北韓駭客透過 15 億美元 ByBit 駭客攻擊套現數億美元

商業2025年3月10日4 分鐘閱讀

北韓駭客透過 15 億美元 ByBit 駭客攻擊套現數億美元

北韓駭客透過 15 億美元 ByBit 駭客攻擊套現數億美元

北韓駭客透過 15 億美元 ByBit 駭客攻擊套現數億美元

閱讀程度

A group of hackers believed to be working for the North Korean government has successfully stolen a staggering amount of money from a cryptocurrency exchange called ByBit. This theft is reported to be around $1. 5 billion, and experts estimate that the hackers have already converted at least $300 million of this amount into cash that is unlikely to be recovered. The hackers, known as the Lazarus Group, have been very active in their efforts to turn the stolen cryptocurrency into usable funds. According to Dr. Tom Robinson, a co-founder of a company that investigates cryptocurrency crimes, North Korea is exceptionally skilled at laundering stolen cryptocurrency. He suggests that the hackers likely have a dedicated team working around the clock, utilizing automated tools and their extensive experience to achieve their goals. Dr. Robinson notes that they only take a few hours off each day, indicating their commitment to their illicit activities. ByBit has reported that approximately 20% of the stolen funds have 'gone dark,' meaning that it is highly unlikely that these funds will ever be recovered. The United States and its allies have accused North Korea of conducting numerous hacks in recent years to finance its military and nuclear programs. On February 21, the hackers managed to alter the digital wallet address of one of ByBit's suppliers, leading to the misdirection of 401,000 Ethereum coins. ByBit believed it was transferring the funds to its own wallet, but instead, the coins were sent directly to the hackers. Ben Zhou, the CEO of ByBit, has assured customers that their funds are safe and that the company is actively working to recover some of the stolen money. To aid in this effort, ByBit has launched a program called the Lazarus Bounty, which encourages the public to help trace the stolen funds and freeze them where possible. Since all cryptocurrency transactions are recorded on a public blockchain, it is possible to track the movement of the stolen money. If the hackers attempt to use a mainstream cryptocurrency service to convert their coins into traditional currency, those companies can freeze the transactions if they suspect they are linked to criminal activity. So far, 20 individuals have received over $4 million in rewards for successfully identifying $40 million of the stolen funds and alerting cryptocurrency firms to block the transfers. However, experts remain pessimistic about the chances of recovering the remaining funds, given North Korea's expertise in hacking and laundering money. Dr. Dorit Dor, a cybersecurity expert, points out that North Korea has developed a successful industry for hacking and laundering money, and they do not seem to care about the negative perception associated with cybercrime. Another challenge in this situation is that not all cryptocurrency companies are willing to cooperate. ByBit has accused a company called eXch of allowing the hackers to cash out, with more than $90 million successfully funneled through this exchange. Johann Roberts, the owner of eXch, has disputed these claims, stating that they did not initially stop the funds due to an ongoing dispute with ByBit and uncertainty about the origin of the coins. He claims that his company is now cooperating but argues that mainstream companies that identify cryptocurrency customers are undermining the privacy and anonymity that cryptocurrencies offer. North Korea has never officially acknowledged its involvement with the Lazarus Group, but it is believed to be the only nation using its hacking capabilities for financial gain. In the past, the Lazarus Group targeted banks, but in recent years, they have shifted their focus to cryptocurrency companies, which are less protected and have fewer mechanisms in place to prevent money laundering. Some notable hacks linked to North Korea include a $41 million hack on UpBit in 2019, a $275 million theft from KuCoin (most of which was recovered), a $600 million attack on Ronin Bridge in 2022, and a $100 million theft from Atomic Wallet in 2023. In 2020, the United States added North Koreans believed to be part of the Lazarus Group to its Cyber Most Wanted list, but the likelihood of these individuals being arrested remains extremely low unless they leave the country.

關於 VocabSphere

AI驅動英語學習平台

創新平台

VocabSphere 是一個創新的英語學習平台,提供針對不同熟練程度量身定制的適應性文章。我們的AI驅動系統通過引人入勝的真實內容,幫助學習者提高詞彙、閱讀理解和語言技能。

學習優勢

通過閱讀像這樣的文章,學習者可以擴展詞彙量,提高閱讀速度,並增強理解複雜英語文本的信心。每篇文章都經過精心策劃和調整,為各個級別的學生提供最佳的學習體驗。

AI驅動個人化學習即時新聞多級難度

重點詞彙

cryptoEthereumblockchainlaunderingcybersecurityreputationdedicateddispute

優秀句型

"They only take a few hours off each day, which shows how dedicated they are to their work."

原因

This is a sample explanation that demonstrates why this sentence is considered good for English learning...

登入查看

下載手機應用程式

只有 iOS 或 Android 應用程式才能為您提供 VocabSphere 的全面功能,如遺忘曲線詞彙書、練習生成和個人學習進度監控。

立即下載,體驗完整的學習功能!

探索 VocabSphere 的強大功能

提升您的英語學習體驗

個性化閱讀

定制的文章和新聞以匹配學生的英語水平。獲取即時詞語翻譯、同義詞。輕鬆擴充詞彙。

詞彙運用

VocabSphere運用遺忘曲線原理,幫助您高效記憶單詞。全面掌握每個詞語。您的個性化詞彙庫,隨時隨地可用。

生成練習

從您的詞彙庫中創建自定義語法練習。練習不同詞性和句型。教師更可以生成和閱讀理解測驗和練習。

返回消息