1. Home
  2. Lazarus Group

Lazarus Group

Norwegian Authorities Return $5,700,000 Worth of Stolen Crypto Assets From 2022 Ronin Network Hack

Norwegian Authorities Return ,700,000 Worth of Stolen Crypto Assets From 2022 Ronin Network Hack

Norwegian authorities successfully froze and returned $5.7 million worth of crypto assets that were stolen in a massive 2022 hack on the Ronin (RON) network. Ronin is a gaming-focused Ethereum (ETH) sidechain developed by Sky Mavis, the same team that created the non-fungible token (NFT)-based game Axie Infinity (AXS). In March 2022, hackers believed to […]

The post Norwegian Authorities Return $5,700,000 Worth of Stolen Crypto Assets From 2022 Ronin Network Hack appeared first on The Daily Hodl.

CryptoQuant Integrates TRON Data to Empower Users with Enhanced Blockchain Analytics

North Korean hackers deploy ‘Durian’ malware, targeting crypto firms

The state-backed North Korean hacking group Kimsuky reportedly used a new malware variant to target at least two South Korean crypto firms.

North Korean hackers are utilizing a “striking” new malware variant dubbed “Durian” to reportedly launch attacks on South Korean crypto firms.

The North Korean hacking group Kimsuky used the new malware in a series of targeted attacks on at least two cryptocurrency firms so far, according to a May 9 threat report from cybersecurity firm Kaspersky.

This was done through a “persistent” attack by exploiting legitimate security software used exclusively by crypto firms in South Korea.

Read more

CryptoQuant Integrates TRON Data to Empower Users with Enhanced Blockchain Analytics

Atomic Wallet Launches $1,000,000 Bug Bounty Program Months After Suffering Multi-Million Dollar Hack

Atomic Wallet Launches ,000,000 Bug Bounty Program Months After Suffering Multi-Million Dollar Hack

Atomic Wallet is beefing up the security of its platform through a new initiative that will give monetary awards to those who discover potential vulnerabilities in its app. In a new statement, the decentralized wallet company says it is launching a bug bounty program with a cumulative prize pool of $1 million months after suffering […]

The post Atomic Wallet Launches $1,000,000 Bug Bounty Program Months After Suffering Multi-Million Dollar Hack appeared first on The Daily Hodl.

CryptoQuant Integrates TRON Data to Empower Users with Enhanced Blockchain Analytics

Bloomberg Analyst Says SEC Lining Up To Potentially Approve All Spot Bitcoin ETF Applications in January

Bloomberg Analyst Says SEC Lining Up To Potentially Approve All Spot Bitcoin ETF Applications in January

A Bloomberg analyst says that the U.S. Securities and Exchange Commission (SEC) is gearing up to approve all bids for a spot market Bitcoin (BTC) exchange-traded fund (ETF). In a lengthy thread on the social media platform X, James Seyffart says that the SEC making earlier-than-expected rulings on Franklin’s bids for a BTC ETF means […]

The post Bloomberg Analyst Says SEC Lining Up To Potentially Approve All Spot Bitcoin ETF Applications in January appeared first on The Daily Hodl.

CryptoQuant Integrates TRON Data to Empower Users with Enhanced Blockchain Analytics

U.S. Government Enacts Sanctions on Crypto Mixer Sinbad Under Allegations of Aiding North Korean Money Laundering

U.S. Government Enacts Sanctions on Crypto Mixer Sinbad Under Allegations of Aiding North Korean Money Laundering

The U.S. government is sanctioning another crypto mixing protocol, accusing it of aiding North Korea in laundering hundreds of millions of dollars worth of stolen digital assets. In a new press release, the U.S. Department of the Treasury says that its Office of Foreign Assets Control (OFAC) is sanctioning the crypto tumbler Sinbad for allegedly […]

The post U.S. Government Enacts Sanctions on Crypto Mixer Sinbad Under Allegations of Aiding North Korean Money Laundering appeared first on The Daily Hodl.

CryptoQuant Integrates TRON Data to Empower Users with Enhanced Blockchain Analytics

Lazarus used ‘Kandykorn’ malware in attempt to compromise exchange — Elastic

Lazarus members posed as engineers and fooled exchange employees into downloading difficult-to-detect malware.

Lazarus Group used a new form of malware in an attempt to compromise a crypto exchange, according to an Oct. 31 report from Elastic Security Labs.

Elastic has named the new malware “Kandykorn” and the loader program that loads it into memory “Sugarload,” as the loader file has a novel “.sld” extension in its name. Elastic did not name the exchange that was targeted.

Crypto exchanges have suffered a rash of private-key hacks in 2023, most of which have been traced to the North Korean cybercrime enterprise Lazarus Group.

Kandykorn infection process. Source: Elastic Security Labs

According to Elastic, the attack began when Lazarus members posed as blockchain engineers and targeted engineers from the unnamed crypto exchange. The attackers made contact on Discord, claiming they had designed a profitable arbitrage bot that could profit from discrepancies between the prices of cryptocurrencies on different exchanges.

The attackers convinced the engineers to download this “bot.” The files in the program’s ZIP folder had disguised names like “config.py” and “pricetable.py” that made it appear to be an arbitrage bot.

Once the engineers ran the program, it executed a “Main.py” file that ran some ordinary programs as well as a malicious file called “Watcher.py.” Watcher.py established a connection to a remote Google Drive account and began downloading content from it to another file named testSpeed.py. The malicious program then ran testSpeed.py a single time before deleting it in order to cover its tracks.

