• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
north korea's lazarus group launders $900 million in cryptocurrency

North Korea’s Lazarus Group Launders $900 Million in Cryptocurrency

You are here: Home / General Cyber Security News / North Korea’s Lazarus Group Launders $900 Million in Cryptocurrency
October 6, 2023

As substantially as $7 billion in cryptocurrency has been illicitly laundered by cross-chain crime, with the North Korea-connected Lazarus Team joined to the theft of approximately $900 million of all those proceeds between July 2022 and July of this 12 months.

“As traditional entities such as mixers carry on to be subject matter to seizures and sanctions scrutiny, the crypto crime displacement to chain- or asset-hopping typologies is also on the increase,” blockchain analytics firm Elliptic stated in a new report released this week.

Cross-chain crime refers to the conversion of crypto assets from just one token or blockchain to a different, usually in speedy succession, in an attempt to obfuscate their origin, creating it a profitable system for money laundering for crypto thefts and an option to Acc techniques like mixers.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


According to details collected by Elliptic, the Lazarus Group’s use of cross-chain bridges contributed to a the vast majority of the 111% maximize in the proportion of resources despatched through these solutions.

Cybersecurity

The North Korean hacking crew is estimated to have stolen virtually $240 million in cryptocurrency considering that June 2023, next a series of attacks concentrating on Atomic Wallet ($100 million), CoinsPaid ($37.3 million), Alphapo ($60 million), Stake.com ($41 million), and CoinEx ($31 million).

Cryptocurrency

“The range, number, and eccentricity in implementation of Lazarus strategies define this group, as well as that it performs all three pillars of cybercriminal activities: cyber espionage, cyber sabotage, and pursuit of money obtain,” ESET explained of the danger actor late final thirty day period.

The danger actor has also been joined to the use of Avalanche Bridge to deposit extra than 9,500 bitcoin, whilst simultaneously employing cross-chain methods to go some of the plundered assets.

Cybersecurity

“As is evidenced by the assets ending up on the same blockchain on numerous situations, these transactions have no genuine business reason other than to obfuscate their origin,” Elliptic reported. “Bridging again-and-forth for the sake of obfuscation – i.e. ‘chain-hopping’ – is now a identified cash laundering typology.”

The disclosure arrives as South Korea’s National Intelligence Company (NIS) has warned of North Korea attacking its shipbuilding sector due to the fact the start off of the 12 months.

“The hacking methods predominantly applied by North Korean hacking organizations were to occupy and bypass the PCs of IT servicing providers, and to set up malicious code after distributing phishing emails to internal personnel,” the agency reported.

Identified this article exciting? Comply with us on Twitter  and LinkedIn to read extra special material we write-up.


Some parts of this posting are sourced from:
thehackernews.com

Previous Post: «chinese hackers target semiconductor firms in east asia with cobalt Chinese Hackers Target Semiconductor Firms in East Asia with Cobalt Strike
Next Post: Gaza-Linked Cyber Threat Actor Targets Israeli Energy and Defense Sectors gaza linked cyber threat actor targets israeli energy and defense sectors»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.