The Lázaro Group of North Korea intensified the efforts to wash the Bybit funds after what is considered the largest cryptography hack in the history of $ 1.4 billion.
The Cyberatackers moved another 62,200 eth ($ 138 million) on March 1. This leaves them with only 156,500 ethereum (eth) of the original robbery, according to an analysis of the ERMINCN cryptographic researcher.
The last transfer carries the total amount washed to approximately 343,000 eth, which is about 68.7% of 499,000 eth stolen during the February 21 attack. According to the current rhythm, Embercn projects that computer pirates will erase the remaining funds in the next three days.
<figure class="wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter“/>
This accelerated washing occurs despite the recent intervention of the Federal Research Office (FBI). The FBI formally attributed the trick of $ 1.5 billion to North Korea in a public service announcement on February 26.
The FBI confirms North Korean responsibility
According to the announcement of the FBI, North Korea was responsible for stealing approximately $ 1.5 billion in virtual assets of the Bybit cryptocurrency exchange on February 21, 2025 or around 2025.
The FBI has designated this specific cybernetic operation of North Korea as “merchant.”
<img decoding="async" width="1024" height="834" src="https://crypto.news/app/uploads/2025/03/image-1024×834.png” alt=”Bybit hacker moves 62,200 eth, the total amount could be eliminated in 3 days – 1″/>
The details of the announcement that commercial actors are moving rapidly, since they have already converted parts of bitcoin stolen assets and other cryptocurrencies scattered in thousands of addresses into multiple blockchains.
FBI officials expect these assets to be lacked even more and eventually become fiduciary currency.
The FBI is actively asking for private sector assistance. They have also asked RPC nodes, exchanges, bridges, blockchain analysis companies, Defi Services and other virtual asset service providers to block transactions connected to the addresses that commercial actors that are using to wash stolen assets.
The FBI has shared addresses linked to computer pirates, while the Blockchain Elliptic analysis firm has expanded monitoring efforts by marking more than 11,000 wallet addresses potentially linked to the operation.
According to Chainysis, computer pirates have used several mixing techniques to hide the trail of stolen funds. They have also converted eth portions into bitcoin (btc), Dai Stablecoin and other assets.
The group has mainly used decentralized exchanges, cross -chain bridges and instant exchange services without knowing the requirements of its client (KYC).