BSV
$69.34
Vol 215.68m
0.31%
BTC
$98415
Vol 126259.81m
4.39%
BCH
$483.67
Vol 2206.9m
8.59%
LTC
$89.28
Vol 1409.44m
6.05%
DOGE
$0.38
Vol 9377.97m
1.8%
Getting your Trinity Audio player ready...

A new report from cybersecurity firm Kaspersky has uncovered a new hacking spree linked to notorious North Korean hackers using malware.

The report identified BlueNoroff, an arm of the state-sponsored Lazarus Group, as the principal suspect behind the recent attacks. BlueNoroff’s main targets appear to be digital asset startups, commercial banks, and venture capitalist (VC) firms in Europe and the Far East.

Kaspersky’s researchers note that BlueNoroff has been under the radar for most of the year, but in the last quarter, the group showed signs of activity. BlueNoroff created nearly 80 fake websites, mimicking popular VC firms and financial institutions, with the majority of sites focused on Japanese companies.

“The actor usually used fake domains such as cloud hosting services for hosting malicious documents or payloads,” said Kaspersky. “Most of the companies are Japanese companies, indicating the actor has a keen interest in Japanese markets.”

BlueNoroff’s latest attacks have shown a strong capability of bypassing Mark-of-the-Web by expanding file types and tweaking its latching strategies. Once access has been obtained, the malware interrupts digital asset transfers by changing the recipient’s address.

The report indicates that BlueNoroff’s malware can “push the transfer amount to the limit, essentially draining the account in a single transaction.”

It is unclear why Japanese firms are the hacking group’s target, especially given Japan’s expansive cybersecurity infrastructure tradition. Kaspersky notes that the hacking gang has been prolific, “stealing cryptocurrency worth millions” in the few months they began operations.

North Korean hackers have risen to notoriety in 2022 for their daring attacks on the virtual currency industry, stealing billions along the way. South Korea’s Intelligence Department blamed the state-sponsored hacking gangs for stealing over $600 million, while several post-mortems have fingered the country for security breaches.

Lazarus Group has been accused of participating in the hack of Axie Infinity that cost the platform losses of $620 million, which forced the United States Treasury’s Office of Foreign Assets Control (OFAC) to place the gang on the Specially Designated Nationals and Blocked Persons List (SDN List).

“Through our investigations, we were able to confirm Lazarus Group and APT38, cyber actors associated with North Korea, are responsible for the theft,” said the Federal Bureau of Investigation (FBI).

North Korea has turned its attention to cybercrime in the hopes of raising its foreign currency reserves amid stifling economic sanctions. Aspiring hackers are scouted around the country, with some sent to China for vocational training and others trained in North Korean universities.

Watch: The BSV Global Blockchain Convention presentation, Sentinel Node: Blockchain Tools to Improve Cybersecurity

Recommended for you

Sch. Post test

Lorem ipsum odor amet, consectetuer adipiscing elit. Elit torquent maximus natoque viverra cursus maximus felis. Auctor commodo aliquet himenaeos fermentum

November 7, 2024
Post with chaching

Lorem ipsum odor amet, consectetuer adipiscing elit. Accumsan mi at at semper libero pretium justo. Dictum parturient conubia turpis interdum

November 4, 2024
Advertisement