ByBit’s $1.5 billion hack lets North Korean hackers make hundreds of millions of dollars.

Market News Trending News

Ben Zhou, CEO of ByBit, via Getty Images Through a bounty program, ByBit CEO Ben Zhou hopes to recover some of the stolen funds. Customers were reassured by ByBit CEO Ben Zhou that no money had been stolen. Zhou stated that the company is “waging war on Lazarus” despite having repaid the investors for the stolen coins. ByBit’s Lazarus Bounty program encourages the general public to locate the stolen funds and, if possible, freeze them. All crypto transactions are displayed on a public blockchain, so it’s possible to track the money as it’s moved around by the Lazarus Group.
If the hackers try to use a mainstream crypto service to attempt to turn the coins into normal money like dollars, the crypto coins can be frozen by the company if they think they are linked to crime.


Twenty individuals have received rewards totaling more than $4 million for successfully locating $40 million of the stolen funds and alerting cryptocurrency companies to block transfers. But experts are downbeat about the chances of the rest of the funds being recoverable, given the North Korean expertise in hacking and laundering the money.
According to Dr. Dorit Dor of the cyber security firm Check Point, “North Korea is a very closed system and closed economy, so they created a successful industry for hacking and laundering and they don’t care about the negative impression of cyber crime.” Another problem is that not all crypto companies are as willing to help as others.
Crypto exchange eXch is being accused by ByBit and others of not stopping the criminals cashing out.
This exchange has successfully channeled more than $90 million. However, Johann Roberts, the elusive owner of eXch, disputed that via email. He admits they didn’t initially stop the funds, as his company is in a long-running dispute with ByBit, and he says his team wasn’t sure the coins were definitely from the hack.
He says he is now co-operating, but argues that mainstream companies that identify crypto customers are betraying the private and anonymous benefits of crypto currency.


Park Jin Hyok of the FBI Park Jin Hyok is one of the alleged Lazarus Group hackers
Although North Korea is thought to be the only nation in the world using its hacking capabilities for financial gain, it has never acknowledged being behind the Lazarus Group.

The Lazarus Group used to target banks, but in the last five years, they have concentrated on targeting cryptocurrency businesses. There are fewer safeguards in place to prevent money from being laundered, making the sector less secure. Recent hacks linked to North Korea include:
The $41 million UpBit hack in 2019 The $275 million theft of cryptocurrency from KuCoin, where the majority of the funds were recovered The 2022 Ronin Bridge attack which saw hackers make off with $600m in crypto
In 2023, an attack on Atomic Wallet resulted in the theft of approximately $100 million in crypto. The Lazarus Group-accused North Koreans were added to the Cyber Most Wanted list by the United States in 2020. But the chances of the individuals ever being arrested are extremely slim unless they leave their country.

Leave a Reply

Your email address will not be published. Required fields are marked *