On February 21, 2025, Dubai-based cryptocurrency exchange Bybit suffered a theft of approximately $1.46 billion in crypto assets. Initial reports indicated that the attackers used malware to trick the exchange into approving a transaction to transfer funds to the thieves’ accounts. This is the largest cryptocurrency heist to date, far exceeding the $611 million stolen from Poly Network in 2021 (most of which was eventually returned by the hackers). In fact, it is almost certainly the largest single heist in history, a record previously held by Saddam Hussein, who stole $1 billion from the Central Bank of Iraq on the eve of the Iraq War in 2003. Elliptic analyzed a variety of factors, including the analysis of the money laundering path of the stolen crypto assets, and determined that the mastermind behind the Bybit theft was the North Korean Lazarus Group. Over the past 17 years, hackers linked to North Korea have stolen more than $6 billion in crypto assets, funds that were allegedly used to support the country’s ballistic missile program. The Lazarus Group has developed powerful and sophisticated attack capabilities that not only allow it to infiltrate target organizations and steal crypto assets, but also launder the stolen funds through thousands of blockchain transactions. After the theft, Elliptic worked around the clock with Bybit, cryptocurrency service providers, and other investigators to track the stolen funds and prevent them from being liquidated. As the world's leading provider of cryptocurrency trading and wallet screening solutions, Elliptic's software is alerting customers around the world to ask if they have received the stolen funds from this theft. This has directly led to the freezing of some of the funds stolen from Bybit. The money laundering process of the Lazarus Group usually follows a typical pattern. The first step is to exchange all the stolen tokens for "native" blockchain assets, such as ETH. This is because tokens have issuers who can "freeze" wallets containing stolen assets in certain circumstances, while there is no central authority that can freeze ETH or Bitcoin. This is exactly what happened in the minutes following the Bybit theft, where hundreds of millions of dollars in stolen tokens like stETH and cmETH were converted to ETH. The attackers used decentralized exchanges (DEXs) to accomplish this, likely to avoid asset freezes that might occur when using centralized exchanges to launder funds. The second step in the money laundering process is to "layer" the stolen funds in an attempt to obscure the transaction path. The transparency of the blockchain means that these transaction paths can be traced, but these layering strategies will complicate the tracking process and buy valuable time for money launderers to cash out. The layering process can take many forms, including:
The Lazarus group is currently in the second phase of money laundering. Within two hours of the theft, the stolen funds were sent to 50 different wallets, each holding approximately 10,000 ETH. These wallets are being systematically emptied - as of 10 PM UTC on February 23, 10% of the stolen assets (now worth $140 million) had been moved from these wallets. Once the funds are moved from these wallets, they are laundered through a variety of services, including DEXs, cross-chain bridges, and centralized exchanges. However, one cryptocurrency exchange called eXch has become a major willing facilitator in this money laundering. eXch is known for allowing users to anonymously exchange crypto assets, which has led to it being used to exchange hundreds of millions of dollars in crypto assets from criminal activity, including multiple thefts perpetrated by North Korea. Since the hack, tens of millions of dollars worth of Bybit’s stolen crypto assets have been exchanged through eXch. Despite direct requests from Bybit, eXch has refused to stop this activity. The stolen ETH is being gradually converted into Bitcoin through eXch and other services. If past money laundering patterns are followed, we may see the use of mixers to further obfuscate transaction paths. However, due to the huge scale of the stolen funds, this may be challenging. North Korea’s Lazarus Group is the most “professional” and well-resourced crypto money launderer in existence, constantly adapting its techniques to evade identification and seizure of stolen assets. Starting within minutes of the Bybit theft, the Elliptic team worked around the clock with Bybit, its clients, and other investigators to track these funds and prevent the North Korean regime from benefiting from them. |
<<: The next big breakthrough in blockchain: What we should be watching for
>>: Bitfinex: BTC once fell below $91,000 and is at a critical moment
Any form of facial expression has different meani...
Kentucky lawmakers last week filed a bill aimed a...
What is the mole sign of good fortune and luck? S...
Temperament is something that is mostly innate, r...
JimCoin moves the wheel of history alone. Have yo...
BCH Mining Pool Review--Phase 2 Profit measuremen...
In today's society, leftover men and women ha...
Blockchain technology originated from Bitcoin. It...
A woman with a round chin is a good wife and moth...
On April 6, Monero hard forked at block height 15...
1. The index finger is too long If a person's...
Hands are one of our most dexterous organs. We ca...
Generally speaking, thin lips are the most in lin...
Everyone is born with birthmarks. Some people hav...
Love cheater's facial features In real life, ...