The story is behind a penetration bybit 1.4 billion dollars
In the largest piracy event in the history of the cryptocurrency industry, the BYBIT is about $ 1.4 billion of STETH, METH and ERC-20. The accident sent shock waves all over the industry. It proves that even the central exchanges with strong security tools are vulnerable to electronic attacks.
Blockchain security analysts, including Arkham Intelligence, suspected the participation of Hacker from North Korea, called Lazarus Group, in the piracy attack. It is worth noting that Arkham Intelligence announced a huge bonus of 50,000 Arkham symbols, which is worth about $ 31,500, to track those behind the attack. Here all you should know.
Bybit Hack: What happened?
At least $ 1.4 billion of ether is looted, liquid metaphysics and other ERC-20 distinctive symbols of Bybit, a prominent encryption exchange known as a strong security system.
Until the last penetration of bybit, the penetration of $ 600 million, which Polle Network suffered in August 2021, was the most hacking in the history of the encrypted currency.
There is a lot of similarities between the latest penetration and the $ 230 million and Hazirx Hack and Capital Radiant Capital of $ 58 million, “Cyvers Cto Meir Dolev.
How did the infiltrators stole $ 1.4 billion from bybit?
Trezor Lucien Bourdon analyst notes that the attack was carried out using advanced social engineering technology. According to his point of view, the attackers, who use this technique, deceived the approval of harmful treatment.
Who stands behind a penetration bybit?
The best Blockchain security analysts, including Arkham Intelligence, emphasizes that the North Korean Hacker, known as the Lazarus group, played a major role in penetration.
Arkham Intelligence has announced a huge bonus of 50,000 Arkham symbols to track those behind the BYBIT penetration.
Beit penetration effect on the encryption industry
Confidence has been affected by the exchange of central coding due to the penetration.
The accident proves that even central stock exchanges, with very advanced security frameworks, are vulnerable to electronic attacks.