FBI Finds 1,580 Bitcoin in Crypto Wallets Linked to North Korean Hackers – SecurityWeek

0

Hi, what are you looking for?
The FBI has published information on six crypto wallets in which North Korean hackers moved roughly 1,580 Bitcoin from various heists.
By
Flipboard
Reddit
Pinterest
Whatsapp
Whatsapp
Email

The Federal Bureau of Investigation has published information on six cryptocurrency wallets operated by North Korean hackers and believed to be holding stolen funds.
The cryptocurrency addresses, the FBI says, hold roughly 1,580 Bitcoin that are likely related to the recent theft of cryptocurrency assets worth hundreds of millions of dollars.
“Over the last 24 hours, the FBI tracked cryptocurrency stolen by the Democratic People’s Republic of Korea (DPRK) TraderTraitor-affiliated actors (also known as Lazarus Group and APT38). The FBI believes the DPRK may attempt to cash out the bitcoin worth more than $40 million dollars,” the FBI says.
According to the agency, TraderTraitor-affiliated hackers stole $60 million and $37 million in cryptocurrency from Alphapo and CoinsPaid in July, and $100 million from Atomic Wallet in June.
Previously, the hackers stole crypto assets in attacks against Harmony’s Horizon bridge and Sky Mavis’ Ronin Bridge.
“Private sector entities should examine the blockchain data associated with these addresses and be vigilant in guarding against transactions directly with, or derived from, the addresses,” the FBI says.
In April 2023, the US government warned that the North Korea-linked Lazarus Group, which has been blamed for numerous high-profile cyberattacks, was targeting entities and exchanges in the blockchain and cryptocurrency industry to generate and launder funds.

Advertisement. Scroll to continue reading.

Based on the shared indicators of compromise associated with this campaign, which the US government named TraderTraitor, GitHub linked North Korea to social engineering attacks targeting employees at technology firms in July.
North Korean hackers were also blamed for the July cyberattack on JumpCloud, for the 3CX hack, and for the AppleJeus operation.
Related: US, South Korea Detail North Korea’s Social Engineering Techniques
Related: US Sanctions North Korean University for Training Hackers
Related: North Korean Hackers Target Mac Users With New ‘RustBucket’ Malware

Ionut Arghire is an international correspondent for SecurityWeek.
Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.
Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.
Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.
As the SEC cyber incident disclosure rules come into effect, organizations will be forced to seriously consider giving security leaders a seat at the table.
Working remotely is here to stay and businesses should continue to make sure their basic forms of communication are properly configured and secured.
The complexity and challenge of distributed cloud environments often necessitate managing multiple infrastructure, technology, and security stacks, multiple policy engines, multiple sets of controls, and multiple asset inventories.
Automated Security Control Assessment enhances security posture by verifying proper, consistent configurations of security controls, rather than merely confirming their existence.
Context helps complete the picture and results in actionable intelligence that security teams can use to make informed decisions more quickly.
Flipboard
Reddit
Pinterest
Whatsapp
Whatsapp
Email
The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.
As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.
Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.
A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the…
Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.
Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.
The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.
A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of…
Got a confidential news tip? We want to hear from you.
Reach a large audience of enterprise cybersecurity professionals
Subscribe to the SecurityWeek Daily Briefing and get the latest content delivered to your inbox.
Copyright © 2023 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.


source

Leave a Reply

Your email address will not be published. Required fields are marked *