During the single-time execution of testSpeed.py, the program downloaded more content and eventually executed a file that Elastic calls “Sugarloader.” This file was obfuscated using a “binary packer,” Elastic stated, allowing it to bypass most malware detection programs. However, they were able to discover it by forcing the program to stop after its initialization functions had been called, then snapshotting the process’ virtual memory.

According to Elastic, it ran VirusTotal malware detection on Sugarloader, and the detector declared that the file was not malicious.

Related: Crypto firms beware: Lazarus’ new malware can now bypass detection

Once Sugarloader was downloaded onto the computer, it connected to a remote server and downloaded Kandykorn directly into the device’s memory. Kandykorn contains numerous functions that can be used by the remote server to perform various malicious activities. For example, the command “0xD3” can be used to list the contents of a directory on the victim’s computer, and “resp_file_down” can be used to transfer any of the victim’s files to the attacker’s computer.

Elastic believes that the attack occurred in April 2023. It claims that the program is probably still being used to perform attacks today, stating:

“This threat is still active and the tools and techniques are being continuously developed.”

Centralized crypto exchanges and apps suffered a rash of attacks in 2023. Alphapo, CoinsPaid, Atomic Wallet, Coinex, Stake and others have been victims of these attacks, most of which seem to have involved the attacker stealing a private key from the victim’s device and using it to transfer customers’ cryptocurrency to the attacker’s address. 

The United States Federal Bureau of Investigation has accused the Lazarus Group of being behind the Coinex hack, as well as performing the Stake attack and others.

CryptoQuant Integrates TRON Data to Empower Users with Enhanced Blockchain Analytics

Atomic Wallet Freezes $2,000,000 on Crypto Exchanges After Hackers Steal $100,000,000 in June

Atomic Wallet Freezes ,000,000 on Crypto Exchanges After Hackers Steal 0,000,000 in June

Atomic Wallet says it has frozen $2 million worth of crypto on centralized exchanges after hackers plundered more than $100 million from the company’s users in June. The non-custodial decentralized wallet company has faced pushback online in the months following the hack for remaining vague on the details of the attack, which various crypto researchers […]

The post Atomic Wallet Freezes $2,000,000 on Crypto Exchanges After Hackers Steal $100,000,000 in June appeared first on The Daily Hodl.

CryptoQuant Integrates TRON Data to Empower Users with Enhanced Blockchain Analytics

$7,000,000,000 in Illicit or High-Risk Funds Laundered Through Cross-Chain Protocols: Crypto Analytics Firm

,000,000,000 in Illicit or High-Risk Funds Laundered Through Cross-Chain Protocols: Crypto Analytics Firm

Blockchain research firm Elliptic says the amount of funds laundered through cross-chain and cross-asset services reached a ten-figure sum in July this year. In a new press release, Elliptic says that cross-chain crime is exceeding expectations after hitting the $7 billion level a couple of months ago, higher than the previously projected $6.5 billion figure […]

The post $7,000,000,000 in Illicit or High-Risk Funds Laundered Through Cross-Chain Protocols: Crypto Analytics Firm appeared first on The Daily Hodl.

CryptoQuant Integrates TRON Data to Empower Users with Enhanced Blockchain Analytics

Crypto firms beware: Lazarus’ new malware can now bypass detection

The malware payload “LightlessCan" — used in fake job scams — is far more challenging to detect than its predecessor, warns cybersecurity researchers at ESET.

North Korean hacking collective Lazarus Group has been using a new type of “sophisticated” malware as part of its fake employment scams — which researchers warn is far more challenging to detect than its predecessor.

According to a Sept. 29 post from ESET’s senior malware researcher Peter Kálnai, while analyzing a recent fake job attack against a Spain-based aerospace firm, ESET researchers discovered a publicly undocumented backdoor named LightlessCan.

The Lazarus Group’s fake job scam typically involves tricking victims with a potential offer of employment at a well-known firm. The attackers would entice victims to download a malicious payload masqueraded as documents to do all sorts of damage.

However, Kálnai says the new LightlessCan payload is a “significant advancement” compared to its predecessor BlindingCan.

“LightlessCan mimics the functionalities of a wide range of native Windows commands, enabling discreet execution within the RAT itself instead of noisy console executions.”

“This approach offers a significant advantage in terms of stealthiness, both in evading real-time monitoring solutions like EDRs, and postmortem digital forensic tools,” he said.

The new payload also uses what the researcher calls “execution guardrails” — ensuring that the payload can only be decrypted on the intended victim’s machine, thereby avoiding unintended decryption by security researchers.

Kálnai said that one case that involved the new malware came from an attack on a Spanish aerospace firm when an employee received a message from a fake Meta recruiter named Steve Dawson in 2022.

Soon after, the hackers sent over the two simple coding challenges embedded with the malware. 

The initial contact by the attacker impersonating a recruiter from Meta. Source: WeLiveSecurity.

Cyberespionage was the main motivation behind Lazarus Group’s attack on the Spain-based aerospace firm, he added.

Related: 3 steps crypto investors can take to avoid hacks by the Lazarus Group

Since 2016, North Korean hackers have stolen an estimated $3.5 billion from cryptocurrency projects, according to a Sept. 14 report by blockchain forensics firm Chainalysis.

In September 2022, cybersecurity firm SentinelOne warned of a fake job scam on LinkedIn, offering potential victims a job at Crypto.com as part of a campaign dubbed “Operation Dream Job." 

Meanwhile, the United Nations has beetrying to curtail North Korea’s cybercrime tactics at the international level — as it is understood North Korea is using the stolen funds to support its nuclear missile program.

Magazine: $3.4B of Bitcoin in a popcorn tin: The Silk Road hacker’s story

CryptoQuant Integrates TRON Data to Empower Users with Enhanced Blockchain Analytics