According to Onchain Analytics Firm Lockonchain, the Lazaroves moved $ 27 million on February 22 with a wallet called Bybit Exploiter 54.
According to the company’s onchain data, the malicious actors identified by ZackXBT currently have 489,395 ETH and show that they have 15,000 Mantle Restaked ETH (CMETH) in additional $ 53 additional wallets.
Etherscan also shows that hacking groups are actively moving their funds between wallets with more than 83 transactions between wallets for the last eight hours.
According to The Block Explorer, the most recent transaction of the BYBIT Exploiter 54 was sent to the “CE9” at 1:23:47 pm on February 22, and is worth $ 182,831, including about 66 ETH.
The $ 1.4 billion BYBIT HACK, marked as the largest encryption hack in history, shakes Crypto Markets.
Bybit Exploiter 54 The most recent transaction of the wallet. source: Ether scan
relevant: Bybit Excloit exposes security defects in centralized encryption exchange
The recovery of stolen funds begins
Polygon’s chief information security officer, Mudit GUPTA, said that about $ 43 million was already recovered with the help of the mantle, the Seal and Meth team.
Tether CEO Paolo Ardoino added that the Stablecoin publisher frozen 181,000 USDT (USDT) connected to hacking on February 22.
source: Paolo Ardoino
BYBIT also announced up to 10%of the stolen funds to the contributors who helped to recover the stolen funds in the infamous hacking group by announcing up to $ 140 million in bounty programs.
The exchange has gained a wide range of praise of industry management with the opening of a request for withdrawal for customers during communication and crisis after the security incident.
Ben Zhou, CEO of BYBIT Exchange, announced that the withdrawal has returned to normal after handling all pending withdrawal that the platform caused a crowded on the exchange after hacking.
The CEO was also convinced that customers could withdraw the amount from the exchange without time delay or problems in a recent social media post.
magazine: Strange ‘NULL Address’ IVEST Hack, millions of PCs are still vulnerable to ‘sinkclose’ malware: crypto-Secec