Main Points:
- FBI Attribution: The Federal Bureau of Investigation (FBI) has confirmed that North Korea’s Lazarus Group, also known as “TraderTraitor,” was responsible for the theft of approximately $1.5 billion in virtual assets from the cryptocurrency exchange Bybit.
- Method of Theft: The hackers gained unauthorized access to Bybit’s Ethereum wallet, transferring the stolen assets to an unidentified address.
- Asset Laundering: Following the theft, the stolen assets were converted into Bitcoin and other cryptocurrencies, then dispersed across numerous blockchain addresses. This strategy is intended to launder the funds and eventually convert them into fiat currency.
- FBI’s Call for Industry Cooperation: The FBI has urged the cryptocurrency industry to collaborate in tracking and blocking transactions associated with the stolen assets to prevent further laundering activities.
- Historical Context: This incident is part of a series of cyberattacks attributed to North Korea, highlighting the nation’s growing expertise in cybercrime and its use of such activities to fund its economy and military programs.
In a significant development within the cryptocurrency sector, the Federal Bureau of Investigation (FBI) has attributed the theft of approximately $1.5 billion in virtual assets from the Dubai-based exchange Bybit to North Korea’s Lazarus Group, also known as “TraderTraitor.” This incident underscores the escalating threat of state-sponsored cybercrime targeting the cryptocurrency industry.
Details of the Bybit Hack
On February 21, 2025, Bybit reported a security breach resulting in the theft of 400,000 Ethereum tokens, valued at approximately $1.5 billion. The hackers gained unauthorized access to Bybit’s Ethereum wallet, transferring the stolen assets to an unidentified address.
Blockchain analytics firms, including Arkham Intelligence and Elliptic, traced the stolen assets to the Lazarus Group, a North Korean cybercrime unit known for orchestrating substantial thefts to fund Pyongyang’s nuclear and missile programs.
Asset Laundering Activities
Following the theft, the stolen assets were converted into Bitcoin and other cryptocurrencies. These funds were then dispersed across numerous blockchain addresses, a strategy designed to launder the assets and eventually convert them into fiat currency.
FBI’s Call for Industry Cooperation
In response to the theft, the FBI has called upon the cryptocurrency industry to collaborate in tracking and blocking transactions associated with the stolen assets. This collective effort aims to prevent further laundering activities and mitigate the impact of such cybercrimes on the industry.
Historical Context
This incident is part of a series of cyberattacks attributed to North Korea, highlighting the nation’s growing expertise in cybercrime. The Lazarus Group has been linked to several high-profile cyberattacks, including the 2014 Sony Pictures hack and the 2016 Bangladesh Bank heist. These activities are believed to be part of North Korea’s strategy to generate revenue for its economy and military programs.

The FBI’s identification of the Lazarus Group as the perpetrators of the Bybit hack highlights the critical need for enhanced security measures and industry collaboration to combat state-sponsored cybercrime in the cryptocurrency sector. As cyber threats continue to evolve, it is imperative for cryptocurrency exchanges, blockchain analytics firms, and law enforcement agencies to work together to safeguard the integrity of the digital asset ecosystem.