Binance Square
Lazarus
34,817 views
21 Posts
Hot
Latest
LIVE
Crypto JK
--
Infamous Hacker Group Lazarus Group Received 100 ETH From Euler Finance MinerA wallet address under the control of the protocol mining entity for Euler Finance recently transmitted 100 Ether ($170,515) to a wallet linked to the Lazarus Corporation's Ronin network attack. #Euler Finance, a decentralized finance (DeFi) platform that offers on-chain financing, was hacked with potential losses of up to $197 million, as previously reported. The Ronin network of Axie Infinity will be mined for $625 million by Lazarus Corporation in March 2022. This infamous hacker organization is also thought to have been engaged in other additional DeFi breaches in 2022. Lazarus Corporation was added to the list of companies that the US Treasury Department has designated in April. The theft of $100 million in cryptocurrency from Horizon Bridge was blamed on the Lazarus Group and North Korea's APT38 hacking group, according to the Federal Bureau of Investigation (FBI) in January. It is unclear if the #Lazarus Group is responsible for the attack or if they have any relation to the mining company Euler Finance. Euler Labs CEO Michael Bentley wrote about the "toughest day" of his life after Euler was hacked in a series of tweets that were published today. The site has "always been a privacy-conscious initiative," he tweeted in response to a user who sent a message claiming that Euler had received 10 audits from 6 different companies. 90% of the stolen money must be returned to Euler Financial within 24 hours, according to their request. Otherwise, the offender will be held accountable in court. Thus, the hacker gets to retain $19.6 million. Yet, the #hacker still needs to respond. The organization also solicited community support by offering a $1 million reward to anyone who can locate the hacker's hint. Since the attack, the token's value has decreased by more than 70%, from $6.1 to $1.9 right now.

Infamous Hacker Group Lazarus Group Received 100 ETH From Euler Finance Miner

A wallet address under the control of the protocol mining entity for Euler Finance recently transmitted 100 Ether ($170,515) to a wallet linked to the Lazarus Corporation's Ronin network attack.

#Euler Finance, a decentralized finance (DeFi) platform that offers on-chain financing, was hacked with potential losses of up to $197 million, as previously reported.

The Ronin network of Axie Infinity will be mined for $625 million by Lazarus Corporation in March 2022. This infamous hacker organization is also thought to have been engaged in other additional DeFi breaches in 2022.

Lazarus Corporation was added to the list of companies that the US Treasury Department has designated in April. The theft of $100 million in cryptocurrency from Horizon Bridge was blamed on the Lazarus Group and North Korea's APT38 hacking group, according to the Federal Bureau of Investigation (FBI) in January.

It is unclear if the #Lazarus Group is responsible for the attack or if they have any relation to the mining company Euler Finance.

Euler Labs CEO Michael Bentley wrote about the "toughest day" of his life after Euler was hacked in a series of tweets that were published today.

The site has "always been a privacy-conscious initiative," he tweeted in response to a user who sent a message claiming that Euler had received 10 audits from 6 different companies.

90% of the stolen money must be returned to Euler Financial within 24 hours, according to their request. Otherwise, the offender will be held accountable in court. Thus, the hacker gets to retain $19.6 million. Yet, the #hacker still needs to respond.

The organization also solicited community support by offering a $1 million reward to anyone who can locate the hacker's hint.

Since the attack, the token's value has decreased by more than 70%, from $6.1 to $1.9 right now.

3000 ETH Restored And Reimbursement From Euler HackersAfter numerous attempts to solicit community backing and recompense #Euler hackers, 3000 #ETH have now been restored. In the past, the scheme also required hackers to return 90% and keep 10% as a prize, which would have been the equivalent of around $20 million. #Hackers did not respond, therefore the project was forced to turn to the public for assistance and offer a $1 million reward to anyone who could discover the hacker's hint. Based on information made public by the security company #BlockSec today, the Euler attackers have begun returning funds, with 3,000 ETH (or roughly $5 million) restored so far. The BlockSec tweeted: “We observed that the #Euler attacker 0xb66cd966670d962C227B3EABA30a872DbFb995db is returning money to Euler finance now. 3000 Ether was returning so far." But yesterday, hacker Euler began acting oddly after sending 100 ETH to the infamous hacking collective #Lazarus Group. After last year's Ronin hack, he expressed concern that this might be the reason for the hundreds of millions of dollars' worth of hack. As was previously mentioned, on March 13, independent security researcher CIA Officer claimed on Twitter that the DeFi Euler Finance loan agreement was compromised for a total of about $197 million, consisting of 8,877,507.35 DAI, 849.14 WBTC, 34,413,863.42 USDC, and 85,818.26 stETH, while being monitored by the BlockSec security team. Euler Finance, a lending platform built on Ethereum, finished fundraising $32 million in June of last year. Variant, FTX Ventures, and Jump Crypto all took part in the investment, which was organized by Haun Ventures. Later this year, a DAO will be introduced, enabling users to exercise administrative rights over Euler Finance's growth and operations and choose how their community funds will be used, based on Euler.

