Hackers successfully laundered the entire 499,000 ETH stolen from the ByBit cryptocurrency exchange, raising significant cybersecurity concerns.
FBI's Official Findings
The Federal Bureau of Investigation confirmed North Korea's involvement in the ByBit hack. On February 26, 2025, the agency identified the TraderTraitor cyber actors as responsible for the theft on February 21, 2025. The FBI revealed that the attackers converted portions of the stolen ETH into Bitcoin and other cryptocurrencies, dispersing funds across thousands of addresses. The FBI has urged RPC node operators, crypto exchanges, blockchain analytics firms, and other virtual asset providers to block transactions linked to the stolen assets.
How the Attack Happened
Bybit confirmed that the hack occurred during a routine transfer of Ethereum from an offline 'cold' wallet to a 'warm' wallet used for daily trading. The attackers exploited security vulnerabilities to access the funds. However, Bybit assured users that their holdings remained safe. CEO Ben Zhou stated that the company is solvent, and all client assets are fully backed, prepared to cover any losses with their $20 billion customer assets and potential loans from partners.
Efforts to Recover Stolen Funds
Bybit is actively seeking to recover the stolen funds by engaging cybersecurity experts and blockchain analysts. The company is offering a 10% bounty on any recovered funds, potentially amounting to $140 million. This attack heightens concerns about North Korean cyber operations targeting the crypto sector. The FBI and blockchain intelligence firms like Elliptic and TRM Labs have identified over 11,000 wallet addresses linked to the hack, confirming the attackers' operational efficiency.
The laundering of funds stolen in the ByBit hack emphasizes the complexity of cyber attacks and the need for enhanced security measures in the crypto industry.