• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
u.s. seizes cryptocurrency worth $30 million stolen by north korean

U.S. Seizes Cryptocurrency Worth $30 Million Stolen by North Korean Hackers

You are here: Home / General Cyber Security News / U.S. Seizes Cryptocurrency Worth $30 Million Stolen by North Korean Hackers
September 9, 2022

Far more than $30 million value of cryptocurrency plundered by the North Korea-linked Lazarus Group from on-line video clip video game Axie Infinity has been recovered, marking the initially time electronic belongings stolen by the threat actor have been seized.

“The seizures characterize around 10% of the total funds stolen from Axie Infinity (accounting for value discrepancies concerning time stolen and seized), and exhibit that it is becoming extra challenging for bad actors to properly cash out their sick-gotten crypto gains,” Erin Plante, senior director of investigations at Chainalysis, said.

The advancement arrives a lot more than 5 months following the crypto hack resulted in the theft of $620 million from the decentralized finance (DeFi) platform Ronin Network, with the attackers laundering a greater part of the proceeds – amounting to $455 million – by means of the Ethereum-based cryptocurrency tumbler Twister Income.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


CyberSecurity

The March 2022 cryptocurrency heist resulted in losses totaling 173,600 ETH truly worth about $594 million at the time and $25.5 million in USDC stablecoin, creating it the most significant cryptocurrency theft to date.

Whilst Twister Money has emerged as a well-known tool for anonymizing virtual currency transactions, its abuse by destructive actors these types of as the Lazarus Group to money out the illicitly attained belongings has landed it in the crosshairs of the U.S. authorities, which imposed sanctions versus the provider final month.

The blockchain analytics business stated that the blocklisting pressured the adversary to shift away from the mixer in favor of DeFi providers these kinds of as crypto bridges to chain hop and transfer electronic belongings amongst chains in a bid to obscure the path of resources.

“The hacker bridged ETH from the Ethereum blockchain to the BNB chain and then swapped that ETH for USDD, which was then bridged to the BitTorrent chain,” Plante stated, detailing the swap involving various different forms of cryptocurrencies in a single transaction to launder the stolen cash.

CyberSecurity

The Lazarus Team is a prolific superior persistent danger (APT) that is driven by attempts to help North Korea’s operational aims, which comprises espionage and creating revenue for the sanctions-hit nation by hanging monetary institutions. Most of the cyber functions are done by factors within the Reconnaissance General Bureau.

The seizure also comes as 6 consumers of Tornado Income, together with Coinbase workers, submitted a lawsuit this 7 days in opposition to the U.S. Treasury Division, Treasury Secretary Janet Yellen, and other officials about their selection to slap sanctions on the system.

Observed this article appealing? Comply with THN on Fb, Twitter  and LinkedIn to study extra special material we publish.


Some components of this article are sourced from:
thehackernews.com

Previous Post: «patreon confirms it 'parted ways" with its entire cyber security Patreon confirms it ‘parted ways” with its entire cyber security team
Next Post: CISA warns against actively exploited Chrome and D-Link security flaws cisa warns against actively exploited chrome and d link security flaws»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Italy’s Privacy Watchdog Blocks ChatGPT Amid Privacy Concerns
  • Modular “AlienFox” Toolkit Used to Steal Cloud Service Credentials
  • New Azure Flaw “Super FabriXss” Enables Remote Code Execution Attacks
  • Winter Vivern APT Targets European Government Entities with Zimbra Vulnerability
  • MongoDB CISO: Don’t be afraid to simplify important issues for executives
  • Cyber Police of Ukraine Busted Phishing Gang Responsible for $4.33 Million Scam
  • Deep Dive Into 6 Key Steps to Accelerate Your Incident Response
  • Lazarus blamed for 3CX attack as byte-to-byte code match discovered
  • New Cylance Ransomware strain emerges, experts speculate about its notorious members
  • 3CX Supply Chain Attack — Here’s What We Know So Far

Copyright © TheCyberSecurity.News, All Rights Reserved.