The largest cryptocurrency theft in history was carried out by the hacker group Lazarus Group, which is believed to be of North Korean origin. This was stated by the blockchain intelligence company Arkham Intelligence, citing the authoritative anonymous crypto detective ZachXBT. The day before, unknown individuals stole digital assets worth almost $1.5 billion from the ByBit cryptocurrency exchange.

Image source: appshunter.io / unsplash.com

Arkham offered a reward of 50,000 of its ARKM tokens to anyone who could identify the perpetrators of the theft; the platform’s administration later said that ZachXBT had provided “comprehensive evidence” that the North Korean hacker group had committed the crime. “His documentation included a detailed analysis of test transactions and associated wallets used before the exploit was implemented, as well as multiple forensic graphs and timing summaries,” Arkham said.

«”The stolen funds were initially transferred to a main wallet, which then distributed them to more than forty [other] wallets. The attackers transferred all stETH, cmETH, and mETH to ETH before systematically transferring ETH in $27 million increments to more than ten additional wallets,” the administration of the Nansen platform, which analyzes the blockchain, told CoinDesk about the incident.

The hackers carried out the theft of funds using a technique called “blind signing,” in which a smart contract transaction is approved without full knowledge of its contents. “This attack vector is quickly becoming a favorite form of cyberattack by sophisticated criminals, including North Korea. It’s the same type of attack used in the Radiant Capital hack [on October 16, 2024, in which $50 million was stolen in a protocol attack] and the WazirX incident [on July 18, 2024, in which approximately $239.4 million was stolen from the Indian crypto exchange],” said Ido Ben Natan, CEO of blockchain security firm Blockaid. “The problem is that even with the best key management solutions today, much of the signing process is delegated to the APIs that interface with dApps.” This creates a critical vulnerability – it opens the door to malicious manipulation of the signing process, which is what happened in this attack.”

The hacker managed to “take control of a specific ETH cold wallet and transferred all the ETH to this unidentified address,” Bybit CEO Ben Zhou admitted. The exchange will remain “solvent even if this loss from the hack is not recouped,” he assured.

admin

Share
Published by
admin

Recent Posts

Nissan Leaf EV to Become NACS-Ported Compact Crossover in Third Generation

Nissan Leaf can rightfully be considered a long-liver of the electric car market, since the…

3 days ago

OpenAI expects to more than triple its revenue this year and then double it next year.

OpenAI, the market leader in generative artificial intelligence systems, remains nominally a startup, its financial…

3 days ago

OpenAI Decides to Hold 4o Image Generation Launch for Free Users

OpenAI has been forced to delay the release of ChatGPT's built-in image generator for free…

3 days ago

1440p and 240Hz for just $200: Xiaomi updates the 27-inch Redmi G27Q gaming monitor

Xiaomi continues to update its Redmi G27Q gaming monitor every year. The model was first…

3 days ago

Beware, Android is shutting down: OS development will cease to be public, but there is no reason to panic

Android device makers can significantly customize the look and feel of the operating system, but…

3 days ago

Fake GeForce RTX 4090s with RTX 3090 chips have started popping up in China — craftsmen are even changing the GPU markings

In China, scammers have started selling GeForce RTX 3090 graphics cards, passing them off as…

3 days ago