North Korea was responsible for the theft of approximately $1.5 billion in virtual assets from cryptocurrency exchange Bybit this month, the US's Federal Bureau of Investigation said on Thursday.
The agency said it refers to this specific North Korean malicious cyber activity as "TraderTraitor", where cyber actors from the Asian nation are targeting organisations in the blockchain technology and cryptocurrency industry.
"TraderTraitor actors are proceeding rapidly and have converted some of the stolen assets to Bitcoin and other virtual assets dispersed across thousands of addresses on multiple blockchains," the FBI said in a public service announcement.
Also read: How $1.5bn Bybit hack has affected sentiment in crypto sector
"It is expected these assets will be further laundered and eventually converted to fiat currency."
Bybit, which has more than 60 million users worldwide, said it was hit by what was the biggest cryptocurrency robbery ever recorded on Friday, in which 401,000 Ethereum worth more than $1.5 billion was stolen.
The crime was carried out through a "manipulation of the transfer process, during a planned routine transfer" on one of its cold wallets, the company said. A cold wallet is cryptocurrency storage that is not connected to the internet, shielding it from the possibility of theft or hacks.
The exchange said it guaranteed after the attack that client funds were safe and available for withdrawal and also processed more than 350,000 withdrawal requests within 12 hours of the hack.
Ben Zhou, who is chief executive and co-founder of the exchange, said in a live-stream that Bybit has secured a bridge loan from its partners, which has enabled it to secure nearly 80 per cent of the stolen Ethereum.
The cryptocurrency industry has increasingly become a target for cyber criminals. About $2.2 billion was stolen from crypto platforms in 2024, latest data from blockchain company Chainalysis shows.
The Bybit attack "was a highly sophisticated hack that targeted cold wallets via a blind signing type of exploit, whereby the attackers create a fake interface that deceives users, since it is a near identical copy of the trusted platform", Manuel Villegas, next generation research analyst at Julius Baer, said in a note on Tuesday.
"The management of the exchange handled it relatively well, facing the market fronton and reassuring clients regarding their assets under custody," he said. "This is a big change from the crisis management we saw back in 2022 after the unfortunate series of events that started with Terra Luna and Three Arrows Capital and ended up with the infamous FTX."
Also, with higher prices and increased activity, crypto users might see a growing number of scams and hacks, where even well-rounded professional traders could be in harm’s way, paving the way for additional investments in cybersecurity, Mr Villegas said.
"The situation, although relatively immaterial for Ethereum prices despite the almost 500,000 capsized tokens, is certainly painful for ByBit’s customers and will likely raise additional regulatory scrutiny."
The FBI on Thursday also urged private sector entities including exchanges, blockchain analytics firms, DeFi services, and other virtual asset service providers to block transactions with or derived from addresses TraderTraitor actors are using to launder the stolen assets.
It said it will continue to protect the virtual asset community "by identifying, mitigating, and disrupting North Korea's illicit cybercrime and virtual asset theft activities".
Jetour T1 specs
Engine: 2-litre turbocharged
Power: 254hp
Torque: 390Nm
Price: From Dh126,000
Available: Now
BMW M5 specs
Engine: 4.4-litre twin-turbo V-8 petrol enging with additional electric motor
Power: 727hp
Torque: 1,000Nm
Transmission: 8-speed auto
Fuel consumption: 10.6L/100km
On sale: Now
Price: From Dh650,000
Red flags
- Promises of high, fixed or 'guaranteed' returns.
- Unregulated structured products or complex investments often used to bypass traditional safeguards.
- Lack of clear information, vague language, no access to audited financials.
- Overseas companies targeting investors in other jurisdictions - this can make legal recovery difficult.
- Hard-selling tactics - creating urgency, offering 'exclusive' deals.
