The North Korean infiltrators were behind the largest “left” in all ages

The Lazarus Group in North Korea was behind the BYBIT penetration of $ 1.46 billion, which was set by ONSAIN Sleuth Zachxbt.
In a previous post on the social media platform X, Arkham I offered a reward Among the 50,000 ARKM symbols for anyone who can recognize the strikers on Friday. Later, the platform said “Final Guide” The attackers were the North Korean hacker group.
“Its provision included a detailed analysis of test transactions and the connected portfolios used before exploitation, in addition to many forensic graphics and timing analyzes,” said Post.
Read more: Bybit loses 1.5 billion dollars in penetration, but it can cover the loss, the CEO asserts
The penetration that shook the encryption market and saw that most of the prices were flowing was “the biggest theft of encryption in all ages, by some margin”, by Tom Robinson Al -Elilili, the co -founder and the chief scholar. “The following encryption theft will be 611 million dollars stolen from the poly’s network in 2021. In fact, it may be the biggest theater in all times.”
The Blockchain Nansen Coindsk data provider told the attackers first withdrew approximately $ 1.5 billion of money from the stock exchange to a major portfolio and then distributed it to several governors. Nansen said: “Initially, the stolen money was transferred to an initial wallet, and then distributed it to more than 40 portfolios,” Nansen said. “The attackers converted all Steth, Cmeth and Meth to ETH before the ETH systematly transferred, an increase of $ 27 million to more than 10 additional portfolios,” Nansen said.
It seems that the attack was caused by something called “Blind signature“When the intelligent contract is approved without a comprehensive knowledge of its contents.” The attack transmission soon became the preferred form of cybersecurity used by advanced threat representatives, including North Korea. “It is the same type of attack that was used in radioactive capital and the WazirX accident,” said Edo Ben Natan, CEO of Blockchain.
“The problem is that even with the best main management solutions, most of the signature process is delegated today to the interfaces of programs that interact with DAPS. This creates critical weakness – opens the door for the harmful manipulation of the signature process, which is exactly what happened in this attack.
CEO of BYBIT Bin Chu Book earlier on x One of the infiltrators “dominated the Cold ETH portfolio of ETH and transferred all ETH in the cold portfolio to this unknown address.” He also emphasized that the stock exchange is “a solvent even if this hack loss is not recovered.”
Oliver Knight contributed to reporting this story
Read more: Bitcoin, the fier
publish_date