things to watch this week on the crypto market

The crypto world is still reeling from the massive Bybit hack, but this week could be just as eventful. The U.S. economic calendar is packed...

Are investors really buying Bitcoin ETFs?

When it comes to Bitcoin ETFs, the media often paints a picture of widespread adoption and long-term investment. But is that really the case? 10x...

Infini loses $49 million in a hack

Bybit isn’t alone in the hot pot right now, as in the latest crypto hack, $50 million is gone from Infini, a Hong Kong-based stablecoin...

Bybit Bounces Back from $1.4 Billion Hack

Imagine waking up to find out your bank has been hacked for a $1.4 billion. Sounds like a nightmare, but that's exactly what happened to...

Most Popular

Guest posts