Beosintrace在08:58:23再次跟踪了@bybit_official Hacker转移资产。新地址0x83C7678492D623FB98834F0FBCB2E7B7F5AF8950于2025年2月24日开始转移资产,08:58:23。

Last Friday, the world witnessed one of the largest crypto heists in history, with Bybit losing around $1.5 billion in an attack attributed to the notorious North Korean hacking group, Lazarus. Now, a recent report suggests that the hacker behind the Bybit attack is laundering stolen funds through the cryptocurrency exchange eXch.
上周五,世界目睹了历史上最大的加密抢劫案之一,拜比特(Bybit)损失了约15亿美元的袭击,归因于臭名昭著的朝鲜黑客黑客组织拉扎鲁斯(Lazarus)。现在,最近的一份报告表明,Bybit攻击背后的黑客是通过加密货币交易所洗钱的资金。
This revelation comes despite eXch’s previous denial of any involvement in money laundering. On February 23, the exchange released a statement claiming, “We are not laundering money for Lazarus/DPRK,” and assured users that all funds were safe and operations were unaffected by the Bybit hack.
尽管Exch先前否认任何参与洗钱的参与,但这一启示仍在。 2月23日,该交易所发表声明,声称“我们不是为拉撒路/朝鲜洗钱。”,并向用户保证,所有资金都是安全的,并且运营不受Bybit Hack的影响。
However, Web3 security firm BeosinTrace tracked the Bybit hacker making another transfer of stolen assets at 08:58:23 UTC+8 today. According to BeosinTrace, the method of laundering funds has become more consistent, mainly using Thorchain to transfer assets to the BTC blockchain, then converting the funds into DAI via the OKX decentralized exchange (DEX). These converted DAI tokens are then sent to eXch.
但是,Web3安全公司BeoSintrace跟踪了Bybit Hacker在今天的08:58:23 UTC+8今天的偷窃资产转移。根据Beosintrace的说法,洗涤资金的方法已经变得更加一致,主要是使用胸科将资产转移到BTC区块链,然后通过OKX分散交易所(DEX)将资金转换为DAI。然后将这些转换后的DAI令牌发送到Exch。
On February 23, at 21:37:23 UTC, BeosinTrace identified a transaction from the hacker’s address, linked to the Bybit attack (0xfc926659dd8808f6e3e0a8d61b20b871f3fa6465), which was detected sending funds to settlement addresses and routed through Thorchain:Router.
2月23日,在21:37:23 UTC,BeoSintrace确定了黑客地址的交易,链接到BYBIT攻击(0xFC926659D8808F6E3E3E0A8D61B20B20B20B20B20B20B20B20B20B20B20B871F3F3F3F3FA6465),该交易被检测到了通过funcess的地址,并将其转移到了funch incessesseptesseptessept。
Today, BeosinTrace reports that the hacker’s asset transfer was completed at 04:00:02 UTC on February 24, 2025, with the same address, 0xfc926659dd8808f6e3e0a8d61b20b871f3fa6465, being used. The asset laundering process continues to stabilize, with the funds being routed through Thorchain to the BTC chain and then exchanged for DAI on OKX DEX, before flowing into eXch.
今天,BeoSintrace报告说,黑客的资产转移于2025年2月24日在04:00:02 UTC完成,并使用相同的地址为0xFC926659DD8808F6E3E0A8D61B20B20B20B20B20B20B20B20B20B20B20B20B20B871F3FA3FA6465。资产洗涤过程继续稳定,这些资金通过胸链路由到BTC链,然后在OKX DEX上交换为DAI,然后才流入Exch。