North Korean Hackers Successfully Convert $300M from Massive ByBit Heist

Wed Mar 12 2025 22:04:10 GMT+0200 (Eastern European Standard Time)
North Korean Hackers Successfully Convert $300M from Massive ByBit Heist

A sophisticated operation by North Korean hackers leads to the cashing out of stolen cryptocurrency funds.


Experts warn that the Lazarus Group's hacking prowess poses a significant threat to both security and the crypto industry at large.



Hackers believed to be affiliated with North Korea have managed to cash out at least $300 million (£232 million) from their unprecedented $1.5 billion cryptocurrency theft from the ByBit exchange, which occurred two weeks ago. Operating under the notorious Lazarus Group moniker, these cybercriminals are engaging in an ongoing battle to obscure their financial tracks while converting stolen digital assets into usable cash.

According to Dr. Tom Robinson, co-founder of blockchain analytics firm Elliptic, these hackers work almost continuously, likely channeling the illicit funds towards military development for the North Korean regime. "Every minute is crucial for them, and they possess a level of sophistication that makes tracking their activities difficult," Dr. Robinson commented. He asserts that North Korea excels in laundering cryptocurrency, possibly employing automated tools and working in shifts around the clock for maximum efficiency.

Elliptic's investigation echoes reports from ByBit, which revealed that 20% of the hacked funds have “gone dark,” making recovery unlikely. The U.S. and its allies have accused North Korea of executing numerous cyber thefts over recent years to finance its military and nuclear initiatives.

The heist, which involved hacking a ByBit supplier to alter the digital wallet address for 401,000 Ethereum coins, was a part of the organization's targeted strategy against cryptocurrency companies, which lack the extensive protective measures seen in traditional banking.

ByBit CEO Ben Zhou has reassured users that their assets remain secure, stating that the firm has borrowed funds from investors to mitigate the loss. The exchange is actively engaged in a campaign dubbed the "Lazarus Bounty," which rewards individuals for tracing and freezing stolen assets. So far, over $4 million has been distributed to vigilant users who helped identify $40 million of the laundered money.

However, the prospects of recovering the remaining stolen funds are dim. Cybersecurity experts highlight that North Korea, with its closed economy, has cultivated an industry for hacking without concern for its negative international image. Moreover, not every crypto service is cooperating; the platform eXch has been accused of failing to prevent the criminals from cashing out, a claim its owner, Johann Roberts, disputes amid an ongoing legal battle with ByBit.

Despite the heightened scrutiny and measures against cybercrime, North Korea remains largely untouched. While the U.S. has placed several North Korean hackers on its Cyber Most Wanted list, the likelihood of arrests is low unless they venture outside their country.

Recent activities linked to the Lazarus Group have included:
- A 2019 attack on UpBit resulting in a loss of $41 million.
- A $275 million theft from KuCoin, with most funds eventually recovered.
- The 2022 Ronin Bridge breach that saw $600 million stolen.
- An attack on Atomic Wallet in 2023 netting around $100 million in crypto.

As the battle between cybersecurity and advanced cybercrime continues, the implications of this case underscore a growing vulnerability within the cryptocurrency realm.

Follow us

© 2024 SwissX REDD UK ltd. All Rights Reserved.