Last week, hackers stole around $1.4 billion in Ethereum cryptocurrency from Crypto Exchange Bybit. It is considered to be the biggest code robber in history. Now, the company offers a total of $140 million rewards to anyone who can help track and freeze stolen funds.
Bybit CEO and co-founder Ben Zhou announced the prize money on Tuesday in an X post.
On the official website of the prize money, Bybit explains that every time someone freezes by following some of the stolen funds, 5% of that amount is sent to the person who finds them, and 5% goes to the “entities” that Froze said.
At the time of writing, BYBIT has already awarded a $4.23 million prize thanks to five admirers. According to the site, the logo is a knife that appears to stab North Korean leader Kim Jong-un in the head.
inquiry
Is there any more information about a Bibit Hack or other crypto robbery? From unprocessed devices and networks, you can safely contact Lorenzo Franceschi-Bicchierai via signal +1 917 257 1382, via Telegram and Keybase @lorenzofb, or by email. You can also contact firememecoins via SecureDrop.
“It won’t stop until Lazarus and the bad actors in the industry are eliminated. Zhou wrote, referring to the Lazarus Group, a name that focuses on cryptocurrency theft to a wide range of cybersecurity industries assigned to a wide range of North Korea-backed hackers:
Several security researchers and crypto security and surveillance companies believe that the hackers behind the North Korean government’s massive bibit robbery work have been extremely effective at targeting crypto exchanges and web3 companies for many years, and have been extremely effective at stealing $650 million in crypto in 2024 alone.
On Wednesday, Bybit’s Zhou published preliminary results from a forensic investigation of Huck, led by two companies, Sygnia Labs and Verichains. Sygnia concluded that the “root cause” of the attack was malicious code from the infrastructure of Safewallet, a crypto wallet platform. Verichains said the benign JavaScript files have been replaced by a malicious version.
Two security companies investigated concluded that the hacker violated the developer’s device on Safewallet.