Hackers laundered 62,200 ETH on March 2, leaving 156,000 ETH unprocessed.
The FBI identified 51 Ethereum addresses linked to the hackers.
Bybit hackers have resumed laundering stolen funds. On March 2, they moved another 62,200 ETH, worth $138 million. This marks a significant increase in laundering activity. Of the 499,000 ETH stolen on February 21, only 156,000 ETH remains unprocessed. Analysts predict the remaining funds will be cleared within three days.
North Korea’s Lazarus Group is suspected to be behind the laundering. Additionally, the FBI has identified 51 Ethereum addresses linked to the hackers. Furthermore, blockchain analytics firm Elliptic has already flagged over 11,000 wallet addresses possibly connected. Despite efforts from U.S. authorities to block transactions, laundering continues at a fast pace.
The hackers have used decentralized exchanges, cross-chain bridges, and swap services. Chainalysis reports that portions of the stolen Ethereum have been converted into Bitcoin, Dai, and other assets. THORChain, a cross-chain protocol, has faced criticism for facilitating some of these transfers. One of its developers, Pluto, resigned after a vote to block hacker-linked transactions was overturned.