Current Date:March 3, 2025

Last Stage in Bybit Hack: 70 %of the stolen ETHs are laundered!

70 %of the 499,000 ETH stolen from the Bybit stock exchange were already justified and hackers are preparing to launder their remaining assets within the next three days. North Korean -related attackers surprise security experts with their speed of moving funds. This has become more controversial due to the delayed intervention of USDC exporter Circle.

Bybit: hackers continue to lose their traces

Blockchain analysis company TM Labs says hackers use a complex laundering strategy. The movement of funds through intermediate wallets, decentralized stock exchanges and bridges between chains makes it difficult to monitor the stolen ETHs. The FBI announced that the North Korean tradentraitor group is behind the attack.

Bybit launched a $ 140 million award -winning follow -up program, so far 16 people received a total of $ 4.2 million awards for their efforts to trace hackers. However, while the funds change hands rapidly, the chances of the authorities to intervene gradually decrease.

Circle is criticized for delayed intervention

Crypto researcher Zachxbt argued that Circle is slow in blocking hacker wallets and that this delay gave the attackers the opportunity to miss funds. Ledger and Nomad Bridge Hacks indicating that there are similar situations, the company should move faster, he said.

 

Circle CEO Jeremy Allaire, in response to these criticisms, said that they only made transactions at the request of the official authorities and that funding with their own initiative carries legal risks. However, experts say that delays give advantage to hackers and lead criminals to hide their assets easily. This event once again revealed how quickly the security protocols should be activated in the crypto ecosystem. If central assets do not move quickly, it may be inevitable that similar attacks will become more widespread in the future.

Emergency measures are essential for crypto safety!

This event once again revealed the importance of rapid implementation of security protocols in the crypto world. If central platforms and authorities do not move faster, the hackers will continue to launder without leaving the stolen funds. More strict inspections and instant interventions have become a critical requirement to prevent similar attacks in the future.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -