• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

North Korea’s Lazarus Group Suspected of $100m Harmony Hack

You are here: Home / General Cyber Security News / North Korea’s Lazarus Group Suspected of $100m Harmony Hack
June 30, 2022

Blockchain analytics enterprise Elliptic recommended North Korea’s Lazarus Team could be behind last week’s $100m theft from cryptocurrency firm Harmony.

In an advisory launched on Wednesday, the security authorities confirmed Harmony’s first claims that the cash had been stolen by Horizon Bridge, a system enabling the transfer of cryptocurrency across blockchains.

“The stolen crypto-belongings involved Ether (ETH), Tether (USDT), Wrapped Bitcoin (WBTC) and BNB,” reads the doc.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“The thief promptly made use of Uniswap – a decentralized trade (DEX) – to change a lot of these belongings into a complete of 85,837 ETH. This is a widespread laundering system made use of to avoid seizure of stolen belongings.”

Elliptic reportedly tracked the ETH and observed the risk actors begun relocating it into Tornado Cash – a software that is typically applied to launder proceeds of crime. 

“So considerably, just about 35,000 Ether ($39 million) of the stolen cash has been despatched to Tornado Income, and the approach is ongoing,” the security scientists wrote.

“By sending these money by means of Twister, the thief is attempting to split the transaction trail back again to the authentic theft. This can make it simpler to dollars out the funds at an trade.”

Irrespective of these makes an attempt, nonetheless, Elliptic explained it managed to use Twister demixing approaches to trace back the stolen cash to a variety of new Ethereum wallets.

“Our investigation of the hack and the subsequent laundering of the stolen crypto-assets also implies that it is steady with activities of the Lazarus Group – a cybercrime group with solid one-way links to North Korea.”

According to the cybersecurity authorities, when the Lazarus connection are not able to be established unequivocally, there are different indicators suggesting the group may possibly be driving the hack.

One particular of them refers to similarities involving the tactics behind the Harmony attack and the $540m hack of Ronin Bridge, which was eventually traced back to North Korea.

Additional clues linking the team to the Harmony hack consist of the simple fact that theft was perpetrated by compromising the cryptographic keys of a multi-signature wallet, the choice of APAC-primarily based targets (Harmony is primarily based in the US, but numerous of the core crew have back links to the APAC region) and the apparent use of automatic processes to move funds into Twister.

“Elliptic will continue on to keep an eye on the stolen money as the laundering progresses, and will update its resources to replicate the motion of these property,” Elliptic concluded.


Some components of this short article are sourced from:
www.infosecurity-magazine.com

Previous Post: «google blocks dozens of malicious domains operated by hack for hire groups Google Blocks Dozens of Malicious Domains Operated by Hack-for-Hire Groups
Next Post: DragonForce Malaysia Group Releases Windows LPE Exploit and Turns to Ransomware Tactics Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.