Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert
Zero fees, no slippage
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
FBI Joins Manhunt for North Korea’s Lazarus Group as Laundering Effort Intensifies

FBI Joins Manhunt for North Korea’s Lazarus Group as Laundering Effort Intensifies

CoinEditionCoinEdition2025/02/27 16:00
By:Abdulkarim Abdulwahab

The FBI is now involved in the manhunt for North Korea’s Lazarus Group, responsible for the $1.5 billion Bybit hack. Hackers exploited a Safe wallet vulnerability and manipulated transactions to steal ETH. Over 100 Ethereum addresses linked to the group are being monitored, with Bybit freezing $40 million of the stolen funds.

  • The FBI is now involved in the manhunt for North Korea’s Lazarus Group, responsible for the $1.5 billion Bybit hack.
  • Hackers exploited a Safe wallet vulnerability and manipulated transactions to steal ETH.
  • Over 100 Ethereum addresses linked to the group are being monitored, with Bybit freezing $40 million of the stolen funds.

The FBI has joined the search for North Korea’s Lazarus Group, the cybercriminal organization responsible for the Bybit hack that resulted in the theft of ETH valued at $1.5 billion. The attack is considered one of the largest crypto heists to date.

Investigations revealed that hackers compromised a Safe wallet belonging to a Bybit developer and injected malicious code into the exchange’s front end. This allowed them to manipulate transaction parameters and deceive signers into approving unauthorized transfers.

Laundering princess is ongoing, with 270,000 ETH worth $605 million laundered through THORChain.

Breach Origin and Attack Execution

Analysis by Verichains and Sygnia determined that the breach originated from Safe{Wallet}’s AWS infrastructure rather than Bybit’s internal systems. Bybit CEO Ben Zhou disclosed that attackers injected malicious JavaScript into Safe{Wallet}’s AWS S3 bucket on February 19 at 15:29:25 UTC. This unauthorized modification allowed hackers to interfere with Bybit’s transaction approval process.

Hackers tricked signers into approving what seemed like a routine cold-to-warm wallet transfer. However, the manipulated code altered wallet ownership during the signature, redirecting funds.

Related: Binance’s CZ Criticizes Safe’s Bybit Hack Report as ZenGo Expands TRX Wallet Features

Once the ETH was stolen, the funds were distributed across 40+ wallets. They were moved through cross-chain bridges and mixers and processed via THORChain swaps and unregulated exchanges.

Bybit managed to freeze $40 million of the stolen funds and is offering a 10% bounty for recovered ETH. However, $120 million has already been laundered, and an exchange called eXch refused to freeze funds, complicating recovery efforts. The refusal stemmed from its historic dispute with Bybit and other crypto exchanges.

Related: FBI: North Korea’s “TraderTraitor” Gang Behind $1.5B Bybit Hack

FBI’s Call to Action: Blocking TraderTraitor Transactions

Meanwhile, the FBI is urging private sector entities, including RPC node operators, cryptocurrency exchanges, blockchain analytics firms, DeFi services, and other virtual asset service providers, to block transactions linked to addresses associated with the TraderTraitor actors involved in laundering the stolen funds.

Over 100 Ethereum addresses have been linked to North Korean TraderTraitor actors, with some still holding stolen assets.

The FBI expressed commitment to protecting the virtual asset community by identifying, disrupting, and preventing North Korea’s cybercrime operations. It urged individuals with relevant information to contact their local FBI field office or file a report with the FBI’s Internet Crime Complaint Center at ic3.gov.

Disclaimer: The information presented in this article is for informational and educational purposes only. The article does not constitute financial advice or advice of any kind. Coin Edition is not responsible for any losses incurred as a result of the utilization of content, products, or services mentioned. Readers are advised to exercise caution before taking any action related to the company.

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Locked for new tokens.
APR up to 10%. Always on, always get airdrop.
Lock now!