Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn how cybercriminals launder cryptocurrency through a detailed analysis of the $1.46 billion Bybit hack by North Korea's Lazarus Group in this DEF CON 33 conference talk. Explore the sophisticated attack vectors used in the February 2025 breach, including the compromise of a third-party wallet tool through malicious JavaScript injection and the social engineering of a SAFE Wallet developer into running a fake Docker container. Discover how attackers hijacked proxy contracts to execute stealth withdrawals of ETH and ERC-20 tokens, then laundered the stolen assets through decentralized exchanges, multiple wallet splits, Bitcoin bridging, and mixers like Wasabi Wallet. Understand the paradox of cryptocurrency's promise of anonymity versus the public nature of blockchain transactions, and examine the challenges this creates for hiding funds. Gain insights into automated tracking techniques and AI-powered investigation methods that can help identify and stop cryptocurrency money laundering operations, making this essential knowledge for cybersecurity professionals working in the digital asset space.