Last week, The pirates stole approximately $ 1.4 billion in Ethereum Crypto Exchange bybit Ethereum cryptocurrencyConsidered the greatest cryptographic robbery in history. Now the company offers a total of $ 140 million in bonuses for anyone can help trace and freeze stolen funds.
The CEO and co-founder of Bybit Ben Zhou announced the premium In a post on X Tuesday.
On the official premium websiteBybit explains that for each time someone traces and freezes some of the stolen funds, 5% of this amount returns to the person who found them and 5% go to “the entity” which frozen funds.
At the time of writing the editorial staff, thanks to five bonus hunters, Bybit has already allocated $ 4.23 million in bonuses, according to the site, whose logo is a knife appearing stabbing through the head of the North Korean leader Kim Jong-un.
Contact us
Do you have more information on the hacking of Bybit or other cryptographic burglaries? From a device and a non-work network, you can contact Lorenzo Franceschi-Bicchiera safely on the signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or e-mail. You can also contact Techcrunch via Secure.
“We will not stop until Lazarus or the bad players in the industry are not eliminated. In the future, we will also open it to other victims of Lazarus, “said Zhou, referring to Lazarus groupThe name that the cybersecurity industry has attributed to a large group of north-Korean pirates was largely focused on cryptocurrency flights.
Several security researchers and safety and cryptography surveillance companies believe that the pirates behind the massive back-breeding work for the North Korean governmentWho over the years has become very effective in targeting Crypto exchanges and web3 companies, stealing $ 650 million in crypto in 2024 only, According to the governments of the United States, Japan and South Korea.
Wednesday, Zhou de Bybit published the preliminary results From the medical-legal investigation into the hack, led by two companies, Sygnia Labs and Verhains. Sygnia concluded that the “deep cause” of the attack was a malicious code from the infrastructure of ServeA crypto portfolio platform. Verhains said that a Benin JavaScript file has been replaced by a malicious version “specifically targeting the Cold Multisig Portfolio by Bybit Ethereum.”
The two security companies The company itself confirmed.