North Korean hackers often hide malicious code in the form of tempting job offers. Common attack vectors are spearphishing campaigns and malware. According to the CSA, North Korean hackers have targeted cryptocurrency exchanges, decentralized finance (DeFi) protocols, play-to-earn crypto games, trading companies, and venture capital funds since 2020. Treasury Department issued a joint Cybersecurity Advisory (CSA), warning that Lazarus presented an advanced persistent threat to the cryptocurrency industry. Researchers at Elliptic estimate they have stolen over $2 billion in cryptocurrency from exchanges and DeFi services. The Lazarus Group is an advanced threat to the cryptocurrency industry. Still, there were a few clues that allowed researchers at blockchain analysis firm Elliptic to implicate the likely perpetrator: North Korean hackers known as the Lazarus Group. The hackers were smart about the attack and took multiple steps to obscure their identity. These services mix funds from different users, obfuscating the origins of assets and making it harder to trace stolen crypto. Mixers are another valuable tool for laundering crypto. Over the next few days, automated transactions sent regular amounts of the stolen ETH to the Tornado Cash mixer. Passing stolen crypto through a DEX is a common money laundering strategy since they allow hackers to bypass compliance controls. The stolen cryptocurrency was immediately converted to ETH via Uniswap, a popular decentralized exchange (DEX). The bridge allowed users to transfer assets between the Horizon blockchain and other blockchains. On the morning of June 24th, hackers stole $100 million in Ether (ETH), Tether (USDT) Wrapped Bitcoin (WBTC) and BNB from the Horizon bridge.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |