• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • eufy Solo IndoorCam C24 (2K, 2-Cam Kit, Plug-in) for $75

    eufy Solo IndoorCam C24  (2K, 2-Cam Kit, Plug-in) for $75
  • eufyCam 2 Pro Add-on Camera for $169

    eufyCam 2 Pro Add-on Camera for $169
  • KyotoUI Pro Version: Lifetime License for $49

    KyotoUI Pro Version: Lifetime License for $49
  • Apple iPad mini 4, 128GB (Refurbished: Wi-Fi Only) for $228

    Apple iPad mini 4, 128GB (Refurbished: Wi-Fi Only) for $228
  • Apple iPad mini 4, 16GB – Gold (Refurbished: Wi-Fi Only) for $170

    Apple iPad mini 4, 16GB – Gold (Refurbished: Wi-Fi Only) for $170
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

Lazarus Group Behind $540 Million Axie Infinity Crypto Hack and Attacks on Chemical Sector

Apr 16, 2022 by iHash Leave a Comment

North Korean Lazarus Hackers

The U.S. Treasury Department has implicated the North Korea-backed Lazarus Group (aka Hidden Cobra) in the theft of $540 million from video game Axie Infinity’s Ronin Network last month.

On Thursday, the Treasury tied the Ethereum wallet address that received the stolen funds to the threat actor and sanctioned the funds by adding the address to the Office of Foreign Assets Control’s (OFAC) Specially Designated Nationals (SDN) List.

“The FBI, in coordination with Treasury and other U.S. government partners, will continue to expose and combat the DPRK’s use of illicit activities – including cybercrime and cryptocurrency theft – to generate revenue for the regime,” the intelligence and law enforcement agency said in a statement.

The cryptocurrency heist, the second-largest cyber-enabled theft to date, involved the siphoning of 173,600 Ether (ETH) and 25.5 million USD Coins from the Ronin cross-chain bridge, which allows users to transfer their digital assets from one crypto network to another, on March 23, 2022.

“The attacker used hacked private keys in order to forge fake withdrawals,” the Ronin Network explained in its disclosure report a week later after the incident came to light.

CyberSecurity

The sanctions prohibit U.S. individuals and entities from transacting with the address in question to ensure that the state-sponsored group can’t cash out any further funds. An analysis by Elliptic has found that the actor has managed to launder 18% of the siphoned digital funds (about $97 million) as of April 14.

“First, the stolen USDC was swapped for ETH through decentralized exchanges (DEXs) to prevent it from being seized,” Elliptic noted. “By converting the tokens at DEXs, the hacker avoided the anti-money laundering (AML) and ‘know your customer’ (KYC) checks performed at centralized exchanges.”

Nearly $80.3 million of the laundered funds have involved the use of Tornado Cash, a mixing service on the Ethereum blockchain designed to obscure the trail of funds, with another $9.7 million worth of ETH likely to be laundered in the same manner.

Lazarus Group, an umbrella name assigned to prolific state-sponsored actors operating on behalf of North Korean strategic interests, has a track record of conducting cryptocurrency thefts since at least 2017 to bypass sanctions and fund the country’s nuclear and ballistic missile programs.

“The country’s espionage operations are believed to be reflective of the regime’s immediate concerns and priorities, which is likely currently focused on acquiring financial resources through crypto heists, targeting of media, news, and political entities, [and] information on foreign relations and nuclear information,” Mandiant pointed out in a recent deep dive.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has painted the cyber actors as an increasingly sophisticated group that has developed and deployed a wide range of malware tools around the world to facilitate these activities.

The group is known to have plundered an estimated $400 million worth of digital assets from crypto platforms in 2021, marking a 40% jump from 2020, according to Chainalysis, which found “only 20% of the stolen funds were Bitcoin, [and that] Ether accounted for a majority of the funds stolen at 58%.”

Despite sanctions imposed by the U.S. government on the hacking collective, recent campaigns undertaken by the group have capitalized on trojanized decentralized finance (DeFi) wallet apps to backdoor Windows systems and misappropriate funds from unsuspecting users.

That’s not all. In another cyber offensive disclosed by Broadcom Symantec this week, the actor has been observed targeting South Korean organizations operating within the chemical sector in what appears to be a continuation of a malware campaign dubbed “Operation Dream Job,” corroborating findings from Google’s Threat Analysis Group in March 2022.

CyberSecurity

The intrusions, detected earlier this January, commenced with a suspicious HTM file received either as a link in a phishing email or downloaded from the internet that, when opened, triggers an infection sequence, ultimately leading to the retrieval of a second-stage payload from a remote server to facilitate further incursions.

The goal of the attacks, Symantec assessed, is to “obtain intellectual property to further North Korea’s own pursuits in this area.”

The continuous onslaught of illicit activities perpetrated by the Lazarus Group has also led the U.S. State Department to announce a $5 million reward for “information that leads to the disruption of financial mechanisms of persons engaged in certain activities that support North Korea.”

