{"id":30350,"date":"2025-02-23T00:00:00","date_gmt":"2025-02-23T03:00:00","guid":{"rendered":"https:\/\/informatepy.com\/2024\/?p=30350"},"modified":"2025-02-22T15:04:47","modified_gmt":"2025-02-22T18:04:47","slug":"hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit","status":"publish","type":"post","link":"https:\/\/informatepy.com\/2024\/2025\/02\/23\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\/","title":{"rendered":"Hackers de Corea del Norte robaron US$ 1.400 millones en Bybit"},"content":{"rendered":"\n<p>El exchange de\u00a0criptomonedas\u00a0<strong>Bybit\u00a0fue v\u00edctima de un ataque inform\u00e1tico que le cost\u00f3 m\u00e1s de US$ 1.400 millones<\/strong>, lo que lo convirti\u00f3\u00a0<strong>en el mayor ataque inform\u00e1tico en los 15 a\u00f1os de historia de la industria criptogr\u00e1fica<\/strong>. En t\u00e9rminos de valor, el ataque individual represent\u00f3\u00a0<strong>m\u00e1s del 60% de todos los fondos cripto que fueron robados en 2024<\/strong>, seg\u00fan los datos de\u00a0<strong>Cyvers<\/strong>.<\/p>\n\n\n\n<p>Bybit es un intercambio de criptomonedas, fundado por&nbsp;<strong>Ben Zhou<\/strong>&nbsp;en marzo de 2018 en Dub\u00e1i, Emiratos \u00c1rabes Unidos. En octubre de 2021, el n\u00famero total de usuarios registrados en todo el mundo ya hab\u00eda superado los 10 millones. En julio de 2021, Bybit se asoci\u00f3 con el proveedor de verificaci\u00f3n de identidad&nbsp;<strong>Sumsub<\/strong>&nbsp;para ampliar sus capacidades de verificaci\u00f3n de identidad.<\/p>\n\n\n\n<p><strong>Arkham Intelligence<\/strong>\u00a0ha anunciado que el sabueso de la seguridad onchain\u00a0<strong>ZachXBT<\/strong>\u00a0ha identificado al\u00a0<strong>Lazarus Group<\/strong>, un grupo de hackers de\u00a0<strong>Corea del Norte<\/strong>, como responsable del ataque a Bybit, por valor de US$ 1.460 millones. Arkham ha puesto en marcha una recompensa para identificar a la persona u organizaci\u00f3n responsable del ataque de 50.000 ARKM (ARKM), por un valor aproximado de US$ 31.500.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Lazarus Group<\/h3>\n\n\n\n<p>Lazarus ha realizado m\u00faltiples operaciones a lo largo de los a\u00f1os: interrupci\u00f3n, sabotaje, robo financiero y espionaje. La organizaci\u00f3n cuenta con grupos&nbsp;<em>&#8216;spin-off&#8217;,<\/em>&nbsp;que se especializan en tipos espec\u00edficos de ataques y objetivos:<\/p>\n\n\n\n<p>Por ejemplo,&nbsp;<strong>Azulnoroff<\/strong>, especializado en vulnerar instituciones financieras extranjeras. Por ejemplo el famoso ataque al<strong>&nbsp;banco de Bangladesh.<\/strong><\/p>\n\n\n\n<p>Otro:<strong>&nbsp;Andariel<\/strong>, enfocado en atacar organizaciones y empresas de<strong>&nbsp;Corea del Sur.<\/strong>&nbsp;<\/p>\n\n\n\n<p>Si bien, tal como lo muestran los datos de&nbsp;<strong>Chainalysis<\/strong>, los casos de uso leg\u00edtimo de las criptomonedas han estado creciendo mucho m\u00e1s r\u00e1pido que la actividad il\u00edcita, los ataques inform\u00e1ticos y las estafas son frecuentes en el Mundo Cripto.&nbsp;<\/p>\n\n\n\n<p>Lazarus tambi\u00e9n incluy\u00f3 la desorientaci\u00f3n en algunas de sus campa\u00f1as. Algunas operaciones fueron<strong>&nbsp;disfrazadas de actividades hacktivistas<\/strong>, y grupos como&nbsp;<strong>GOP, WhoAmI y New Romanic Army<\/strong>&nbsp;se atribuyeron la responsabilidad de estos supuestos ataques de hacktivismo. Tambi\u00e9n intentaron emular el<em>&nbsp;modus operandi&nbsp;<\/em>de los hacktivistas desfigurando p\u00e1ginas web y filtrando informaci\u00f3n.&nbsp;<\/p>\n\n\n\n<p><strong>Lazarus tambi\u00e9n planta banderas falsas dentro de sus herramientas<\/strong>&nbsp;como otra t\u00e9cnica de distracci\u00f3n. Un ejemplo es la puerta trasera KLIPOD, que utiliza palabras rusas romanizadas para sus comandos de puerta trasera. Si bien es posible que Lazarus tenga miembros de diferentes pa\u00edses, las palabras rusas romanizadas no parecen haber sido escritas por un hablante nativo, y posiblemente se hayan utilizado para confundir a la gente.