3000 ETH Restored And Reimbursement From Euler Hackers

After numerous attempts to solicit community backing and recompense #Euler hackers, 3000 #ETH have now been restored.

In the past, the scheme also required hackers to return 90% and keep 10% as a prize, which would have been the equivalent of around $20 million. #Hackers did not respond, therefore the project was forced to turn to the public for assistance and offer a $1 million reward to anyone who could discover the hacker's hint.

Based on information made public by the security company #BlockSec today, the Euler attackers have begun returning funds, with 3,000 ETH (or roughly $5 million) restored so far. The BlockSec tweeted:

“We observed that the #Euler attacker 0xb66cd966670d962C227B3EABA30a872DbFb995db is returning money to Euler finance now. 3000 Ether was returning so far."

But yesterday, hacker Euler began acting oddly after sending 100 ETH to the infamous hacking collective #Lazarus Group. After last year's Ronin hack, he expressed concern that this might be the reason for the hundreds of millions of dollars' worth of hack.

As was previously mentioned, on March 13, independent security researcher CIA Officer claimed on Twitter that the DeFi Euler Finance loan agreement was compromised for a total of about $197 million, consisting of 8,877,507.35 DAI, 849.14 WBTC, 34,413,863.42 USDC, and 85,818.26 stETH, while being monitored by the BlockSec security team.

Euler Finance, a lending platform built on Ethereum, finished fundraising $32 million in June of last year. Variant, FTX Ventures, and Jump Crypto all took part in the investment, which was organized by Haun Ventures.

Later this year, a DAO will be introduced, enabling users to exercise administrative rights over Euler Finance's growth and operations and choose how their community funds will be used, based on Euler.
--
Bullish
U.S. authorities are moving to seize $2.7 million traced from #Lazarus Group hacks, which were funneled through #TornadoCash and other cryptocurrency mixers. These funds are linked to North Korean state-sponsored cyber activities, including significant crypto thefts. The Department of Justice's actions are part of broader efforts to crack down on illicit finance networks that exploit blockchain privacy features for money laundering and other illegal activities. #US #IllegalCrypto #TrendingTopic
U.S. authorities are moving to seize $2.7 million traced from #Lazarus Group hacks, which were funneled through #TornadoCash and other cryptocurrency mixers.
These funds are linked to North Korean state-sponsored cyber activities, including significant crypto thefts. The Department of Justice's actions are part of broader efforts to crack down on illicit finance networks that exploit blockchain privacy features for money laundering and other illegal activities.
#US #IllegalCrypto #TrendingTopic
North Korea Behind 2019 Upbit Hack: South Korean authorities have officially confirmed that North Korean hacker groups #Lazarus and #Andariel were responsible for the $50 million Upbit cryptocurrency hack in 2019. The stolen Ethereum ($ETH ) has since increased in value to over $1 billion. This marks the first time a South Korean agency has publicly linked #NorthKorea to a cryptocurrency theft. The investigation involved tracking cryptocurrency flows, analyzing IP addresses, and examining language and materials provided by the #FBI . While the exact hacking methods remain undisclosed to prevent future attacks, the stolen ETH was laundered through various exchanges, with a significant portion sold on exchanges allegedly operated by North Korea. In addition to this revelation, Upbit is facing scrutiny for potential Know Your Customer (#KYC ) violations, which could result in substantial fines and licensing issues.
North Korea Behind 2019 Upbit Hack:
South Korean authorities have officially confirmed that North Korean hacker groups #Lazarus and #Andariel were responsible for the $50 million Upbit cryptocurrency hack in 2019. The stolen Ethereum ($ETH ) has since increased in value to over $1 billion.
This marks the first time a South Korean agency has publicly linked #NorthKorea to a cryptocurrency theft. The investigation involved tracking cryptocurrency flows, analyzing IP addresses, and examining language and materials provided by the #FBI .
While the exact hacking methods remain undisclosed to prevent future attacks, the stolen ETH was laundered through various exchanges, with a significant portion sold on exchanges allegedly operated by North Korea.
In addition to this revelation, Upbit is facing scrutiny for potential Know Your Customer (#KYC ) violations, which could result in substantial fines and licensing issues.
📌 Circle faces criticism from #blockchain investigator #ZachXBT for its slow response in blacklisting funds linked to the 🇰🇵 North Korean hacking group #Lazarus .
📌 Circle faces criticism from #blockchain investigator #ZachXBT for its slow response in blacklisting funds linked to the 🇰🇵 North Korean hacking group #Lazarus .
🕵️ According to blockchain investigator ZachXBT, North Korea's Lazarus Group was implicated in laundering $200 million through cryptocurrency hacks between August 2020 and October 2023. 💰 The group employed sophisticated laundering techniques such as coin mixers and peer-to-peer exchanges to obfuscate the origins of stolen funds from over 25 breaches across various blockchain platforms. 🔍 ZachXBT's report revealed that Lazarus utilized the Ethereum mixer Tornado Cash and the Bitcoin-based ChipMixer extensively. 💸 Additionally, Lazarus converted significant amounts of cryptocurrency into fiat currency via peer-to-peer platforms, with linked accounts receiving $44 million. Usernames "asyGoatfish351" and "airJunco470" were identified in these transactions. 💼 Known for orchestrating some of the largest digital heists, Lazarus Group's thefts total over $3 billion, with the United Nations Security Council claiming these funds support North Korea's weaponry initiatives, highlighting broader security risks. #Lazarus #LazarusGroupExposed
🕵️ According to blockchain investigator ZachXBT, North Korea's Lazarus Group was implicated in laundering $200 million through cryptocurrency hacks between August 2020 and October 2023.

💰 The group employed sophisticated laundering techniques such as coin mixers and peer-to-peer exchanges to obfuscate the origins of stolen funds from over 25 breaches across various blockchain platforms.

🔍 ZachXBT's report revealed that Lazarus utilized the Ethereum mixer Tornado Cash and the Bitcoin-based ChipMixer extensively.

💸 Additionally, Lazarus converted significant amounts of cryptocurrency into fiat currency via peer-to-peer platforms, with linked accounts receiving $44 million. Usernames "asyGoatfish351" and "airJunco470" were identified in these transactions.

💼 Known for orchestrating some of the largest digital heists, Lazarus Group's thefts total over $3 billion, with the United Nations Security Council claiming these funds support North Korea's weaponry initiatives, highlighting broader security risks.

#Lazarus #LazarusGroupExposed
Revival in the Crypto Scene: North Korea's Lazarus Group Also Makes a Comeback1. After a period of quiet, the notorious Lazarus Group is back in action, moving $1.2 million in Bitcoin. 2. The Lazarus Group employed a mixer to transfer the Bitcoin, directing a portion to an inactive address and splitting the rest. 3. Known for the $600 million Axie Infinity attack, this state-backed group is believed to have stolen a staggering $700 million in 2023. 4. The year 2024 has witnessed several notable hacks, such as $4.5 million from Radiant Capital and $82 million from Orbit Chain. 5. The Lazarus Group's recent activities intensify concerns about crypto security, leaving the community uncertain about the next potential target. In a surprising turn of events, The Lazarus Group, a notorious hacking group believed to be backed by North Korea, has re-emerged after a period of silence. On January 8, 2023, the state-funded hackers orchestrated a significant transfer of more than $1 million in Bitcoin, using what appeared to be a cryptocurrency mixer. The move, detected by Arkham Intelligence, involved the shifting of 27.371 BTC, approximately $1.2 million at the time. Interestingly, Arkham Intelligence also noted a subsequent transfer of 3.343 BTC (almost $150,000) to an old, inactive address. The remaining funds were then fragmented and distributed across multiple addresses. Post these transactions, the Lazarus Group's Bitcoin holdings were evaluated at $79 million, leaving the crypto community speculating on the group's motives and whether it's a prelude to future cyberattacks. The Lazarus Group's history is marked by cyberattacks believed to be sponsored by the North Korean government. Responsible for a third of all cyberattacks in 2023, according to a Chainalysis study, the group has employed various tactics such as phishing, brute force attacks, and the creation of malicious websites to pilfer approximately $700 million. Notably, the gang executed a significant heist in March 2022, exploiting a vulnerability in the Axie Infinity bridge contract, absconding with over $600 million in Ether and USD Coin. As 2024 unfolds, the cryptocurrency space has already witnessed significant security breaches. Radiant Capital fell victim to a $4.5 million flash loan attack, while the Orbit chain experienced multiple attacks totaling $82 million in stolen assets, including Tether, USD Coin, Ether, Wrapped Bitcoin, and DAI. With almost $100 million pilfered in the first week of the year, the cryptocurrency community is on edge, wondering if The Lazarus Group's recent actions signal an impending assault on another protocol. While the crypto community anxiously speculates on the group's intentions, it is crucial to note that uncertainties abound. The Lazarus Group's recent maneuvers may or may not foreshadow a more extensive campaign. Nevertheless, caution prevails, with the community holding its breath to discern which crypto protocol may be the next target. Disclaimer: Voice of Crypto strives to provide accurate and current information, but it disclaims responsibility for any omissions or inaccuracies. Given the volatility of cryptocurrencies, individuals are encouraged to conduct thorough research and make informed financial decisions. #Lazarus #Bitcoin2024 #Bitcoin #Crypto2024 #cryptocurrency