The development comes days after a U.S. court in New York sentenced Virgil Griffith, a 39-year-old former Ethereum developer, to five years and three months in prison for helping North Korea use virtual currencies to evade sanctions.

To make matters worse, malicious actors have pilfered $1.3 billion worth of cryptocurrency in the first three months of 2022 alone, in comparison to $3.2 billion that was looted for the entirety of 2021, indicating a “meteoric rise” in thefts from crypto platforms.

“Almost 97% of all cryptocurrency stolen in the first three months of 2022 has been taken from DeFi protocols, up from 72% in 2021 and just 30% in 2020,” Chainalysis said in a report published this week.

“For DeFi protocols in particular, however, the largest thefts are usually thanks to faulty code. Code exploits and flash loan attacks — a type of code exploit involving the manipulation of cryptocurrency prices — has accounted for much of the value stolen outside of the Ronin attack,” the researchers said.

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: attacks, Axie, chemical, computer security, Crypto, cyber attacks, cyber news, cyber security news, cyber security news today, cyber security updates, cyber updates, data breach, Group, hack, hacker news, hacking news, how to hack, Infinity, information security, Lazarus, Million, network security, ransomware malware, Sector, software vulnerability, the hacker news

Special Offers

  • eufy Solo IndoorCam C24 (2K, 2-Cam Kit, Plug-in) for $75

    eufy Solo IndoorCam C24  (2K, 2-Cam Kit, Plug-in) for $75
  • eufyCam 2 Pro Add-on Camera for $169

    eufyCam 2 Pro Add-on Camera for $169
  • KyotoUI Pro Version: Lifetime License for $49

    KyotoUI Pro Version: Lifetime License for $49
  • Apple iPad mini 4, 128GB (Refurbished: Wi-Fi Only) for $228

    Apple iPad mini 4, 128GB (Refurbished: Wi-Fi Only) for $228
  • Apple iPad mini 4, 16GB – Gold (Refurbished: Wi-Fi Only) for $170

    Apple iPad mini 4, 16GB – Gold (Refurbished: Wi-Fi Only) for $170

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

eufy Solo IndoorCam C24 (2K, 2-Cam Kit, Plug-in) for $75

Jan 28, 2023 By iHash

eufyCam 2 Pro Add-on Camera for $169

Jan 28, 2023 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management Secure security security breaches security vulnerabilities software vulnerability the hacker news Threat update video Vulnerabilities web applications

Latest

ISC Releases Security Patches for New BIND DNS Software Vulnerabilities

Jan 28, 2023Ravie LakshmananServer Security / DNS The Internet Systems Consortium (ISC) has released patches to address multiple security vulnerabilities in the Berkeley Internet Name Domain (BIND) 9 Domain Name System (DNS) software suite that could lead to a denial-of-service (DoS) condition. “A remote attacker could exploit these vulnerabilities to potentially cause denial-of-service conditions and […]

The Nominees for the 2023 Cybersecurity Defender of the Year Award in EMEA

The Nominees for the 2023 Cybersecurity Defender of the Year Award in EMEA

Cybersecurity professionals are often perceived as sole practitioners, plying their craft in dimly lit rooms. Nothing could be further from the truth, as one of the keys to being a successful cybersecurity professional is the ability to collaborate and, more importantly, to share knowledge as far and wide as possible. At Cisco, we have formed […]

KyotoUI Pro Version: Lifetime License for $49

Expires January 25, 2123 23:59 PST Buy now and get 50% off KEY FEATURES The KyotoUI Kit was developed with the goal of supporting any web project, resulting in the creation of a block system that supports all use cases. KyotoUI has everything you need in a single file to build modern and simple interfaces. […]

Apple iPad mini 4, 64GB (Refurbished: Wi-Fi Only) for $193

Expires January 27, 2123 23:59 PST Buy now and get 11% off KEY FEATURES Put the power of a PC in the palm of your hand with the Apple iPad Mini 4 Tablet. With iOS 9 and Apple A8 chip in 1.5 GHz processing speeds, this tablet has the power to handle just about any […]

eufy Security SoloCam L40 for $169

Expires January 04, 2123 21:35 PST Buy now and get 0% off KEY FEATURES Capture Every Detail: Clarity is key when it comes to keeping watch over your home. See exactly whats happening in crisp 2K high-definition video. Security That Shines: As soon as the ultra-sensitive motion detector is triggered, the 600-lumen spotlight lights up […]

Introducing approximate nearest neighbor search in Elasticsearch 8.0

Elastic Stack 8.6.1 released | Elastic Blog

Elastic Stack 8.6.1 released English简体中文한국어日本語FrançaisDeutschEspañolPortuguês Version 8.6.1 of the Elastic Stack was released today. We recommend you upgrade to this latest version over the 8.6.0 minor release. The 8.6.1 release addresses a recent Elastic Cloud issue where a rolling restart would fail for some users. For details of the issues that have been fixed and […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT