Blog

Bybit Recovers Market Share to 7% after $ 1.4B hack


The Bybit market sharing broke pre-hack levels following a $ 1.4 billion exploitation in February, as the crypto exchange implements lighter security and improves liquidity options for retail traders.

The crypto industry is Stoned by its biggest hack in history In Feb. 21 when bybit Lost more than $ 1.4 billion In liquid-staked ether (steth), mantle staked eth (meth) and other digital assets.

Despite the size of the exploitation, BYBIT continues to recover from the market sharing, According to In an April 9 report of Crypto Analytics firm Block Scholes.

“Because this initial denial, Bybit continues to recover market sharing because it works to adjust the emotion and as volumes return to the exchange,” the report stated.

Block Scholes said the proportional part of the Bybit rose from a post-hack of less than 4% to about 7%, reflecting a strong and stable recovery in place market activity and trading volume.

The Bybit’s Volume Market Market sharing as a proportion of part of the top 20 CEX market. Source: I -Block Scholes

The hack took place in the midst of a “wider trend of Macro de-risking that began before the event,” which signaled that the initial collapse of the Bybit was not just due to exploitation.

Related: Can Ether above recover above $ 3K after a massive $ 1.4B hack bybit?

It took the Bybit hackers 10 days in launder All stolen bybit funds by decentralized crosschain protocol thorchain, Cointelegraph reported on March 4.

Source: Ben Zhou

In spite of the efforts, 89% of the stolen $ 1.4 billion is traced by experts in blockchain analytics.

Related: Thorchain make up $ 5m in fees, $ 5.4B to volume from bybit hack

The 2024 Lazarus Group’s Pausing Group repositioned for bybit Hack

Blockchain Security Firms, including Arkham Intelligence, North Korea’s Lazarus group was identified As is likely to be culprit behind bybit exploitation, as the attacks continue to change funds in an effort to give them unreliable.

Prohibited activity tied to North Korean cyber actors refused after July 1, 2024, despite a attack on the attack earlier that year, According to To blockchain analytics firm chainalysis.

Slowing crypto hacks by North Korea agents raised significant red flags, according to Eric Jardine, chainalysis cybercrimes are leading.

Hacking activity in North Korea before and after July 1. Source: Chainalysis

North Korea’s slowdown “began when Russia and DPRK (North Korea) met for their summit that led to a reallocation of North Korea’s resources, including military staff in Ukraine war,” Jardine told Cointelegraph during the Chainreaction Show on March 26, addition:

“So, we thought of the report that there could be additional things invisible in terms of reality of resources from the DPRK, and then you roll in early February, and you have bybit hack.”

Bybit attack features that even centralized exchanges with strong security measures remain Poor in sophisticated cyberattacksAnalysts said.

Attacking shares similarities to The $ 230 million wazirx hack and the $ 58 million radiant capital hackAccording to Meir Dolev, co-founder and chief technical officer in Cyvers.

https://www.youtube.com/watch?v=ndv0rFehetq

Magazine: tRump’s Crypto Ventures adds conflict of interest, insider trading questions