<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>Lazarus Group crypto hack Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/lazarus-group-crypto-hack/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/lazarus-group-crypto-hack/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Thu, 20 Mar 2025 14:34:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>Lazarus Group crypto hack Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/lazarus-group-crypto-hack/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Bybit: 1.4B USD in Stolen Crypto, 89% Still Traceable</title>
		<link>https://coinengineer.net/blog/bybit-1-4b-usd-in-stolen-crypto-89-still-traceable/</link>
					<comments>https://coinengineer.net/blog/bybit-1-4b-usd-in-stolen-crypto-89-still-traceable/#respond</comments>
		
		<dc:creator><![CDATA[Emre Yumlu]]></dc:creator>
		<pubDate>Thu, 20 Mar 2025 12:30:48 +0000</pubDate>
				<category><![CDATA[Exchange News]]></category>
		<category><![CDATA["bug bounty hunters"]]></category>
		<category><![CDATA[ByBit]]></category>
		<category><![CDATA[Lazarus Group crypto hack]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=38781</guid>

					<description><![CDATA[<p>Bybit pays $2.2 million in rewards to &#8220;bug bounty hunters&#8221; for information on Lazarus Group crypto hack. Bybit Hack: Traces of the Lazarus Group and Efforts to Recover the Stolen Funds On February 21, Bybit experienced one of the largest hacks in history, losing over $1.4 billion worth of digital assets. Blockchain intelligence firm Arkham</p>
<p>The post <a href="https://coinengineer.net/blog/bybit-1-4b-usd-in-stolen-crypto-89-still-traceable/">Bybit: 1.4B USD in Stolen Crypto, 89% Still Traceable</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://coinengineer.net/blog/russian-gotbit-founder-reaches-23-million-deal-with-us-prosecutors/"><strong>Bybit</strong> </a>pays $2.2 million in rewards to <strong>&#8220;bug bounty hunters&#8221;</strong> for information on Lazarus Group crypto hack.</p>
<h2 data-start="0" data-end="83">Bybit Hack: Traces of the Lazarus Group and Efforts to Recover the Stolen Funds</h2>
<p data-start="85" data-end="627">On <strong data-start="88" data-end="103">February 21</strong>, Bybit experienced one of the <strong data-start="134" data-end="162">largest hacks in history</strong>, losing over <strong data-start="176" data-end="192">$1.4 billion</strong> worth of digital assets. Blockchain intelligence firm <strong data-start="247" data-end="270">Arkham Intelligence</strong> identified the <strong data-start="286" data-end="303">Lazarus Group</strong>, a <strong data-start="307" data-end="336">North Korean hacker group</strong>, as the likely perpetrators. The attackers used <strong data-start="385" data-end="395">mixers</strong> to try and make the stolen funds untraceable. However, over <strong data-start="456" data-end="463">88%</strong> of the stolen funds remain traceable. Bybit <strong data-start="508" data-end="524">CEO Ben Zhou</strong> stated that <strong data-start="537" data-end="552">440,091 ETH</strong> was converted into <strong data-start="572" data-end="586">12,836 BTC</strong> and funneled through <strong data-start="608" data-end="626">Bitcoin mixers</strong>.</p>
<p data-start="629" data-end="915">The CEO&#8217;s update came nearly a month after the attack. <strong data-start="684" data-end="701">Lazarus Group</strong> managed to launder the stolen funds through the <strong data-start="750" data-end="798">decentralized cross-chain protocol THORChain</strong> within 10 days. Blockchain security experts remain hopeful that some of the funds can still be frozen and recovered.</p>
<p data-start="917" data-end="1080">Bybit&#8217;s CEO emphasized that tracking transaction patterns is the biggest challenge due to <strong data-start="1007" data-end="1024">crypto mixers</strong>, and there is a need for more &#8220;<strong data-start="1056" data-end="1078">bug bounty hunters</strong>.&#8221;</p>
<blockquote>
<p data-start="1082" data-end="1269">&#8220;In the past 30 days, <strong data-start="1104" data-end="1128">5,012 reward reports</strong> were received, with <strong data-start="1149" data-end="1167">63 being valid</strong>. We expect more reports and need more hunters to unravel mixers, as there is still a long way to go.&#8221;</p>
</blockquote>
<h2 data-start="1271" data-end="1342">Lazarus Group Behind the Bybit Attack: $2.2 Million in Rewards Paid</h2>
<p data-start="1344" data-end="1530">Bybit has paid a total of <strong data-start="1370" data-end="1386">$2.2 million</strong> in <strong data-start="1390" data-end="1401">rewards</strong> to <strong data-start="1405" data-end="1432">12 &#8220;bug bounty hunters&#8221;</strong> who provided valuable information to freeze the stolen funds, via the <strong data-start="1503" data-end="1529">LazarusBounty platform</strong>.</p>
<p data-start="1532" data-end="1641">The exchange is offering <strong data-start="1557" data-end="1564">10%</strong> of the recovered funds as a reward to <strong data-start="1603" data-end="1624">white-hat hackers</strong> and researchers.</p>
<p data-start="1643" data-end="1819">Despite strong security measures, the attack on <strong data-start="1691" data-end="1700">Bybit</strong> illustrates that even <strong data-start="1723" data-end="1750">decentralized exchanges</strong> are vulnerable to sophisticated cyberattacks, according to analysts.</p>
<blockquote>
<p data-start="1821" data-end="2008">&#8220;Once again, it has been clearly reminded that all security measures can be compromised due to <strong data-start="1916" data-end="1931">human error</strong>,&#8221; said <strong data-start="1939" data-end="1972">Trezor analyst Lucien Bourdon.</strong></p>
</blockquote>
<p data-start="1821" data-end="2008"><span style="color: #555555; font-size: 14.4px;">Bourdon explained that the attackers used a sophisticated </span><strong style="color: #555555; font-size: 14.4px;" data-start="2068" data-end="2100">social engineering technique</strong><span style="color: #555555; font-size: 14.4px;"> to approve a malicious transaction that drained funds from Bybit&#8217;s </span><strong style="color: #555555; font-size: 14.4px;" data-start="2168" data-end="2184">cold wallets</strong><span style="color: #555555; font-size: 14.4px;">.</span></p>
<p data-start="2187" data-end="2355" data-is-last-node="" data-is-only-node="">The <strong data-start="2191" data-end="2205">Bybit hack</strong> surpasses the August 2021 <strong data-start="2232" data-end="2253">Poly Network hack</strong>, which saw <strong data-start="2265" data-end="2281">$600 million</strong> stolen, making it the <strong data-start="2304" data-end="2346">largest cryptocurrency exchange breach</strong> to date.</p>
<hr />
<p data-start="2187" data-end="2355" data-is-last-node="" data-is-only-node=""><em class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Also, you can freely share your thoughts and comments about the topic in the comment section. Additionally, please follow us on our <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Telegram</strong>, </a><a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">YouTube</strong></a> and <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/bybit-1-4b-usd-in-stolen-crypto-89-still-traceable/">Bybit: 1.4B USD in Stolen Crypto, 89% Still Traceable</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/bybit-1-4b-usd-in-stolen-crypto-89-still-traceable/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/03/bybit_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/03/bybit_ce.jpg' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