&nbsp;<\/p>\n\n\n\n<p>Si bien los objetivos de estos ataques var\u00edan desde el sabotaje hasta la obtenci\u00f3n de ganancias financieras, Lazarus puso cierto esfuerzo en desviar los intentos de atribuci\u00f3n hacia otras entidades.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">El ataque<\/h3>\n\n\n\n<p>El hack del exchange Bybit provoc\u00f3 una p\u00e9rdida de US$ 1.460 millones en<strong>&nbsp;Ether (ETH) y otros tokens ERC-20 en stake.<\/strong><\/p>\n\n\n\n<p>ZachXBT detect\u00f3 el incidente poco despu\u00e9s de que se produjera e hizo su presentaci\u00f3n a Arkham,&nbsp;<em>\u00abidentificando a la organizaci\u00f3n detr\u00e1s del ataque utilizando datos on-chain\u00bb.<\/em><\/p>\n\n\n\n<p>Seg\u00fan&nbsp;<strong>Blockaid<\/strong>, una plataforma de seguridad onchain, los US$ 1.460 millones robados representan el mayor hackeo de exchanges de criptomonedas de la historia. Dado el tama\u00f1o y el alcance del incidente, no fue una sorpresa que la noticia viajara r\u00e1pidamente a trav\u00e9s de la comunidad cripto, suscitando reacciones que van desde el apoyo de otras entidades cripto y llamadas para detener el FUD &#8211; miedo, incertidumbre y duda &#8211; hasta consejos de seguridad para los usuarios y humor negro.<\/p>\n\n\n\n<p>En respuesta al hackeo, varias criptoentidades y personas expresaron su apoyo a Bybit.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>El fundador de la blockchain<strong>\u00a0Tron, Justin Sun<\/strong>, dijo en un post en X que la red estaba ayudando a rastrear los fondos.<\/li>\n\n\n\n<li>El exchange de criptomonedas\u00a0<strong>OKX<\/strong>\u00a0tambi\u00e9n despleg\u00f3 su equipo de seguridad para apoyar la investigaci\u00f3n de Bybit, seg\u00fan su director de marketing,\u00a0<strong>Haider Rafique<\/strong>.<\/li>\n\n\n\n<li>La cuenta de X del exchange de criptomonedas\u00a0<strong>KuCoin<\/strong>\u00a0comparti\u00f3 un mensaje sobre el hackeo, diciendo que estaba en\u00a0<em>\u00abpleno apoyo de Bybit, su equipo y su CEO Ben Zhou mientras trabajan a trav\u00e9s de este desaf\u00edo\u00bb.<\/em><\/li>\n\n\n\n<li>KuCoin se\u00f1al\u00f3 que el cripto \u00abe<em>s una responsabilidad compartida\u00bb<\/em>\u00a0y que\u00a0<em>\u00abcreemos firmemente que la colaboraci\u00f3n entre los exchanges es esencial para combatir el cibercrimen y fortalecer la seguridad de toda la industria\u00bb.<\/em><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Consejos<\/h3>\n\n\n\n<p><strong>Conor Grogan<\/strong>, ejecutivo de\u00a0<strong>Coinbase<\/strong>, escribi\u00f3 en\u00a0<strong>X<\/strong>:\u00a0<em><strong>\u00abBybit parece estar procesando retiros sin problemas despu\u00e9s de su hackeo. Tienen m\u00e1s de USD 20.000 millones en activos en la plataforma y sus billeteras fr\u00edas est\u00e1n intactos. Dada la naturaleza aislada del hackeo de la firma y lo bien capitalizada que est\u00e1 Bybit, no espero que haya contagio\u00bb.<\/strong><\/em><\/p>\n\n\n\n<p>Y continu\u00f3:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote has-text-align-center is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em><strong>\u00abUn minuto despu\u00e9s de la bancarrota de FTX estaba claro que no ten\u00edan fondos para retirar. S\u00e9 que todo el mundo tiene trastorno de estr\u00e9s postraum\u00e1tico, pero Bybit no es una situaci\u00f3n como la de FTX, si lo fuera estar\u00eda grit\u00e1ndolo. Estar\u00e1n bien\u00bb.<\/strong><\/em><\/p>\n<\/blockquote>\n\n\n\n<p>Algunos miembros de la comunidad de criptomonedas publicaron consejos de seguridad para los usuarios.