gtag('config', 'G-0PFHD683JR');
Bitcoin

The biggest stealing currency in history

on February 21, 2025The exchange of an unprecedented electronic attack, with an unprecedented electronic attack, stolen $ 1.5 billion in ether.

This event shook the encryption sector, which once again highlighted digital security gaps. Investigations indicate involvement Lazaros GroupIt is known as North Korea’s electronic crime operations.

How did the attack on BYBIT?

The infiltrators targeted one of the most secure BYBIT origins: Cold walletDesigned to protect money in non -call mode.

However, through advanced Hunting attacksThe malicious actors have endangered the arrests of transactions, which led to this Signature of fraudulent operations. This method, known as “Social Engineering”Human error is used instead of defects in computer systems.

The attack shows that despite the use of Waller without contactSafety remains weak if the access protocols are not sufficiently protected.

The infiltrators were able to Determination of accredited individualsObtaining the necessary signatures to transfer $ 1.5 billion in Eth.

Initial investigations indicate that the Lazarus Group, an alleged electronic criminal organization in North Korea, could be behind the attack.

This group is famous for organizing some of the largest electronic attacks in the encryption sector, which accumulates billions of dollars in recent years.

Lazarus uses advanced techniques ClinicAnd harmful programs, targeted attacks against financial platforms. The stealing on bybit is part of a broader image of illegal activities that aims to Financing North Korean government operationsCraving international sanctions.

Technologies that hackers use to steal $ 1.5 billion

The attack on BYBIT was carried out using advanced methods, combining The target scorer, social engineering and medium solution from the keys to arrival.

  • Advanced fishing: The infiltrators sent fraudulent contacts to the main employees on the stock exchange, which prompted them to reveal sensitive information.
  • Digital signaturesOnce you get the two sites, they exploited the transactions licensing system to transfer money to The titles controlled by the aggressors.
  • Washing stolen money: To avoid tracking, stolen money was divided into multiple portfolios and transported through Mixers and unknown services.

These processes show detailed planning and the ideal implementation level of organized groups such as Lazaros.

Series involved and law enforcement

After the attack, Baybit collaborate with the analysis chainOne of The leading companies In Blockchain analysis, to track the stolen money course.

Chainalysis uses advanced tools for Monitor transactions on BlockchainDetermine suspicious movements and reporting processes of the competent authorities.

International law enforcement agencies are already operating Prevented the stolen assets And identify officials. However, money recovery may be complicated, with the use of infiltrators Advanced techniques to hide effects.

The attack on bybit highlights the need for Improving security strategies To exchange encrypted currency. It includes some important aspects of strengthening:

  • Employee trainingDeception attacks use a human error. Advanced training programs can reduce the risk of settlement.
  • A multi -signed safer authenticationIncreased number of approvals required for high -value transactions can reduce the risk of similar attacks.
  • Monitoring in real time: Blockchain analysis tools can be easy to use like that resulting from timely analysis that suspicious activities.

The encryption sector should quickly adapt to increasingly advanced threats, which improves defenses against expert infiltrators groups.

The effect of the bybit attack on the coded currency sector, bull and bear

The stealing of $ 1.5 billion in ETH is a severe blow to the encrypted currency sector. The events of this size can affect Financial organizersAnd pressure towards the most striking regulations to protect investors.

Users and exchange platforms will need to be approved More advanced security measuresReducing dependence on one points of weakness.

Cooperation between stock exchanges and Blockchain analysis companies and law enforcement will be necessary to counter future threats.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button