Threat actors from North Korea have been increasingly targeting the cryptocurrency sector since 2017 as a source of generating revenue.
Reports have claimed that the country’s ruling elite and computer science professionals have access to new information and technology, equipping them with skills needed to conduct cryptocurrency cyber attacks. In this article, we’ll dive into the details of the Lazarus cryptocurrency hacks and learn deployed tactics.
Lazarus is a group of threat actors that first emerged back in 2009 and is believed to have ties with the North Korean government. The belief stems from the fact that a majority of their hacks target South Korea and are aimed at causing disruption and destruction.
However, Lazarus threat actors are known for conducting attacks for financial motives, too. Some of their most infamous attacks not related to cybercrime in the blockchain industry include:
Lazarus has been a prominent player when it comes to cybercrime in the blockchain industry since 2017. News reports claim that, over the past six years, the group has stolen $3 billion worth of crypto assets, and a majority of these funds are used for the country’s weapons of mass destruction (WMDs). As of now, the Lazarus Group has been attributed to different cryptocurrency hacks. These include:
As per a report from Chainalysis, hackers linked to North Korea, such as the Lazarus group, stole an estimated $1.7 billion worth of cryptocurrency in 2022 alone. An excerpt from the report reads, “In 2022, they shattered their own records for theft, stealing an estimated $1.7 billion worth of cryptocurrency across several hacks we’ve attributed to them.”
Decentralized Finance (DeFi) platforms allow users to exchange cryptocurrencies without having the platform take ownership of the user’s funds. A report from the U.S. Department of Homeland Security (DHS) mentions that such functionalities facilitate threat actors. It allows them to determine exactly when to deploy a transaction switching the stolen crypto from one type to another.
Leveraging such protocols makes attribution and tracking stolen cryptocurrency funds more difficult to determine. These hackers are also known for leveraging social engineering tactics to target employees and exploit cryptocurrency exchange vulnerabilities. They trap victims with lucrative job offers and then distribute malware, granting them remote access to the organization’s network.
Once the access is acquired, threat actors are able to drain all assets and move them to wallets they control. Other infamous yet notable, methods include phishing tactics prompting targets into downloading cryptocurrency applications with trojans that steal their assets. These threat actors are also known for mixing services to hide their trail and evade financial sector cybersecurity measures.
It’s worth mentioning that such services are available on platforms that do not have any anti-money laundering or know-your-customers (KYC) policies. The Lazarus group is known for the use of custom malware, and both the MagicRAT and the QuiteRAT have been linked to the group. Furthermore, these threat actors are also capable of exploiting zero-day vulnerabilities during their attacks.
Given the severity and impact of the Lazarus cryptocurrency hacks, learning how to defend and counter against threats is paramount to crypto platforms worldwide. Although the exact counter and proactive measure that should be deployed vary from one attack or technique to the other, some general best practices include:
Working with a zero-trust approach, on the other hand, ensures just enough access and constant authentication, limiting the damages of an attack or eliminating the possibility of one altogether.
The Lazarus group has been an infamously prominent entity as far as cybercrime in the blockchain industry and crypto industry is concerned.
These threat actors are known for using custom malware, social engineering, phishing, and trojans as part of their arsenal for cryptocurrency hacks. To safeguard against such attacks, platforms must use proactive cybersecurity measures and stay updated with security best practices.
The sources for this piece include The Hacker News and Recorded Future.
The post Lazarus Cryptocurrency Hacks Estimated To Be $3 Billion appeared first on TuxCare.
*** This is a Security Bloggers Network syndicated blog from TuxCare authored by Wajahat Raja. Read the original post at: https://tuxcare.com/blog/lazarus-cryptocurrency-hacks/