PLAY PODCASTS
Crypto, cyber & a $1.5B crime
Episode 87

Crypto, cyber & a $1.5B crime

How does one crypto transaction spiral into a $1.5 billion cybercrime? The Bybit heist. This wasn’t just the largest crypto theft in history—it was a criminal feat of deception that exposed how even sophisticated systems can be breached when fraud, cybersecurity, and human oversight don’t align. In this episode, we are excited to welcome returning guest Geoff White, investigative journalist and creator of The Lazarus Heist podcast, to join host, Alex Pillow, in examining one of the most audacious crypto thefts to-date. How did hackers executed the largest crypto theft in history while making operations seem normal from the inside? Tactics used in the heist and the broader implications of money laundering in the crypto space The impact of remote work on verifying employee legitimacy and protecting organizational value What the aftermath of money laundering looks like for victims—can stolen crypto ever be recovered? How companies can map where value resides across departments—and identify weak links before attackers do

Moody’s Talks: Risk Reframed · Alex Pillow, Geoff White

August 13, 202547m 59s

Audio is streamed directly from the publisher (afp-922722-injected.calisto.simplecastaudio.com) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.

Show Notes

How does one crypto transaction spiral into a $1.5 billion cybercrime? The Bybit heist.

This wasn’t just the largest crypto theft in history—it was a criminal feat of deception that exposed how even sophisticated systems can be breached when fraud, cybersecurity, and human oversight don’t align. 

In this episode, we are excited to welcome returning guest Geoff White, investigative journalist and creator of The Lazarus Heist podcast, to join host, Alex Pillow, in examining one of the most audacious crypto thefts to-date. 

  • How did hackers executed the largest crypto theft in history while making operations seem normal from the inside?
  • Tactics used in the heist and the broader implications of money laundering in the crypto space 
  • The impact of remote work on verifying employee legitimacy and protecting organizational value 
  • What the aftermath of money laundering looks like for victims—can stolen crypto ever be recovered? 
  • How companies can map where value resides across departments—and identify weak links before attackers do 

For more information, check out the resources below:  

To learn more about Moody’s, please visit our website or get in touch—we would love to hear from you.


Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Topics

cyber riskamlcrypto