On June 2, 2025, a brief post by blockchain researcher ZachXBT on Telegram caused a stir in the Crypto Assets industry: multiple hot wallets on the Taiwanese Crypto Assets exchange BitoPro experienced suspicious outflows of funds, totaling as much as 11.5 million USD.
At this point, nearly 3 weeks have passed since the actual attack occurred, and the exchange has only suspended services citing “system maintenance”, without mentioning a word about the Hacker attack.
The attack occurred between May 8 and 9, 2025. At that time, the Hacker took advantage of the window period for wallet system upgrades and asset migrations at the exchange to launch a raid on its old hot wallet.
Multiple public chains have been affected: Tron, Ethereum, Solana and Polygon The hot wallet assets on the exchange were gradually transferred out. After the Hacker succeeded, they acted quickly, liquidating the funds at market price through decentralized exchanges (DEX) and transferring them to the Tornado Cash mixer, or through Thorchain Deposit to the Bitcoin network via cross-chain into the Wasabi wallet, attempting to cut off the tracking path of the funds.
Despite users reporting withdrawal issues, BitoPro’s official statement confirming the attack came on June 2, after ZachXBT publicly exposed it, claiming that “user assets are intact, and the platform has sufficient reserves.”
The handling method, which was hidden for three weeks, has sparked strong doubts within the community about its transparency and crisis management capabilities.
On June 19, BitoPro released a report from a third-party security company confirming that the attacker was the notorious North Korean Hacker organization Lazarus Group.
The attack path clearly demonstrates its highly specialized modus operandi:
This method is highly consistent with Lazarus’s past attacks on the global banking SWIFT system and several exchanges, highlighting the maturity of its attack template.
The Lazarus Group is not a first-time offender. The organization is widely regarded as a network crime group supported by the North Korean regime, which has long aimed at stealing Crypto Assets to fund its weapons programs.
His criminal record is shocking:
Security experts point out that the organization excels at combining technical vulnerabilities with human weaknesses, and the BitoPro incident once again confirms this.
After the incident was exposed, BitoPro took a series of crisis response measures:
To regain trust, BitoPro proactively submitted a new hot wallet address to the on-chain data analysis platform Arkham on May 19, updating liquidity data for public oversight.
The company’s founder, Zheng Guangtai, emphasized that “customer assets will not be lost; any losses will be borne by the platform,” and pledged to enhance wallet management processes and monitoring levels. The Financial Supervisory Commission of Taiwan has also intervened, requiring the company to strengthen cybersecurity and submit an incident explanation.
The BitoPro incident, although the amount lost is far less than ByBit’s $1.5 billion massive theft case, reveals vulnerabilities in the industry that are universal:
“The weakest link in any security system is always the human factor,” a conclusion that has been repeatedly validated in security reports.
The attack by the Lazarus Group is a systemic threat that the global Crypto Assets ecosystem continues to face. From the Central Bank of Bangladesh, ByBit to BitoPro, their attack methods are constantly evolving, yet the core remains unchanged: exploiting human weaknesses to breach technical barriers.
BitoPro incurred a loss of 11.5 million USD and upgraded its system, but the bigger challenge is: how the exchange can establish an internal control culture that is “anti-social engineering” and achieve a rapid and transparent response when faced with an intrusion.
In the world of blockchain, trust is the underlying currency, and each hacking incident tests whether its true reserves are sufficient.