<strong>&nbsp;\u201cQuit\u201d<\/strong>, vicepresidente de blockchain en<strong>&nbsp;Yuga Labs<\/strong>, comparti\u00f3 en X diferentes medidas de seguridad que los usuarios podr\u00edan tomar para mantener sus fondos seguros, incluido el uso de firmas m\u00faltiples, el uso de billeteras de hardware como firmantes y la ejecuci\u00f3n de simulaciones de transacciones.<\/p>\n\n\n\n<p><strong>KuCoin<\/strong>&nbsp;tambi\u00e9n enfatiz\u00f3 ciertas medidas de seguridad para sus usuarios, incluyendo habilitar la autenticaci\u00f3n de dos factores, establecer contrase\u00f1as fuertes y \u00fanicas y usar claves de acceso.<\/p>\n\n\n\n<p><sub>U24<\/sub><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El exchange de\u00a0criptomonedas\u00a0Bybit\u00a0fue v\u00edctima de un ataque inform\u00e1tico que le cost\u00f3 m\u00e1s de US$ 1.400 millones, lo que lo convirti\u00f3\u00a0en el mayor ataque inform\u00e1tico en los 15 a\u00f1os de historia de la industria criptogr\u00e1fica. En t\u00e9rminos de valor, el ataque individual represent\u00f3\u00a0m\u00e1s del 60% de todos los fondos cripto que fueron robados en 2024, seg\u00fan [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":30351,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"jnews-multi-image_gallery":[],"jnews_single_post":{"subtitle":"","format":"standard","video":"","gallery":"","source_name":"","source_url":"","via_name":"","via_url":"","override_template":"0","override":[{"template":"2","single_blog_custom":"","parallax":"1","fullscreen":"1","layout":"right-sidebar","sidebar":"default-sidebar","second_sidebar":"default-sidebar","sticky_sidebar":"1","share_position":"top","share_float_style":"share-monocrhome","show_share_counter":"0","show_view_counter":"0","show_featured":"1","show_post_meta":"1","show_post_author":"1","show_post_author_image":"0","show_post_date":"1","post_date_format":"default","post_date_format_custom":"Y\/m\/d","show_post_category":"1","show_post_reading_time":"0","post_reading_time_wpm":"300","show_zoom_button":"0","zoom_button_out_step":"2","zoom_button_in_step":"3","show_post_tag":"1","show_prev_next_post":"0","show_popup_post":"1","number_popup_post":"1","show_author_box":"1","show_post_related":"0","show_inline_post_related":"0"}],"override_image_size":"0","image_override":[{"single_post_thumbnail_size":"crop-500","single_post_gallery_size":"crop-500"}],"trending_post":"0","trending_post_position":"meta","trending_post_label":"Trending","sponsored_post":"0","sponsored_post_label":"Sponsored by","sponsored_post_name":"","sponsored_post_url":"","sponsored_post_logo_enable":"0","sponsored_post_logo":"","sponsored_post_desc":"","disable_ad":"0"},"jnews_primary_category":{"id":"","hide":""},"jnews_override_bookmark_settings":[],"jnews_food_recipe":[],"enable_food_recipe":"","food_recipe_title":"","food_recipe_description":"","food_recipe_serve":"","food_recipe_time":"","food_recipe_prep":"","food_recipe_level":"","food_recipe_keywords":"","food_recipe_category":"","food_recipe_cuisine":"","food_recipe_yield":"","food_recipe_calories":"","enable_print_recipe":"","ingredient":[],"instruction":"","jnews_social_meta":{"fb_title":"","fb_description":"","fb_image":"","twitter_title":"","twitter_description":"","twitter_image":""},"jnews_paywall_metabox":[],"jnews_review":[],"enable_review":"","type":"","name":"","summary":"","brand":"","sku":"","good":[],"bad":[],"score_override":"","override_value":"","rating":[],"price":[],"jnews_override_counter":{"override_view_counter":"0","view_counter_number":"0","override_share_counter":"0","share_counter_number":"0","override_like_counter":"0","like_counter_number":"0","override_dislike_counter":"0","dislike_counter_number":"0"},"jnews_post_split":{"enable_post_split":"0","post_split":[{"template":"1","tag":"h2","numbering":"asc","mode":"normal","first":"0","enable_toc":"0","toc_type":"normal"}]},"jnews_podcast_option":[],"jnews_podcast_series":[],"footnotes":""},"categories":[37],"tags":[1044,1948,966,831,713],"jnews-series":[],"ppma_author":[830],"class_list":["post-30350","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciencia-y-tecnologia","tag-corea-del-norte","tag-criptomineria","tag-criptomonedas","tag-destacada","tag-hackers"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers