Al -Alailji says that the Lazaros group uses ExcR to laundering stolen money despite the requests from Bybit to prevent transactions

The Lazarus group washed a stolen encryption from the BYBIT HAC penetration last week via Excination EXCH, according to Blockchain Research Eliptic.
The infiltrators looted approximately $ 1.5 billion from ETHEREUM (ETH) and Lido Stated Eter (STTH) from Bybit on Friday.
The attack is the largest psalm for encryption ever and possibly the biggest theft in world history.
Ililji investigator, hidden on the chain Zachbt Other researchers suspended the exploitation of the Lazaros Group, a heavy, heavy electronic criminal group for North Korea, known as many prominent breakthroughs on the main encryption platforms.
In new analysisAl -Alailji notes that the process of laundering Lazaros usually follows the same steps. First, the group exchanges any stolen symbols of the original blockchain origin like Ethereum, because ETH cannot be frozen by a central salad.
Later, the “classes” “classes” “classes” stolen boxes through multiple governorates, exchanges, bridges of the cross chain and encryption mixers to cancel the course of transactions.
Al -Alailji says that Lazaros is currently in the middle of the second step.
“Within two hours of theft, the stolen money was sent to 50 different wallets, each carrying about 10,000 ETH. It is now systematically emptied – as of 1 pm UTC on February 24, 14.5 % of the stolen assets (which informs Its value is now 195 million dollars) from this portfolio.
Once you move from these portfolios, money is washed through various services, including Dexs (decentralized exchanges), crosses and central exchanges.
However, one service appeared as a main facilitator and a borrower for this washing. Excr is an encrypted currency exchange, noticeable to allow its users to replace the unknown Cryptoassets. This led them to use to exchange hundreds of millions of dollars of encryption assets derived from criminal activity, including the multiple thefts committed by North Korea. Although attempting to hide this activity, our analysis shows that since the hack, the encryption assets that were stolen from Bybit have been exchanged at a value of more than $ 75 million using EXCH. Despite the direct Requests From bybit, Excr refused to prevent this activity. “
During the weekend, EACK Take to the Bitcointalk Forum To deny allegations that she was washing the encryption for Lazaros, although she had dealt with a “small” part of the stolen BYBIT boxes.
1.
2. The unimportant part of the money of the bybit penetration is ultimately inserted our address 0xf1da173228fcf015f43f3ea15abbb51f0D8f1123 which was an isolated issue and the only part processed by our exchange, the fees that are donated for public health.
3. Any claims by Zachxbt and others on Twitter in relation to transactions not associated with 0xf1da173228fcf015f43f3ea15abbb51f0D8f1123 which is a lie to EACK The target FUD attack on our exchange. “” “
CEO of BYBIT Bin Chu He says The company has regained 1: 1 support for all customer assets after hacking the record registration, and the Dubai Stock Exchange is its headquarters Declare Full restoration of services on Saturday.
Don’t miss a rhythm – Subscribe to deliver email alerts directly to your inbox
Check the price procedure
Follow us xand Facebook and cable
Browse the daily Hodl Mix
& nbsp

Disclosure: The views expressed in Daily Hodl are not an investment advice. Investors must do due care before making any high -risk investments in bitcoin, cryptocurrency, or digital assets. Please note that your transfers and trading on your own responsibility, and any losses you may bear are your responsibility. Daily Hodl does not recommend buying or selling any encrypted currencies or digital assets, and Hodl Daily Andersor is an investment. Please note that the daily Hodl participates in dependent marketing.
Created Image: Midjourney