**FBI Identifies North Korea as Source of $1.5 Billion ByBit Hack**

In a shocking revelation, the Federal Bureau of Investigation (FBI) has confirmed that the Democratic People's Republic of Korea (DPRK or North Korea) is the source of the massive cryptocurrency hack on Bybit exchange. The hack, which occurred on February 21st, resulted in hackers making off with approximately $1.5 billion worth of crypto.

**A Sophisticated Attack**

According to the FBI, the hackers utilized TraderTraitor (PDF) applications to gain illicit access to Bybit's system, exploiting a vulnerability that allowed them to convert some of the stolen assets into Bitcoin and other virtual assets dispersed across thousands of addresses on multiple blockchains. The agency warned that these assets will be further laundered and eventually converted to fiat currency.

**A Pattern of Cybercrime**

This latest hack is not an isolated incident. North Korea has been linked to several high-profile cyberattacks in recent years, including a 2023 hack that saw it steal around $600 million worth of crypto. The country's elite groups of hackers, such as the Lazarus Group, have allegedly stolen hundreds of millions of dollars across many different financial institutions.

**A History of Intrigue**

Despite having no free public internet in the country, DPRK has become notorious for its elite groups of hackers. In 2014, North Korea was linked to the attack on Sony Pictures over the comedy film "The Interview," which starred Seth Rogen and James Franco as journalists tasked by the CIA to assassinate North Korean Supreme Leader Kim Jong Un.

**A Persistent Threat**

North Korean hackers are considered a significant threat to cybersecurity, requiring both technical and social engineering skills to carry out their attacks. The country's government has been using these techniques to make money and support its projects, highlighting the need for increased vigilance in the face of this sophisticated threat.

**What You Can Do**

The FBI is urging the private sector to block transactions related to the addresses tied to the hack, particularly as North Korean hackers are laundering the proceeds and trying to convert them into legal tender. By taking these precautions, individuals can help mitigate the impact of this cyberattack and prevent future incidents.

Stay On the Cutting Edge: Get the Tom's Hardware Newsletter