de Corea del Norte robaron US$ 1.400 millones en Bybit - Informate Py Creemos en la libertad de expresi\u00f3n y en la capacidad de la gente de reflexionar\u00a0por\u00a0si\u00a0misma<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/informatepy.com\/2024\/2025\/02\/23\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers de Corea del Norte robaron US$ 1.400 millones en Bybit - Informate Py Creemos en la libertad de expresi\u00f3n y en la capacidad de la gente de reflexionar\u00a0por\u00a0si\u00a0misma\" \/>\n<meta property=\"og:description\" content=\"El exchange de\u00a0criptomonedas\u00a0Bybit\u00a0fue v\u00edctima de un ataque inform\u00e1tico que le cost\u00f3 m\u00e1s de US$ 1.400 millones, lo que lo convirti\u00f3\u00a0en el mayor ataque inform\u00e1tico en los 15 a\u00f1os de historia de la industria criptogr\u00e1fica. En t\u00e9rminos de valor, el ataque individual represent\u00f3\u00a0m\u00e1s del 60% de todos los fondos cripto que fueron robados en 2024, seg\u00fan [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/informatepy.com\/2024\/2025\/02\/23\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\/\" \/>\n<meta property=\"og:site_name\" content=\"Informate Py Creemos en la libertad de expresi\u00f3n y en la capacidad de la gente de reflexionar\u00a0por\u00a0si\u00a0misma\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/InformatePyCom\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-23T03:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/informatepy.com\/2024\/wp-content\/uploads\/2025\/02\/crypto-corea-del-norte.jpg?fit=1200%2C675&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Redacci\u00f3n\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/InformatePy1\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Redacci\u00f3n\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/2025\\\/02\\\/23\\\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/2025\\\/02\\\/23\\\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\\\/\"},\"author\":{\"name\":\"Redacci\u00f3n\",\"@id\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/#\\\/schema\\\/person\\\/98728344b91c548ef8544c80daf58463\"},\"headline\":\"Hackers de Corea del Norte robaron US$ 1.400 millones en Bybit\",\"datePublished\":\"2025-02-23T03:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/2025\\\/02\\\/23\\\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\\\/\"},\"wordCount\":986,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/2025\\\/02\\\/23\\\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/informatepy.com\\\/2024\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/crypto-corea-del-norte.jpg?fit=1200%2C675&ssl=1\",\"keywords\":[\"corea del norte\",\"criptomineria\",\"criptomonedas\",\"destacada\",\"hackers\"],\"articleSection\":[\"Ciencia y Tecnolog\u00eda\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/informatepy.com\\\/2024\\\/2025\\\/02\\\/23\\\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/2025\\\/02\\\/23\\\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\\\/\",\"url\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/2025\\\/02\\\/23\\\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\\\/\",\"name\":\"Hackers de Corea del Norte robaron US$ 1.400 millones en Bybit - Informate Py Creemos en la libertad de expresi\u00f3n y en la capacidad de la gente de