What is the following for $ 1.4 billion stolen penetration bybit?

The exchange of prominent cryptocurrency has been hacked by more than $ 1.4 billion in what is described as the largest theft in the history of the industry, and experts indicate that stolen money is likely to be washed through crosses and bridges.
According to a recent report issued by Web3 Security EllepsNorth Korea’s notorious Lazaros group, which is believed to be responsible for the attack, may follow the usual washing style.
Currently, the BYBIT infiltrators are in what the report called the “class stage”, the second stage of their washing process.
At this stage, the Lazarus group tries to block the origin of the money by separating it across multiple portfolios, using bridges of the crossed chain to change assets between Blockchains, and the exchange of symbols on decentralized platforms to complicate tracking efforts.
This was preceded by the initial conversion of the stolen symbols to the ETH, which is a typical first step in its washing strategy.
“This is because the symbols have exporters who in some cases can” freeze “a governor containing stolen origins, while there is no central party that can freeze the ether or bitcoin,” the report explained.
After that, within just two hours of the attack, stolen money was divided across 50 different wallets, each carrying about 10,000 ETH.
Al -Alailji noticed that the attackers have since started to empty this portfolio systematically, with more than 10 % of the already stolen money.
Experts believe that the next possible step will include sending parts of money through encryption mixers such as Tornado Cash.
The Lazarus group is famous for using Tornado Cash, and the platform has faced severe criticism in the past to facilitate cryptocurrencies in North Korea.
Al -Alailji also accused an exchange of exchange of an important role in the washing process, adding that the attackers were using it to convert stolen ether to Bitcoin.
The report said, “Evidence” as a major and ready -made facilitator for this treacherous effort, “adding that the platform refused even to prevent these transactions despite direct requests from bybit.
stock market to reject These allegations of post -cases update.
Despite these efforts, experts in Al -Alailili believe that washing such a huge amount will not be easy for infiltrators.
The huge size of stolen assets increases the risk of detection, as large transactions are likely to lead to exchanges and Blockchain monitoring systems.
Hack of $ 1.4 billion
On February 21, the attackers exploited the Bybit’s Ethereum Multisig Cold as a routine transfer to the warm stock exchange portfolio.
The attackers dealt with the signing interface, making it display the correct wallet address with a change of the logic of the basic smart contract.
More than 1.4 billion dollars of different assets, such as Mantle Staked Eth (Meth) and other ERC-20 codes, diluted off the stock exchange.
The independent zachbt encryption has revealed direct links on the series between the BYBIT and the last phenex expchant, both suspected of working as the Lazarus group.
The same title was used as the first theft through both accidents,
However, Bybit explained that all the users affected by the breach will be completely and launched a loose program of $ 140 million for cybersecurity and Blockchain analysts who help track the stolen assets and recover them.
The post is the following for $ 1.4 billion stolen in a bybit penetration? First appeared on Invezz