
Final week, hackers stole around $1.4 billion in Ethereum cryptocurrency from crypto exchange Bybit, believed to be the most important crypto heist in historical past. Now, the corporate is providing a complete of $140 million in bounties for anybody who can assist hint and freeze the stolen funds.
Bybit’s CEO and co-founder Ben Zhou announced the bounty in a submit on X on Tuesday.
On the official site of the bounty, Bybit explains that for each time somebody traces and freezes among the stolen funds, 5% of that quantity goes to the one who discovered them, and 5% to the “entity” that froze stated funds.
On the time of writing, thanks to 5 bounty hunters, Bybit has already awarded $4.23 million in bounties, in keeping with the location, whose brand is a knife showing to be stabbing by way of the pinnacle of North Korean chief Kim Jong-un.
Contact Us
Do you’ve got extra details about the Bybit hack, or different crypto heists? From a non-work gadget and community, you possibly can contact Lorenzo Franceschi-Bicchierai securely on Sign at +1 917 257 1382, or by way of Telegram and Keybase @lorenzofb, or email. You can also contact TechCrunch by way of SecureDrop.
“We won’t cease till Lazarus or dangerous actors within the business is eradicated. Sooner or later we are going to open it as much as different victims of Lazarus as effectively,” Zhou wrote, referring to Lazarus Group, the identify that the cybersecurity business has assigned to a broad group of North Korean-backed hackers centered largely on cryptocurrency thefts.
A number of safety researchers and crypto safety and monitoring corporations believe the hackers behind the massive Bybit heist work for the North Korean government, which through the years has grow to be very efficient at concentrating on crypto exchanges and web3 firms, stealing $650 million in crypto in 2024 alone, according to the governments of the United States, Japan, and South Korea.
On Wednesday, Bybit’s Zhou published the preliminary results of the forensic investigation into the hack, led by two firms, Sygnia Labs and Verichains. Sygnia concluded that the “root trigger” of the assault was malicious code coming from the infrastructure of SafeWallet, a crypto pockets platform. Verichains stated a benign Javascript file was changed with a malicious model “particularly concentrating on Ethereum Multisig Chilly Pockets of Bybit.”
The 2 investigating safety firms concluded that hackers breached a developer’s gadget at SafeWallet, as the company itself confirmed.