Security

Cyber-crime

FBI officially fingers North Korea for $1.5B Bybit crypto-burglary

Federal agents, open up ... your browsers and see if you recognize any of these wallets


The FBI has officially accused North Korea's Lazarus Group of stealing $1.5 billion in Ethereum from crypto-exchange Bybit earlier this month, and asked for help tracking down the stolen funds.

In an alert Wednesday, the bureau said Pyongyang's cyber-crime gang, dubbed TraderTraitor by the Feds, was responsible for the heist. That memo included addresses of wallets said to be operated by the thieves and that contain or contained coins stolen from Dubai-based Bybit.

The g-men hope releasing this info will help others identify and block further transactions involving the purloined Ethereum.

"TraderTraitor actors are proceeding rapidly and have converted some of the stolen assets to Bitcoin and other virtual assets dispersed across thousands of addresses on multiple blockchains," the FBI said. "It is expected these assets will be further laundered and eventually converted to fiat currency."

The Feds aren't alone in wanting vengeance. On Tuesday Bybit set up a bounty program to recover its funds after the Lazarus crew subverted a SafeWallet transfer on February 21 to redirect hundreds of thousands of Ethereum destined for the exchange's hot wallet to the thieves' wallet.

The money is now being laundered, and while more than $40 million in tokens have been identified and frozen, that leaves a lot of digital money in the hands of the Kim Jong Un government.

Bybit is willing to pay a 10 percent bounty to those who can trace movement of its pilfered funds and halt such transfers.

The Chainflip cryptocurrency exchange says it has already stopped about $1 million in Bybit's digital dosh being funneled through its system and warned others to be on their guard.

"We're aware of the hacker's attempts to move the Bybit hack funds to BTC via Chainflip," it said. "We have disabled some front-end services to stop the flow, but as a fully decentralized protocol with 150 nodes, we can't completely shut down the protocol." ®

Send us news
23 Comments

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups

Bybit declares war on North Korea's Lazarus crime-ring to regain $1.5B stolen from wallet

Up to $140M in bounty rewards for return of Ethereum allegedly pilfered by hermit nation

Feds want devs to stop coding 'unforgivable' buffer overflow vulnerabilities

FBI, CISA harrumph at Microsoft and VMware in call for coders to quit baking avoidable defects into stuff

How nice that state-of-the-art LLMs reveal their reasoning ... for miscreants to exploit

Blueprints shared for jail-breaking models that expose their chain-of-thought process

US Cyber Command reportedly pauses cyberattacks on Russia

PLUS: Phishing suspects used fishing gear as alibi; Apple's 'Find My' can track PCs and Androids; and more

Twin Google flaws allowed researcher to get from YouTube ID to Gmail address in a few easy steps

PLUS: DOGE web design disappoints; FBI stops crypto scams; Zacks attacked again; and more!

Two arrested after pensioner scammed out of six-figure crypto nest egg

The latest in a long line of fraud stings worth billions each year

Qualcomm pledges 8 years of security updates for Android kit using its chips (YMMV)

Starting with Snapdragon 8 Elite and 'droid 15

Check out this free automated tool that hunts for exposed AWS secrets in public repos

You can find out if your GitHub codebase is leaking keys ... but so can miscreants

Microsoft expands Copilot bug bounty targets, adds payouts for even moderate messes

Said bugs 'can have significant implications' – glad to hear that from Redmond

Drug-screening biz DISA took a year to disclose security breach affecting millions

If there's something nasty on your employment record, extortion scum could come calling

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war