The North Korean pirates were behind the largest “ flight of all time ” in Crypto

The blockchain analysis company, Arkham Intelligence, said that the Lazarus group of North Korea was the source of the piracy of $ 1.46 billion by Bybit, which we have identified.

In a previous article on the X social media platform, Arkham offered a bonus of 50,000 Arkm tokens for anyone could identify the attackers for the hacking on Friday. Later, the platform said that Zachxbt had submitted “final evidence” that the attackers were the North Korean pirate group.
“His submission included a detailed analysis of test transactions and connected portfolios used before the feat, as well as multiple forensic graphics and synchronization analyzes,” said post.

Read more: Bybit loses $ 1.5 billion in hack but can cover the loss, confirms the CEO

The hacking that rocked the cryptography market and saw most of the prices calm down was called the “largest cryptographic flight of all time, by a certain margin”, by Tom Robinson d’Elliptic, co-founder and chief scientist. “The next largest flight of cryptography would be the stolen at $ 611 million in Poly Network in 2021. In fact, it could even be the biggest flight of all time.”

The Nansen blockchain data supplier, Nansen told Coindesk that the attackers had first withdrawn nearly $ 1.5 billion in a main portfolio, and then distributed them with several wallets. “Initially, the stolen funds were transferred to a main portfolio, which then distributed them on more than 40 portfolios,” said Nansen. “The attackers converted all the Steth, Cmeth and Methamphetamine to ETH before systematically transferred ETH by increments of $ 27 million to more than 10 additional portfolios,” Nansen said.

The attack seemed to have been caused by something called “blind signature”, when an intelligent contract transaction is approved without the complete knowledge of its content. “This vector of attack quickly becomes the favorite form of the cyber attack used by advanced actors of the threat, including North Korea. It is the same type of attack which was used in the violation of Radiant Capital and Wazirx’s incident, “said the CEO of the Blockchain Security Company, Ido, Ido, Ido de Blockaid, the blockchain security company, Ido, Ido, Ido de Blockaid, the blockchain security company, Ido, Ido by Blockaid Ido Ben Natan.
“The problem is that even with the best key management solutions, today, the major part of the signature process is delegated to software interfaces which interact with the DAPPs. This creates a critical vulnerability – it opens the door to malicious manipulation The signature process, which is exactly what happened in this attack, “he said.
The CEO of Bybit, Ben Zhou, wrote earlier on X that a pirate “took control of the specific Cold Seth portfolio and transferred the whole ETH to the cold portfolio to this unidentified address”. He also confirmed that the exchange “is solvent even if this loss of hacking is not recovered”.

Oliver Knight contributed to the relationship of this story
Read more: Bitcoin, Flump ether while the prices of cryptography decrease on the ratio of a massive hacking of $ 1.5 billion

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top