<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>fund recovery Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/fund-recovery/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/fund-recovery/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Wed, 26 Feb 2025 09:46:45 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>fund recovery Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/fund-recovery/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Bybit Declares War on Lazarus Group!</title>
		<link>https://coinengineer.net/blog/bybit-declares-war-on-lazarus-group/</link>
					<comments>https://coinengineer.net/blog/bybit-declares-war-on-lazarus-group/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Wed, 26 Feb 2025 11:00:13 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Bidget]]></category>
		<category><![CDATA[blockchain analytics]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[ByBit]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[eth]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[fund recovery]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[hack attack]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[North Korean hackers]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[wallet tracking]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=37352</guid>

					<description><![CDATA[<p>Cryptocurrency exchange Bybit has intensified efforts to track and recover stolen funds after a massive $1.4 billion hack. In collaboration with blockchain analytics firms, investigations revealed over 11,000 wallets linked to North Korean hackers. New Developments in the Bybit Hack According to blockchain analytics firm Elliptic, the Lazarus Group, a North Korean hacking collective, has</p>
<p>The post <a href="https://coinengineer.net/blog/bybit-declares-war-on-lazarus-group/">Bybit Declares War on Lazarus Group!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="62" data-end="318">Cryptocurrency exchange <strong data-start="86" data-end="95">Bybit</strong> has intensified efforts to track and recover stolen funds after a massive $1.4 billion hack. In collaboration with blockchain analytics firms, investigations revealed over 11,000 wallets linked to <strong data-start="293" data-end="317">North Korean hackers</strong>.</p>
<h2 data-start="320" data-end="362">New Developments in the Bybit Hack</h2>
<p data-start="364" data-end="704">According to blockchain analytics firm <strong data-start="403" data-end="415">Elliptic</strong>, the <strong data-start="421" data-end="438">Lazarus Group</strong>, a <strong data-start="442" data-end="458">North Korean</strong> hacking collective, has used 11,084 cryptocurrency wallets to launder stolen funds. The hackers are suspected of stealing funds from <strong data-start="592" data-end="601">Bybit</strong>’s cold wallet. On February 25, <strong data-start="633" data-end="642">Bybit</strong> CEO <strong data-start="647" data-end="659">Ben Zhou</strong> announced a &#8220;war&#8221; against <strong data-start="686" data-end="703">Lazarus Group</strong>.</p>
<hr />
<p data-start="706" data-end="1038"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p data-start="706" data-end="1038">To recover the stolen funds, <strong data-start="735" data-end="744">Bybit</strong> has taken several steps, including the launch of a new blacklist wallet API and a reward system to track wallets and initiate legal action. <strong data-start="885" data-end="897">Elliptic</strong> also released a public list of wallet addresses linked to <strong data-start="956" data-end="980">North Korean hackers</strong>, helping the community avoid exposure to these addresses.</p>
<h2 data-start="1040" data-end="1082">Elliptic and Bybit’s Collaboration</h2>
<p data-start="1084" data-end="1331">According to <strong data-start="1097" data-end="1109">Elliptic</strong>’s data, all 11,084 wallets are associated with the <strong data-start="1161" data-end="1170">Bybit</strong> hack. Data on these wallets became accessible within just 30 minutes, allowing <strong data-start="1250" data-end="1259">Bybit</strong> users to continue trading without risking exposure to the stolen funds.</p>
<p data-start="1333" data-end="1520"><strong data-start="1333" data-end="1342">Bybit</strong> continues to work with blockchain security firm <strong data-start="1391" data-end="1405">ZeroShadow</strong> to trace the stolen funds. <strong data-start="1433" data-end="1447">ZeroShadow</strong> is tasked with identifying and freezing stolen assets from cold wallets.</p>
<p data-start="1333" data-end="1520"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-149442 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/02/Ekran-goruntusu-2025-02-26-124322.png" alt="Bybit" width="535" height="670" /></p>
<h2 data-start="1522" data-end="1555">Bybit Hack and Fund Transfers</h2>
<p data-start="1557" data-end="1869">According to blockchain analysis firm <strong data-start="1595" data-end="1610">Chainalysis</strong>, the <strong data-start="1616" data-end="1625">Bybit</strong> hack began with a phishing attack and later intercepted a routine transfer from <strong data-start="1706" data-end="1715">Bybit</strong>&#8216;s <strong data-start="1718" data-end="1730">Ethereum</strong> cold wallet to a hot wallet. Stolen <strong data-start="1767" data-end="1774">ETH</strong> was converted into <strong data-start="1794" data-end="1805">Bitcoin</strong> and other cryptocurrencies and moved across different networks.</p>
<p data-start="1871" data-end="2116">Despite the massive breach, <strong data-start="1899" data-end="1908">Bybit</strong> kept withdrawals open to maintain platform stability and secured liquidity through external loans. On February 25, <strong data-start="2024" data-end="2033">Bybit</strong> started repaying the stolen funds, transferring 40,000 <strong data-start="2089" data-end="2096">ETH</strong> back to <strong data-start="2105" data-end="2115">Bidget</strong>.</p>
<hr />
<p data-start="1871" data-end="2116"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/bybit-declares-war-on-lazarus-group/">Bybit Declares War on Lazarus Group!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/bybit-declares-war-on-lazarus-group/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/bybit_ce-1.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/bybit_ce-1.jpg' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