reflexionar\u00a0por\u00a0si\u00a0misma\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/2025\\\/02\\\/23\\\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/2025\\\/02\\\/23\\\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/informatepy.com\\\/2024\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/crypto-corea-del-norte.jpg?fit=1200%2C675&ssl=1\",\"datePublished\":\"2025-02-23T03:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/2025\\\/02\\\/23\\\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/informatepy.com\\\/2024\\\/2025\\\/02\\\/23\\\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/2025\\\/02\\\/23\\\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/informatepy.com\\\/2024\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/crypto-corea-del-norte.jpg?fit=1200%2C675&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/informatepy.com\\\/2024\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/crypto-corea-del-norte.jpg?fit=1200%2C675&ssl=1\",\"width\":1200,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/2025\\\/02\\\/23\\\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers de Corea del Norte robaron US$ 1.400 millones en Bybit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/#website\",\"url\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/\",\"name\":\"Informate Py Creemos en la libertad de expresi\u00f3n y en la capacidad de la gente de reflexionar\u00a0por\u00a0si\u00a0misma\",\"description\":\"InformatePy\",\"publisher\":{\"@id\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/#organization\",\"name\":\"Informate Py Creemos en la libertad de expresi\u00f3n y en la capacidad de la gente de reflexionar\u00a0por\u00a0si\u00a0misma\",\"url\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/informatepy.com\\\/2024\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Logotipo-sin-fondo-informate-py500.png?fit=500%2C94&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/informatepy.com\\\/2024\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Logotipo-sin-fondo-informate-py500.png?fit=500%2C94&ssl=1\",\"width\":500,\"height\":94,\"caption\":\"Informate Py Creemos en la libertad de expresi\u00f3n y en la capacidad de la gente de reflexionar\u00a0por\u00a0si\u00a0misma\"},\"image\":{\"@id\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/#\\\/schema\\\/person\\\/98728344b91c548ef8544c80daf58463\",\"name\":\"Redacci\u00f3n\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/cropped-Isologo-sin-fondo.png9c354f01c536b2d49dbb929e96603401\",\"url\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/cropped-Isologo-sin-fondo.png\",\"contentUrl\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/cropped-Isologo-sin-fondo.png\",\"caption\":\"Redacci\u00f3n\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/InformatePyCom\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/InformatePy1\"],\"url\":\"https:\\\/\\\/informatepy.com\\\/2024\\\/author\\\/redaccion\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers de Corea del Norte robaron US$ 1.400 millones en Bybit - Informate Py Creemos en la libertad de expresi\u00f3n y en la capacidad de la gente de reflexionar\u00a0por\u00a0si\u00a0misma","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/informatepy.com\/2024\/2025\/02\/23\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\/","og_locale":"es_ES","og_type":"article","og_title":"Hackers de Corea del Norte robaron US$ 1.400 millones en Bybit - Informate Py Creemos en la libertad de expresi\u00f3n y en la capacidad de la gente de reflexionar\u00a0por\u00a0si\u00a0misma","og_description":"El exchange de\u00a0criptomonedas\u00a0Bybit\u00a0fue v\u00edctima de un ataque inform\u00e1tico que le cost\u00f3 m\u00e1s de US$ 1.400 millones, lo que lo convirti\u00f3\u00a0en el mayor ataque inform\u00e1tico en los 15 a\u00f1os de historia de la industria criptogr\u00e1fica. En t\u00e9rminos de valor, el ataque individual represent\u00f3\u00a0m\u00e1s del 60% de todos los fondos cripto que fueron robados en 2024, seg\u00fan [&hellip;]","og_url":"https:\/\/informatepy.com\/2024\/2025\/02\/23\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\/","og_site_name":"Informate Py Creemos en la libertad de expresi\u00f3n y en la capacidad de la gente de reflexionar\u00a0por\u00a0si\u00a0misma","article_author":"https:\/\/www.facebook.com\/InformatePyCom","article_published_time":"2025-02-23T03:00:00+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/i0.wp.com\/informatepy.com\/2024\/wp-content\/uploads\/2025\/02\/crypto-corea-del-norte.jpg?fit=1200%2C675&ssl=1","type":"image\/jpeg"}],"author":"Redacci\u00f3n","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/InformatePy1","twitter_misc":{"Escrito por":"Redacci\u00f3n","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/informatepy.com\/2024\/2025\/02\/23\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\/#article","isPartOf":{"@id":"https:\/\/informatepy.com\/2024\/2025\/02\/23\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\/"},"author":{"name":"Redacci\u00f3n","@id":"https:\/\/informatepy.com\/2024\/#\/schema\/person\/98728344b91c548ef8544c80daf58463"},"headline":"Hackers de Corea del Norte robaron US$ 1.400 millones en Bybit","datePublished":"2025-02-23T03:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/informatepy.com\/2024\/2025\/02\/23\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\/"},"wordCount":986,"commentCount":0,"publisher":{"@id":"https:\/\/informatepy.com\/2024\/#organization"},"image":{"@id":"https:\/\/informatepy.com\/2024\/2025\/02\/23\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/informatepy.com\/2024\/wp-content\/uploads\/2025\/02\/crypto-corea-del-norte.jpg?fit=1200%2C675&ssl=1","keywords":["corea del norte","criptomineria","criptomonedas","destacada","hackers"],"articleSection":["Ciencia y Tecnolog\u00eda"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/informatepy.com\/2024\/2025\/02\/23\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/informatepy.com\/2024\/2025\/02\/23\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\/","url":"https:\/\/informatepy.com\/2024\/2025\/02\/23\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\/","name":"Hackers de Corea del Norte robaron US$ 1.400 millones en Bybit - Informate Py Creemos en la libertad de expresi\u00f3n y en la capacidad de la gente de reflexionar\u00a0por\u00a0si\u00a0misma","isPartOf":{"@id":"https:\/\/informatepy.com\/2024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/informatepy.com\/2024\/2025\/02\/23\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\/#primaryimage"},"image":{"@id":"https:\/\/informatepy.com\/2024\/2025\/02\/23\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/informatepy.com\/2024\/wp-content\/uploads\/2025\/02\/crypto-corea-del-norte.jpg?fit=1200%2C675&ssl=1","datePublished":"2025-02-23T03:00:00+00:00","breadcrumb":{"@id":"https:\/\/informatepy.com\/2024\/2025\/02\/23\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/informatepy.com\/2024\/2025\/02\/23\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/informatepy.com\/2024\/2025\/02\/23\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\/#primaryimage","url":"https:\/\/i0.wp.com\/informatepy.com\/2024\/wp-content\/uploads\/2025\/02\/crypto-corea-del-norte.jpg?fit=1200%2C675&ssl=1","contentUrl":"https:\/\/i0.wp.com\/informatepy.com\/2024\/wp-content\/uploads\/2025\/02\/crypto-corea-del-norte.jpg?fit=1200%2C675&ssl=1","width":1200,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/informatepy.com\/2024\/2025\/02\/23\/hackers-de-corea-del-norte-robaron-us-1-400-millones-en-bybit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/informatepy.com\/2024\/"},{"@type":"ListItem","position":2,"name":"Hackers de Corea del Norte robaron US$ 1.400 millones en Bybit"}]},{"@type":"WebSite","@id":"https:\/\/informatepy.com\/2024\/#website","url":"https:\/\/informatepy.com\/2024\/","name":"Informate Py Creemos en la libertad de