Bybit closes $1.4b gap in Ethereum tokens through loans, whale deposits and ETH purchases, data shows

Bybit closes $1.4b gap in Ethereum tokens through loans, whale deposits and ETH purchases, data shows


Crypto Exchange Bybit, which has lost more than $ 1.4 billion in a suspected attack of North Korean pirates, says that it completely covered the loss within two days.

Cryptocurrency exchange Go through Covered its loss of $ 1.46 billion with a recent pirate attack through a mixture of loans, whale deposits and Ethereum (Ethn) Purchases, Lookonchain’s Blockchain data show.

In A post X On February 24, Lookonchain showed that Bybit had received 157,660 ETH (approximately $ 437.8 million) from an address, probably through free free purchase. 109,033 other ETH ($ 304.1 million) came from an entity that bought ETH to centralized and decentralized exchanges.

Whales and institutions have contributed more than $ 127 million as loans, while Crypto Exchange Bitget provided 40,000 ETH ($ 106 million) and Mexc contributed 12,653 STETH ($ 33.9 million) In loans. Another address, perhaps an over-the-counter buyer, sent 22,609 ETH ($ 61.9 million).

An unknown entity transferred 20,000 ETH ($ 53.7 million), while Mirana Ventures sent 10,000 ETH ($ 28 million), and another address, perhaps linked to Fenbushi Capital, sent the same Rising. Smaller contributions come from users associated with “@yuchao” (2,499 ETH) and DWF Labs (2,200 ETH).

After the post of Lookonchain’s X, the CEO of Bybit, Ben Zhou, went to X to announce that the exchange “entirely closed the Eth space”, adding that the new report on the proof of reserve audited reserve “Will soon be published to show that Bybit is again 100% 1: 1 on customer assets via the Merkle tree. »»

Like crypto.News reported Earlier, the investigator of anonymous blockchain Zachxbt found direct links on the channel between the hacking of Bybit and the recent violation of Phemex. Chain data show that attackers merged funds from the two incidents using the same initial flight addresses, a model similar to the tactics used by North Korea-Pouled de Lazarus sustained to connect several exchange hacks.



Post Comment