Blockchain security firm BeosinTrace reported another transaction by the Bybit hacker at 08:58:23 UTC+8. The hacker leverages decentralized exchanges and cross-chain protocols for moving assets.
Hacker's Fund Movement Strategies
The primary method involves using Thorchain to transfer assets to the BTC chain and subsequently converting them into DAI on OKX DEX.
How the Hacker Uses OKX DEX
After the transfer to the BTC chain, funds are converted to DAI on the OKX decentralized platform, then sent to eXch.
Implications for Crypto Security
These actions highlight the increasing use of decentralized platforms for illicit fund transfers, making them harder to track.
Despite monitoring efforts, the hacker's tactics show the complexity of tracing stolen funds once mixed across multiple chains.