Bybit CEO: Over $960M in Stolen ETH Converted to Bitcoin – CoinCentral

 
Bybit co-founder and CEO Ben Zhou has confirmed that the North Korea-linked Lazarus Group was behind the crypto exchange’s $1.4 billion hack earlier this year. According to an executive summary shared by Zhou, hackers exploited a vulnerability in Bybit’s cold wallet infrastructure. The breach involved malicious code inserted through a compromised Safe{Wallet} developer system, allowing attackers to redirect assets to their wallets while disguising the transactions as legitimate.
4.21.25 Executive Summary on Hacked Funds:
Total hacked funds of USD 1.4bn around 500k ETH. 68.57% remain traceable, 27.59% have gone dark, 3.84% have been frozen. The untraceable funds primarily flowed into mixers then through bridges to P2P and OTC platforms.
Recently, we have…
— Ben Zhou (@benbybit) April 21, 2025

The summary revealed that of the stolen funds, approximately 68.6% remain traceable, while 27.6% have gone dark. Only 3.8% has been frozen. The untraceable assets were mainly routed through Wasabi Mixer, then moved across cross-chain platforms and privacy tools. The final destination included peer-to-peer and over-the-counter exchanges, making further tracking difficult.
Zhou disclosed that 432,748 ETH, accounting for roughly 84.5% of the total stolen Ether, was moved to Bitcoin via the THORChain network. This represents around $1.21 billion of the pilfered funds. Of that, about 67.25%—or 342,975 ETH, equivalent to $960 million—was exchanged for 10,003 BTC. These transactions were dispersed across 35,772 wallets, each holding an average of 0.28 BTC.
A smaller portion, estimated at 5,991 ETH or 1.17% of the stolen funds, remains on the Ethereum blockchain. These tokens are spread across 12,490 wallets, each with an average of 0.48 ETH. The transaction pattern indicates a deliberate effort to fragment and obscure the flow of stolen assets.
The report highlights the significant role privacy tools played in concealing the stolen assets. Zhou noted that the Wasabi Mixer was heavily used by the Lazarus Group, followed by smaller usage of CryptoMixer, Tornado Cash, and Railgun. From there, the assets were routed through a sequence of services including eXch, Stargate, LI.FI, Lombard, SunSwap, and THORChain.
A portion of the BTC was later moved back to Ethereum using THORChain, further complicating the tracing process. In total, 944 BTC, valued at approximately $90.6 million, was laundered through Wasabi Mixer alone.
The laundering process eventually ended at over-the-counter and peer-to-peer fiat currency platforms, removing many assets from the blockchain and making them untraceable. These techniques are consistent with past tactics used by state-sponsored threat actors.
To assist in asset recovery, Bybit launched the Lazarus Bounty program, offering up to 10% of any recovered assets. Zhou stated that 5,443 bounty reports were submitted in 60 days, but only 70 were validated. The program has so far paid $2.3 million to 12 bounty hunters. The largest contribution came from the Mantle Layer-2 platform, responsible for freezing $42 million in stolen funds.
Zhou emphasized the need for skilled bounty hunters, particularly those capable of decoding mixer transactions. Bybit has reiterated its commitment to working with investigators and the wider crypto community to trace and recover stolen funds.
 
Yasmin is a crypto content analyst and writer with over 2 years of experience. She has a strong understanding of the crypto market and blockchain technologies. As an avid trader who stays updated on the latest trends and news, Yasmin delivers insightful and informative content.
TLDR ServiceNow stock jumped 14.79% to $932.92 after strong Q1 2025 results. Subscription revenue rose…

mBit

Never Miss Another Opportunity.
Get hand selected news & info from our Crypto Experts so you can make educated, informed decisions that directly affect your crypto profits!
Type above and press Enter to search. Press Esc to cancel.
BC Game Crypto: 100% Bonus & 400 Free Casino Spins, Claim Here!

source

Leave a Reply

This will close in 0 seconds