Blockchain Sleuth Zachxbt closed pseudo-decentralized protocols for the benefit of exploits supported by North Korea.
The treatment of hacks and shady activities of the crypto industry comes under fire, whereby blockchain freight sachxbt calls various pseudo-decentralized protocols for the benefit of North Korea-connected exploits while the responsibility is avoided.
In A Telegram message On Tuesday, March 18, the Crypto researcher called the nearly $ 1.5 billion Bybit Hack ‘Eye opening’, warning that industry’s security problems may not improve without government regulations that ‘harm our entire industry’.
Various “decentralized” protocols have almost all their monthly volume and reimbursements generated from transactions coupled to North Korea per Zachxbt. Nevertheless, the researcher notes that they ‘refuse to take responsibility’.
Zachxbt’s comments seem to point to the mixing of service exchange and multi-currency protocol Thorchain, among other things, who benefited after North Korean bad actors had led stolen bybit funds by them in an attempt to wash. As crypto.news previously reported, less than two weeks after the robbery, BYBIT Ben Zhou stated that more than $ 200 million of the $ 1.46 billion of the stock market had not become traceable, partly due to mixed services that refuse to Halt North Korean hackers.
KYC as a honeypot
Zachxbt also pointed to centralized exchanges and stated that some take “several hours” to respond to illegal funds moving through their platforms, although money laundering “only takes minutes.” It is unclear which exchanges the researcher refers to.
He criticized existing security measures and argued that your transaction systems are “completely defective and easy to avoid”, while knows that your customer rules usually serve as a “honeypot for regular users” due to frequent infringements and insider leaks.
At the end of February, Noord -Korean Hackers Bybit, one of the largest cryptocurrency exchanges, aimed, which steal around $ 1.46 billion in crypto in a very refined robbery. The attack was reportedly carried out by the computer of an employee at Safe, the technology provider of Bybit, compromising.