Summary: The hacker responsible for the Bybit attack has resumed moving stolen assets and has refined their laundering techniques. They primarily rely on THORChain to transfer stolen cryptocurrency to the Bitcoin blockchain and convert it into non-freezable DAI using OKX DEX. The hacker has already converted a significant amount of ETH into other assets and still holds a substantial amount. Several cryptocurrency platforms have frozen assets linked to the stolen funds, and THORChain has blacklisted addresses associated with the suspected North Korean hacking syndicate involved in the attack. Bybit has frozen a portion of the stolen assets and warned users about scammers posing as Bybit officials. The hacker is now using Solana and fake KYC data to deposit funds on exchanges, prompting collaboration between Bybit, Pump.fun, and Solana Foundation to remove a Solana-based token linked to the hacker. The evolving laundering strategies pose challenges for exchanges and security firms in recovering stolen funds.



Other News from Today