Chain analysis platform EmberCN began tracking the funds shortly after they were stolen: on February 25, the company discovered that hackers had laundered more than 89,000 ETH worth about $224 million in about 60 hours.
A day later, the attackers laundered another 40000 5900
#ETH (worth about 113 million USD), bringing the total amount laundered to 135,000 ETH. They repeated the process on February 27, exchanging 71,000 ETH with a market value of $170 million.
By this point, about four and a half days after the attack, the attackers had successfully converted 260000 ETH into other crypto assets, averaging about 45,000 ETH per day. However, they still had another 292,000 coins worth $685 million left, and worked tirelessly day and night to clear them. According to
EmberCN, by February 28, the scammers had laundered another 59,800 ETH in loot to 266,000 ETH, leaving 233,000 ETH. Interestingly, on Saturday, March 1, the attackers paused the liquidation of the stolen funds and liquidated only a relatively modest 14,300 ETH worth $32.2 million.
The next day they resumed operations, converting 62,200 ETH, and by the morning of March 4, EmberCN reported that the attackers had laundered all remaining funds. Ben Zhou, CEO of
Bybit, has a slightly different opinion than the analytics company He stated that the company engaged in laundering.
In a post on X's website on Tuesday, he spoke about the attack and said that about 83% of the stolen funds worth about US$1 billion were converted into bitcoin (BTC) and distributed among about 7,000 wallets.
Of the total amount lost in the attack, 20% could not be traced and 3% were frozen. . Zhou also stated that most of the untraceable funds, approximately 79,655 ETH, were laundered through the eXch exchange.
the attacker, whom the FBI links to North Korea's Lazarus Group, processed another 40,233 ETH through the
#OKX #web3 wallet. The attacker processed 40,233 ETH through the OKX web3 wallet.
Read us at:
Compass Investments #TrendingTopic #news