Bybit Hacker Launders Over $700M in Stolen Ethereum in Record Time

    The hacker behind the $1.4 billion Bybit exploit is moving fast. In less than a week, they have already laundered more than half of the stolen Ethereum. Most of it has been swapped for Bitcoin using THORChain, a decentralized cross-chain liquidity protocol.

    Updated Feb 28, 2025 12:53 PM GMT+0
    News Room

    Author by

    News Room

    Bybit Hacker Launders Over $700M in Stolen Ethereum in Record Time

    The hacker behind the $1.4 billion Bybit exploit is moving fast. In less than a week, they have already laundered more than half of the stolen Ethereum. Most of it has been swapped for Bitcoin using THORChain, a decentralized cross-chain liquidity protocol.

    Over $700M Washed in Just Five Days

    According to blockchain analytics firm Spot On Chain, the attacker has laundered 266,309 ETH—worth roughly $614 million—in the past 5.5 days. That’s an average of 48,420 ETH per day. At this pace, the remaining 233,086 ETH could be fully laundered within another five days.

    THORChain has been the primary tool for these transactions. Its activity has surged since the Bybit hack, with daily transaction volumes jumping from $80 million to $580 million starting Feb. 22.

    On Feb. 26 alone, THORChain processed a record $859 million in swaps, followed by another $210 million on Feb. 27, per a Coinfomania report. In total, the five-day transaction volume reached $2.91 billion, generating $3 million in fees for the network, Yu Jin, on-chain analyst’s X post further revealed.

    North Korea Behind the Attack, FBI Says

    The U.S. Federal Bureau of Investigation (FBI) has officially linked the Bybit hack to North Korean state-sponsored hackers. The agency described the attack—dubbed “TraderTraitor”—as part of a larger cybercrime campaign linked to North Korea.

    This is not the first time North Korean hackers have been accused of large-scale crypto heists. The regime has reportedly used stolen digital assets to fund weapons programs and evade sanctions.

    Bybit’s Security Wasn’t the Problem

    While the hack resulted in massive losses, Bybit’s core security infrastructure was not compromised. Investigators at Sygnia Labs and Verichain traced the breach to a Safe Wallet developer machine that had been infected with malicious JavaScript code.

    The attackers used this exploit to target Bybit’s cold wallet via the Gnosis Safe UI. Safe has since confirmed that its smart contracts remain secure, but the attack highlights a growing trend—hackers are shifting focus from exchanges to infrastructure providers.

    Bybit Launches Tracker, Offers Bounty

    In response, Bybit has launched a website to track the movement of the stolen funds. The exchange is also offering a bounty to any platform or entity that helps recover the missing assets.

    The hacker still holds more ETH than Ethereum co-founder Vitalik Buterin or even the Ethereum Foundation. If the laundering continues at the current pace, Bybit’s stolen funds could be fully washed within days.

    With U.S. authorities and blockchain analysts closely monitoring the transactions, it remains to be seen whether this hacker can cash out without leaving a trace—or if their trail will eventually catch up with them.

    News Room

    News Room

    Editor

    Newsroom is the editorial team of CoinfoMania, delivering 24/7 crypto news, market insights, and in-depth analysis. With 30+ journalists worldwide, we keep you ahead in the blockchain space.

    Read more about News Room

    Loading more news...