8d521bb0 fb62 11ef 896e d7e7fb1719a4.png

North Korea’s cyber attackers siphon off enormous sums from ByBit heist totaling $1.5 billion

Getty Images bybit logo


North Korean Hackers Cash Out $300m from Crypto Heist

Hackers associated with the North Korean regime known as Lazarus Group have successfully cashed out at least $300m from their record-breaking $1.5bn cryptocurrency heist, according to reports.
The criminals, identified as Lazarus Group, pulled off the massive digital token heist in a hack on crypto exchange ByBit two weeks ago. Since then, it has been a game of cat and mouse to track and prevent the hackers from converting the crypto into usable money.
Experts suggest that the notorious hacking team works almost around the clock, possibly funneling the funds into the regime’s military development. Dr Tom Robinson, co-founder of crypto investigators Elliptic, states that every minute matters for the hackers who are extremely skilled in what they do.
Dr. Robinson further adds that North Korea is the most efficient in laundering cryptocurrency when compared to other criminal actors. It is speculated that there is an entire team of people working manually alongside automated tools, using their years of experience to convert crypto into cash with only short breaks each day.
Elliptic’s analysis aligns with ByBit, which reports that 20% of the funds have gone “dark,” meaning they are unlikely to be recovered.
Alongside other nations, the US accuses North Korea of conducting multiple hacks in recent years to fund its military and nuclear development.
On February 21, the criminals hacked into one of ByBit’s suppliers to covertly change the digital wallet address. ByBit erroneously sent the funds to the hackers instead of its own digital wallet.

Getty Images Ben Zhou, ByBit CEO
ByBit CEO Ben Zhou is working on a bounty project to recover the stolen funds

ByBit CEO Ben Zhou assured customers that their funds remain secure. The firm has replenished the stolen coins with loans from investors and, in Zhou’s words, is “waging war on Lazarus.” ByBit’s Lazarus Bounty program seeks public assistance in tracking the stolen funds and freezing them when possible.
As cryptocurrency transactions are traceable on a public blockchain, it is possible to follow the money movements by the Lazarus Group. If the hackers attempt to cash out the coins through mainstream cryptocurrency platforms, those coins can be frozen if linked to crime.
So far, 20 people have received over $4m in rewards for successfully finding and alerting crypto firms to block transactions worth $40m of the stolen money. However, recovery chances for the remaining funds reportedly remain slim due to North Korea’s expertise in hacking and laundering.
Another challenge is not all crypto companies keen to help track the criminals. ByBit and others are accusing the crypto exchange eXch of facilitating the criminals’ cashouts. Over $90m has reportedly been funneled through this exchange.
However, eXch’s owner Johann Roberts denies these claims, stating his team was uncertain the coins were from the hack and they are now cooperating.
FBI Park Jin Hyok
Park Jin-Hyok, a suspected member of the Lazarus Group

North Korea has not admitted to being behind the Lazarus Group, but it is believed to be the only nation using hacking for financial gain. Initially targeting banks, the Lazarus Group has in the last five years shifted focus towards attacking cryptocurrency companies, which are deemed less secure and more vulnerable to money laundering.
Some notable hacks linked to North Korea include the $41m hack on UpBit in 2019, the $275m theft from KuCoin (with most funds recovered), the $600m Ronin Bridge attack in 2022, and the $100m hack on AtomicWallet in 2023.
The chances of arresting the individuals identified by the US on its Cyber Most Wanted list are slim unless they leave their country. As of 2020, several North Koreans accused of being part of the Lazarus Group were added to the list.

Source: https://www.bbc.com/news/articles/c2kgndwwd7lo

71867225 6.jpg

Trump announces the end of intelligence restrictions in the US

71867225 6.jpg

United States Nearly Ceases Sharing Intel with Ukraine – DW – 10 March 2025

Leave a Reply