Beit: Hacker Fools exceeding 50 % from $ 1.4 billion in ETAREUM

The infiltrator responsible for the $ 1.4 billion robit washed more than 50 % of the stolen ethereum in just five days, prompting the THORSAIN’s transactions to record high levels.
According to Blockchain Analytics Spot on the series, the striker moved 266,309 ETHEREUM (ETH), worth $ 614 million, at a rate of 48,420 ETH per day.
If this pace persists, it can be washed completely 233,086 ETH in the next five days.
The increase in illegal transactions revealed the weaknesses of the decentralized financing protocols (Defi), where Thorchain recorded $ 2.91 billion in unprecedented dollars in the volume of transactions between February 22 and February 27.
Spike highlights how Defi platforms can be exploited for money laundering on a large scale, raising concerns about organizational gaps in the encryption industry.
Record the oxenal transactions sizes record
Thorchain, the decentralized liquidity protocol, has become the basic canal of the stolen Ethereum washing. Before the attack, the average daily transactions for Thorchain reached $ 80 million.
Since the infiltrator began to transfer money, the daily sizes jumped to $ 580 million.
The most dramatic rise occurred on February 26, when Thorchain processed $ 859.61 million, followed by an additional $ 210 million on February 27, which led to a total of a total of two days to one billion dollars.
This unprecedented increase also generated great profits for a revolutionary. The network received $ 3 million as fees of sudden increase in activity, which confirms the financial impact of illegal transactions on Defi platforms.
The situation raises concerns about the ability of decentralized exchanges to discover and prevent widespread washing plans.
Federal Bureau of Bureau of Investigation North Korea
The US FBI officially linked the BYBIT penetration to the state -sponsored electronic criminals.
in statement The FBI was released on February 26, the attack as part of a broader electronic campaign known as “Tradertraitor”, which was used to target cryptocurrencies and financial institutions all over the world.
Piracy groups have been linked to North Korea, especially the Lazaros Group, at multiple prominent encryption speeds in recent years.
Stolen funds are often used in such attacks to finance the country’s weapons program, which makes the BYBIT penetration not just a financial crime but a source of geopolitical concern.
Rapid washing of stolen assets through Defi platforms increases the efforts made to track and recover illegal funds, as decentralized protocols lack the supervision of traditional financial systems.
The attackers took advantage of the infrastructure provider
The criminal investigations conducted by Sygnia Labs and Verichain revealed that the BYBIT security infrastructure remained sound despite the breach.
Instead, the weakness has been tracked to a safe porridge developer. The attackers took advantage of this weak link to inject the harmful JavaScript icon into the Safe Genosis user interface, targeting the cold bybit portfolio.
This incident highlights a shift in the tactics of infiltrators. Instead of directly violating exchanges, Internet criminals are increasingly targeting infrastructure providers who support the main encryption platforms.
Although Safe has confirmed that its smart contracts are still safe, the attack confirms the need to enhance safety through the entire ecosystems system, including portfolio providers and third -party developers.
To reduce the damage, Bybit launched a website to track the movement of stolen money. The stock market also offers a reward for any platform or individual who helps in recovering assets.
With more than half of the stolen stolen ethereum that was already washed, the possibility of complete recovery decreases quickly.
Post -bybit: washing sanctuary of more than 50 % of $ 1.4 billion in Ethereum first appeared on Invezz