- The Lazarus group bleached $ 1.08 million in bybit’s hacking via Solana, linked to the same scams.
- Zachxbt retraces piracy funds of $ 1.4 billion in Solana, connecting the Lazare group to the scams.
- The involvement of the Lazarus group in the hacking of Bybit also extends to a violation and scams of $ 29 million.
The Lazare group linked to Bybit Hack and Solana Memecoin Scams, reveals the investigation. On February 23, 2025, the Zachxbt channel investigator published results connecting the Lazare group in North Korea to the 1.4 billion dollars massive Hack On February 21, 2025. The report also linked the group to the recent same scams on the Pump.fun platform of Solana. Zachxbt’s analysis highlights a complex laundering operation involving stolen funds for the exploit of statements.
The survey shows that on February 22, 2025, the striker received $ 1.08 million in bybit. This amount has increased to a portfolio address, 0x363908DF2B0890E7E5C1E403935133094287D1, which weighted the funds as a USDC in Solana.
After having divided between many wallets, several of the addresses had already been associated with same scams. By his analysis, Zachxbt Identified more than 920 cryptocurrency addresses involved in hacking, the Lazarus group identifying the involvement with Pump.

The laundry bybit haggstorms via the solana memecoin platforms
Zachxbt’s analysis shows that the Lazarus group used the relay funds stolen through multiple laundering transactions. The USDC of $ 1.08 million has punctuated Solana to Binance Smart Chain (BSC) divided on more than 30 addresses via a programmed mechanism. The address 0x0beb8b5f899a15ed5e6be5c597f88b2c7d5b3a collected funds before returning assets to Solana. The funds were distributed by a few portfolios which sent $ 106,000 USDC to ten Solana addresses which belonged to crooks of money.
The investigator noted that the Lazarus group had launched pieces even through Pump Only 3 p.m. before public disclosure. The activities observed show that cybercriminals have used the platform to cover the source of their stolen money. The funds exchanged were moved to different exchanges, which complicated monitoring and detection efforts. Zachxbt has kept unhappy to avoid interference, however, Zachxbt validated the release of portfolios from analysis tools.
Wider cryptographic attack models of the Lazare group
Zachxbt’s conclusions extend beyond the piracy of Bybit. The same Lazare Group portfolios linked to this feat also connect to Phemex piracy of $ 29 million in January 2025. This model indicates a coherent strategy for targeting cryptocurrency and funding platforms through blocks like Solana and BSC.
The report underlines the role of the group in the recent Samperies memecoinIncluding the carpet pulls on the pump.fun. These scams have damaged investors’ confidence in Solana, with high -level cases like the balanced token carpet, where initiates would have drained more than $ 107 million. Such incidents contributed to a drop in Solana user activity, with active addresses falling to 9.5 million in February 2025, against 15.6 million in November 2024.
The survey highlights the challenges that blockchain networks are faced in the fight against sophisticated cyber-men. The actions of the Lazare group reveal an increasing trend to exploit decentralized platforms for money laundering, an impact on the safety and stability of the wider crypto industry.