Lazarus Group hackers believed to be affiliated with North Korea’s regime have successfully laundered at least $300 million from their unprecedented $1.5 billion cryptocurrency heist targeting the ByBit exchange.
The cybercriminals, identified as the infamous Lazarus Group, executed the attack two weeks ago, marking one of the largest crypto thefts in history.
The hackers reportedly breached one of ByBit’s suppliers on February 21, secretly altering a digital wallet address to redirect 401,000 Ethereum coins.
ByBit, unaware of the breach, transferred the funds to the attackers instead of its own wallet. Since then, investigators have been racing against time to trace and block the stolen funds.
Dr. Tom Robinson, co-founder of crypto investigation firm Elliptic, described the group’s laundering methods as highly advanced. “Every minute matters for the hackers who are trying to confuse the money trail,” he said.
“They are extremely sophisticated in what they’re doing.” Dr. Robinson added that Lazarus Group likely operates around the clock, using automated tools and working in shifts to convert stolen crypto into cash.
Elliptic’s analysis aligns with ByBit’s findings, which indicate that 20% of the stolen funds approximately $300 million have “gone dark,” meaning they are unlikely to be recovered.
The U.S. and its allies have long accused North Korea of using cyberattacks to fund its military and nuclear programs. Experts believe this latest heist is part of a broader strategy by the regime to generate revenue through cybercrime.
Dr. Dorit Dor from cybersecurity firm Check Point highlighted North Korea’s unique approach: “North Korea is a very closed system and closed economy, so they created a successful industry for hacking and laundering. They don’t care about the negative impression of cybercrime.”
ByBit CEO Ben Zhou has assured customers that their funds remain safe, with the company replenishing the stolen assets through loans from investors. However, Zhou has declared “war on Lazarus,” launching a bounty program to track and freeze the stolen funds.
The Lazarus Bounty program encourages public participation in identifying and blocking suspicious transactions. So far, 20 individuals have earned over $4 million in rewards by helping freeze $40 million of the stolen funds.
Despite these efforts, experts remain skeptical about recovering the remaining assets due to Lazarus Group’s expertise in laundering cryptocurrency.
One obstacle in recovering the funds is inconsistent cooperation among crypto exchanges. ByBit has accused eXch, another exchange, of enabling cash-outs totaling more than $90 million.
eXch’s owner, Johann Roberts, initially denied responsibility, citing a lack of clarity about whether the funds were linked to the hack. Roberts now claims his company is cooperating but argues that strict customer identification policies undermine cryptocurrency’s promise of privacy.
The Lazarus Group has shifted its focus in recent years from traditional banking hacks to targeting cryptocurrency platforms, which often lack robust security mechanisms. Past attacks attributed to the group include:
Top Recent attacks from North korea:
As investigators continue their efforts to trace and recover funds from this latest heist, it serves as another stark reminder of North Korea’s growing prowess in cybercrime and cryptocurrency laundering.
Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.
Kali Linux users worldwide are facing an imminent disruption as the security-focused distribution has announced…
In a significant shift observed during the first quarter of 2025, cybersecurity experts have documented…
The cybersecurity landscape is witnessing a significant shift as threat actors increasingly leverage Ransomware as…
Senior members of the World Uyghur Congress (WUC) living in exile became targets of a…
A new Ransomware-as-a-Service (RaaS) group called RansomHub emerged in the cybercriminal ecosystem, specializing in targeting…
SAP released an emergency out-of-band patch addressing CVE-2025-31324, a critical zero-day vulnerability in SAP NetWeaver…