expresi\u00f3n y en la capacidad de la gente de reflexionar\u00a0por\u00a0si\u00a0misma","description":"InformatePy","publisher":{"@id":"https:\/\/informatepy.com\/2024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/informatepy.com\/2024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/informatepy.com\/2024\/#organization","name":"Informate Py Creemos en la libertad de expresi\u00f3n y en la capacidad de la gente de reflexionar\u00a0por\u00a0si\u00a0misma","url":"https:\/\/informatepy.com\/2024\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/informatepy.com\/2024\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/informatepy.com\/2024\/wp-content\/uploads\/2024\/02\/Logotipo-sin-fondo-informate-py500.png?fit=500%2C94&ssl=1","contentUrl":"https:\/\/i0.wp.com\/informatepy.com\/2024\/wp-content\/uploads\/2024\/02\/Logotipo-sin-fondo-informate-py500.png?fit=500%2C94&ssl=1","width":500,"height":94,"caption":"Informate Py Creemos en la libertad de expresi\u00f3n y en la capacidad de la gente de reflexionar\u00a0por\u00a0si\u00a0misma"},"image":{"@id":"https:\/\/informatepy.com\/2024\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/informatepy.com\/2024\/#\/schema\/person\/98728344b91c548ef8544c80daf58463","name":"Redacci\u00f3n","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/informatepy.com\/2024\/wp-content\/uploads\/2024\/02\/cropped-Isologo-sin-fondo.png9c354f01c536b2d49dbb929e96603401","url":"https:\/\/informatepy.com\/2024\/wp-content\/uploads\/2024\/02\/cropped-Isologo-sin-fondo.png","contentUrl":"https:\/\/informatepy.com\/2024\/wp-content\/uploads\/2024\/02\/cropped-Isologo-sin-fondo.png","caption":"Redacci\u00f3n"},"sameAs":["https:\/\/www.facebook.com\/InformatePyCom","https:\/\/x.com\/https:\/\/twitter.com\/InformatePy1"],"url":"https:\/\/informatepy.com\/2024\/author\/redaccion\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/informatepy.com\/2024\/wp-content\/uploads\/2025\/02\/crypto-corea-del-norte.jpg?fit=1200%2C675&ssl=1","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"authors":[{"term_id":830,"user_id":3,"is_guest":0,"slug":"redaccion","display_name":"Redacci\u00f3n","avatar_url":{"url":"https:\/\/informatepy.com\/2024\/wp-content\/uploads\/2024\/02\/cropped-Isologo-sin-fondo.png","url2x":"https:\/\/informatepy.com\/2024\/wp-content\/uploads\/2024\/02\/cropped-Isologo-sin-fondo.png"},"author_category":"1","first_name":"Redacci\u00f3n","last_name":"","user_url":"","job_title":"","description":""}],"_links":{"self":[{"href":"https:\/\/informatepy.com\/2024\/wp-json\/wp\/v2\/posts\/30350","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/informatepy.com\/2024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/informatepy.com\/2024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/informatepy.com\/2024\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/informatepy.com\/2024\/wp-json\/wp\/v2\/comments?post=30350"}],"version-history":[{"count":1,"href":"https:\/\/informatepy.com\/2024\/wp-json\/wp\/v2\/posts\/30350\/revisions"}],"predecessor-version":[{"id":30352,"href":"https:\/\/informatepy.com\/2024\/wp-json\/wp\/v2\/posts\/30350\/revisions\/30352"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/informatepy.com\/2024\/wp-json\/wp\/v2\/media\/30351"}],"wp:attachment":[{"href":"https:\/\/informatepy.com\/2024\/wp-json\/wp\/v2\/media?parent=30350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/informatepy.com\/2024\/wp-json\/wp\/v2\/categories?post=30350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/informatepy.com\/2024\/wp-json\/wp\/v2\/tags?post=30350"},{"taxonomy":"jnews-series","embeddable":true,"href":"https:\/\/informatepy.com\/2024\/wp-json\/wp\/v2\/jnews-series?post=30350"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/informatepy.com\/2024\/wp-json\/wp\/v2\/ppma_author?post=30350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}