{"id":1908,"date":"2025-06-03T17:23:27","date_gmt":"2025-06-03T17:23:27","guid":{"rendered":"https:\/\/bitunikey.com\/news\/zachxbt-links-lifi-volume-surge-to-dprk-laundering-post-bybit-hack\/"},"modified":"2025-06-03T17:23:28","modified_gmt":"2025-06-03T17:23:28","slug":"zachxbt-links-lifi-volume-surge-to-dprk-laundering-post-bybit-hack","status":"publish","type":"post","link":"https:\/\/bitunikey.com\/news\/zachxbt-links-lifi-volume-surge-to-dprk-laundering-post-bybit-hack\/","title":{"rendered":"ZachXBT links LiFi volume surge to DPRK laundering post-Bybit hack"},"content":{"rendered":"<p><\/p>\n<div class=\"post-detail__content blocks\">\n<p class=\"is-style-lead\">A blockchain investigator suggested that crypto laundering by North Korean hackers may account for 15\u201325% of LiFi activity. <\/p>\n<p>LiFi Protocol reported its highest activity figures yet. However, blockchain investigator <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/web.telegram.org\/k\/#@investigations\" target=\"_blank\">ZachXBT suggested<\/a> that much of the cross-chain bridge\u2019s volume was tied to North Korean hackers laundering funds from the Bybit hack.<\/p>\n<p>On Tuesday, June 3, ZachXBT highlighted LiFi Protocol\u2019s record-breaking performance. The protocol\u2019s founder, Arjun Chand, shared May data showing $3 billion in volume and 4.37 million executed transactions. Additionally, he claimed that over 510,000 unique users were served.<\/p>\n<p>    <!-- .cn-block-related-link --><\/p>\n<p>ZachXBT noted that the founder did not address the likely reason behind the significant surge in activity. According to the investigator, the primary driver was money laundering linked to recent North Korean hacks.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cFun fact: Whenever your favorite cross-chain bridge flexes record usage\/volume stats for the month, there\u2019s a high likelihood the activity came from DPRK laundering funds from hacks,\u201d ZachXBT. <\/p>\n<\/blockquote>\n<p>    <!-- .cn-block-related-link --><\/p>\n<h2 class=\"wp-block-heading\">North Korean hackers launder half of Bybit\u2019s money<\/h2>\n<p>The investigator explained that the apparent spike in network volume likely came from laundering related to the Bybit hack. These hackers employ complex operations designed to obscure the source of funds, which substantially increases network activity.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cUsage gets overstated because they repeatedly chain hop back and forth to obfuscate movements,\u201d ZachXBT claimed. He added that \u201cDPRK represented at minimum 15-25% of LiFi activity during the period of time.\u201d<\/p>\n<\/blockquote>\n<p>While blockchain transactions are technically transparent, several laundering tactics can obscure their origin. These include frequent chain-hopping, token swaps, and splitting funds across thousands of wallets\u2014practices that make tracing nearly impossible.<\/p>\n<p>The Bybit hackers appear to have succeeded in their efforts. By the end of May, over half of the $1.4 billion in stolen funds were reportedly untraceable on-chain, indicating they had been successfully laundered.<\/p>\n<p>    <!-- .cn-block-related-link --><\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A blockchain investigator suggested that crypto laundering by North Korean hackers may account for 15\u201325% of LiFi activity. LiFi Protocol reported its highest activity figures yet. However, blockchain investigator ZachXBT&hellip;<\/p>\n","protected":false},"author":1,"featured_media":1909,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1908","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptocurrency"],"_links":{"self":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/1908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/comments?post=1908"}],"version-history":[{"count":1,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/1908\/revisions"}],"predecessor-version":[{"id":1910,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/posts\/1908\/revisions\/1910"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/media\/1909"}],"wp:attachment":[{"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/media?parent=1908"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/categories?post=1908"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bitunikey.com\/news\/wp-json\/wp\/v2\/tags?post=1908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}