<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>cross-chain bridges Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/cross-chain-bridges/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/cross-chain-bridges/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Sun, 02 Mar 2025 12:41:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>cross-chain bridges Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/cross-chain-bridges/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Bybit Hackers Resume Laundering!</title>
		<link>https://coinengineer.net/blog/bybit-hackers-resume-laundering/</link>
					<comments>https://coinengineer.net/blog/bybit-hackers-resume-laundering/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 02 Mar 2025 14:00:04 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[ByBit]]></category>
		<category><![CDATA[cross-chain bridges]]></category>
		<category><![CDATA[Crypto Analysis]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Decentralized Exchange]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[LazarusGroup]]></category>
		<category><![CDATA[thorchain]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=37637</guid>

					<description><![CDATA[<p>The Bybit hackers accelerated their laundering activities on March 1, moving another 62,200 Ether despite efforts from U.S. authorities to block their transactions. North Korea-Linked Lazarus Group in Action! According to a pseudonymous crypto analyst, the Lazarus Group, linked to North Korea, has successfully laundered the majority of the funds stolen from Bybit on February</p>
<p>The post <a href="https://coinengineer.net/blog/bybit-hackers-resume-laundering/">Bybit Hackers Resume Laundering!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="1581" data-end="1763">The <strong data-start="1585" data-end="1602">Bybit hackers</strong> accelerated their laundering activities on <strong data-start="1646" data-end="1657">March 1</strong>, moving <strong data-start="1666" data-end="1690">another 62,200 Ether</strong> despite efforts from <strong data-start="1712" data-end="1732">U.S. authorities</strong> to block their transactions.</p>
<h2 data-start="1765" data-end="1818">North Korea-Linked Lazarus Group in Action!</h2>
<p data-start="1820" data-end="2108">According to a pseudonymous crypto analyst, the <strong data-start="1868" data-end="1885">Lazarus Group</strong>, linked to <strong data-start="1897" data-end="1912">North Korea</strong>, has successfully laundered the majority of the <strong data-start="1961" data-end="2003">funds stolen from Bybit on February 21</strong>. Only <strong data-start="2010" data-end="2025">156,500 ETH</strong> remains to be moved, which is expected to happen <strong data-start="2075" data-end="2105">within the next three days</strong>.</p>
<hr />
<p data-start="2110" data-end="2458"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p data-start="2110" data-end="2458">The <strong data-start="2114" data-end="2121">FBI</strong> has flagged <strong data-start="2134" data-end="2159">51 Ethereum addresses</strong>, while <strong data-start="2167" data-end="2179">Elliptic</strong> has identified <strong data-start="2195" data-end="2227">over 11,000 wallet addresses</strong> connected to the hackers. <strong data-start="2254" data-end="2269">Chainalysis</strong> reports that the attackers have converted portions of the stolen Ether into <strong data-start="2346" data-end="2392">Bitcoin (BTC), Dai (DAI), and other assets</strong> using <strong data-start="2399" data-end="2455">DEXs, cross-chain bridges, and instant swap services</strong>.</p>
<p data-start="2110" data-end="2458"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-149945 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/03/01955523-3874-73d3-8709-524c77bb80d1.jpeg" alt="" width="2234" height="462" /></p>
<h2 data-start="2460" data-end="2491">THORChain Under Fire!</h2>
<p data-start="2493" data-end="2820">Hackers have been utilizing <strong data-start="2521" data-end="2548">decentralized protocols</strong> to obscure their transactions. One of the most criticized platforms in this process has been <strong data-start="2642" data-end="2655">THORChain</strong>. Developer <strong data-start="2667" data-end="2678">“Pluto”</strong> announced they would no longer contribute to the protocol after a proposal to block North Korean hacker-linked transactions was overturned.</p>
<p data-start="2822" data-end="3010">The <strong data-start="2826" data-end="2840">Bybit hack</strong>, with a <strong data-start="2849" data-end="2865">$1.4 billion</strong> loss, is the <strong data-start="2879" data-end="2916">biggest exploit in crypto history</strong>, surpassing the <strong data-start="2933" data-end="2983">$650 million Ronin Bridge hack from March 2022</strong> by more than <strong data-start="2997" data-end="3007">double</strong>.</p>
<hr />
<p data-start="2822" data-end="3010"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/bybit-hackers-resume-laundering/">Bybit Hackers Resume Laundering!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/bybit-hackers-resume-laundering/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/bybit_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/bybit_ce.jpg' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
