Connect with us

Hi, what are you looking for?

Crypto News

Bybit Hackers Turn to Crypto Mixers After $1.4B Theft, 7.6% of Funds ‘Gone Dark’: CEO

Bybit Hackers Turn to Crypto Mixers After $1.4B Theft, 7.6% of Funds 'Gone Dark': CEO

[ad_1]

Hackers behind the $1.4 billion Bybit theft have begun using multiple crypto mixers to obscure their tracks, according to an executive summary released by the exchange’s CEO Ben Zhou on Wednesday.

Zhou revealed that the threat actors have employed a combination of Wasabi, CryptoMixer, Railgun, and Tornado Cash to launder portions of the 500,000 ETH stolen last month. Some 193 BTC has already entered mixers, primarily Wasabi, before moving to various peer-to-peer vendors.

“Decoding mixer transactions is the no.1 challenge we face now,” Zhou said, noting this trend will likely accelerate as more of the stolen funds enter mixing services.

While 88.87% of stolen assets remain traceable, 7.59% have now “gone dark” and are likely unrecoverable, Zhou said. An additional 3.54% of funds have been frozen through coordination with exchanges.

The majority of stolen ETH—86.29% (440,091 ETH, ~$1.23B)—has been converted to Bitcoin and distributed across 9,117 wallets, averaging 1.41 BTC each, according to data from Lazarus Bounty, the exchange’s bounty program.

Two days after the hack, blockchain intelligence firm Elliptic tracked that the funds had moved and were headed to Bitcoin mixers next.

At the time, anonymous crypto exchange eXch was cited by Elliptic and on-chain sleuths such as ZachXBT as one of the destinations for stolen funds.

The accusation was denied by eXch CEO Johann Roberts, who told Decrypt in an emailed statement that “some deposits” were processed on their platform, but that those were a “minor part of the total amount.”

Lazarus Group and crypto mixers

The Bybit hack, attributed to North Korea’s Lazarus Group by the FBI in February, remains the largest single crypto theft in history.

Lazarus Group’s use of a set of crypto mixers poses a point of escalation of the laundering tactics employed. Each additional mixing layer exponentially increases the complexity of following transaction trails, creating unprecedented challenges for recovery efforts.

Despite these challenges, recovery efforts continue.

Bybit’s bounty program, launched shortly after the February 21 attack, has received 5,012 reports in the past 30 days, with 63 validated as legitimate tips.

The exchange continues to seek assistance from security experts who could help decode mixer transactions, with Zhou stating that, “We need a lot of help there down the road.”

Daily Debrief Newsletter

Start every day with the top news stories right now, plus original features, a podcast, videos and more.



[ad_2]

Source link

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Blockchain

Ripple Lawsuit Update: What Happened? Ripple Labs, the company behind the digital token XRP, has reached a new settlement with the U.S. Securities and...

Blockchain

Introduction It is July 6, 2025, and Donald Trump has officially has signed an executive order which established a Strategic Bitcoin Reserve, bet on...

Crypto News

Ripple price prediction 2025 The world of cryptocurrencies incessantly expands, and Ripple (XRP) happens to be a digital asset that captures the eye of...

Crypto News

[ad_1] In brief BNB continues to trade like an unweighted basket of Bitcoin and Ethereum and will therefore likely surge in price, a Standard...