Courtesy: Carol Glynn, founder of Conscious Finance Coaching
The specs: 2018 Mazda CX-5
Price, base / as tested: Dh89,000 / Dh130,000
Engine: 2.5-litre four-cylinder
Power: 188hp @ 6,000rpm
Torque: 251Nm @ 4,000rpm
Transmission: Six-speed automatic
Fuel consumption, combined: 7.1L / 100km
EPL's youngest
- Ethan Nwaneri (Arsenal)
15 years, 181 days old
- Max Dowman (Arsenal)
15 years, 235 days old
- Jeremy Monga (Leicester)
15 years, 271 days old
- Harvey Elliott (Fulham)
16 years, 30 days old
- Matthew Briggs (Fulham)
16 years, 68 days old
Getting%20there%20and%20where%20to%20stay
%3Cp%3EEtihad%20Airways%20operates%20seasonal%20flights%20from%20Abu%20Dhabi%20to%20Nice%20C%C3%B4te%20d'Azur%20Airport.%20Services%20depart%20the%20UAE%20on%20Wednesdays%20and%20Sundays%20with%20outbound%20flights%20stopping%20briefly%20in%20Rome%2C%20return%20flights%20are%20non-stop.%20Fares%20start%20from%20Dh3%2C315%2C%20flights%20operate%20until%20September%2018%2C%202022.%C2%A0%3C%2Fp%3E%0A%3Cp%3EThe%20Radisson%20Blu%20Hotel%20Nice%20offers%20a%20western%20location%20right%20on%20Promenade%20des%20Anglais%20with%20rooms%20overlooking%20the%20Bay%20of%20Angels.%20Stays%20are%20priced%20from%20%E2%82%AC101%20(%24114)%2C%20including%20taxes.%3C%2Fp%3E%0A%3Cp%3E%3C%2Fp%3E%0A
What's%20in%20my%20pazhamkootan%3F
%3Cp%3E%3Cstrong%3EAdd%3A%3C%2Fstrong%3E%3Cbr%3EParippu%20%E2%80%93%20moong%20dal%20and%20coconut%20curry%3Cbr%3ESambar%20%E2%80%93%20vegetable-infused%20toor%20dal%20curry%3Cbr%3EAviyal%20%E2%80%93%20mixed%20vegetables%20in%20thick%20coconut%20paste%3Cbr%3EThoran%20%E2%80%93%20beans%20and%20other%20dry%20veggies%20with%20spiced%20coconut%3Cbr%3EKhichdi%20%E2%80%93%20lentil%20and%20rice%20porridge%3C%2Fp%3E%0A%3Cp%3E%3Cbr%3E%3Cstrong%3EOptional%3A%3C%2Fstrong%3E%3Cbr%3EKootukari%20%E2%80%93%20stew%20of%20black%20chickpeas%2C%20raw%20banana%2C%20yam%20and%20coconut%20paste%3Cbr%3EOlan%20%E2%80%93%20ash%20gourd%20curry%20with%20coconut%20milk%3Cbr%3EPulissery%20%E2%80%93%20spiced%20buttermilk%20curry%3Cbr%3ERasam%20%E2%80%93%20spice-infused%20soup%20with%20a%20tamarind%20base%3C%2Fp%3E%0A%3Cp%3E%3Cbr%3E%3Cstrong%3EAvoid%3A%3C%2Fstrong%3E%3Cbr%3EPayasam%20%E2%80%93%20sweet%20vermicelli%20kheer%3C%2Fp%3E%0A
Why are asylum seekers being housed in hotels?
The number of asylum applications in the UK has reached a new record high, driven by those illegally entering the country in small boats crossing the English Channel.
A total of 111,084 people applied for asylum in the UK in the year to June 2025, the highest number for any 12-month period since current records began in 2001.
Asylum seekers and their families can be housed in temporary accommodation while their claim is assessed.
The Home Office provides the accommodation, meaning asylum seekers cannot choose where they live.
When there is not enough housing, the Home Office can move people to hotels or large sites like former military bases.
What are the main cyber security threats?
Cyber crime - This includes fraud, impersonation, scams and deepfake technology, tactics that are increasingly targeting infrastructure and exploiting human vulnerabilities.
Cyber terrorism - Social media platforms are used to spread radical ideologies, misinformation and disinformation, often with the aim of disrupting critical infrastructure such as power grids.
Cyber warfare - Shaped by geopolitical tension, hostile actors seek to infiltrate and compromise national infrastructure, using one country’s systems as a springboard to launch attacks on others.
War 2
Director: Ayan Mukerji
Stars: Hrithik Roshan, NTR, Kiara Advani, Ashutosh Rana
Rating: 2/5