Revival in the Crypto Scene: North Korea's Lazarus Group Also Makes a Comeback

1. After a period of quiet, the notorious Lazarus Group is back in action, moving $1.2 million in Bitcoin.
2. The Lazarus Group employed a mixer to transfer the Bitcoin, directing a portion to an inactive address and splitting the rest.
3. Known for the $600 million Axie Infinity attack, this state-backed group is believed to have stolen a staggering $700 million in 2023.
4. The year 2024 has witnessed several notable hacks, such as $4.5 million from Radiant Capital and $82 million from Orbit Chain.
5. The Lazarus Group's recent activities intensify concerns about crypto security, leaving the community uncertain about the next potential target.
In a surprising turn of events, The Lazarus Group, a notorious hacking group believed to be backed by North Korea, has re-emerged after a period of silence. On January 8, 2023, the state-funded hackers orchestrated a significant transfer of more than $1 million in Bitcoin, using what appeared to be a cryptocurrency mixer. The move, detected by Arkham Intelligence, involved the shifting of 27.371 BTC, approximately $1.2 million at the time.
Interestingly, Arkham Intelligence also noted a subsequent transfer of 3.343 BTC (almost $150,000) to an old, inactive address. The remaining funds were then fragmented and distributed across multiple addresses. Post these transactions, the Lazarus Group's Bitcoin holdings were evaluated at $79 million, leaving the crypto community speculating on the group's motives and whether it's a prelude to future cyberattacks.
The Lazarus Group's history is marked by cyberattacks believed to be sponsored by the North Korean government. Responsible for a third of all cyberattacks in 2023, according to a Chainalysis study, the group has employed various tactics such as phishing, brute force attacks, and the creation of malicious websites to pilfer approximately $700 million. Notably, the gang executed a significant heist in March 2022, exploiting a vulnerability in the Axie Infinity bridge contract, absconding with over $600 million in Ether and USD Coin.
As 2024 unfolds, the cryptocurrency space has already witnessed significant security breaches. Radiant Capital fell victim to a $4.5 million flash loan attack, while the Orbit chain experienced multiple attacks totaling $82 million in stolen assets, including Tether, USD Coin, Ether, Wrapped Bitcoin, and DAI. With almost $100 million pilfered in the first week of the year, the cryptocurrency community is on edge, wondering if The Lazarus Group's recent actions signal an impending assault on another protocol.
While the crypto community anxiously speculates on the group's intentions, it is crucial to note that uncertainties abound. The Lazarus Group's recent maneuvers may or may not foreshadow a more extensive campaign. Nevertheless, caution prevails, with the community holding its breath to discern which crypto protocol may be the next target.
Disclaimer: Voice of Crypto strives to provide accurate and current information, but it disclaims responsibility for any omissions or inaccuracies. Given the volatility of cryptocurrencies, individuals are encouraged to conduct thorough research and make informed financial decisions.
#Lazarus #Bitcoin2024 #Bitcoin #Crypto2024 #cryptocurrency
Lazarus Group Targets Crypto Firms: North Korean #hackers are targeting cryptocurrency firms through LinkedIn. Fake Profiles & Phishing: They create fake profiles of industry figures to launch phishing attacks. Malicious Links & Malware: Clicking on fake links steals data and assets. Evolving Tactics: Beyond fake profiles, they use job offers and investment scams. Industry Needs Action: Crypto firms need stricter security and awareness. #Lazarus Attacks & Geopolitics: These attacks fund North Korea's weapons development. Adapting to Cybercrime: Crypto firms must stay ahead of evolving cybercriminal tactics. #NorthKoreaHackers #Korea #cryptoniteuae
Lazarus Group Targets Crypto Firms: North Korean #hackers are targeting cryptocurrency firms through LinkedIn.

Fake Profiles & Phishing: They create fake profiles of industry figures to launch phishing attacks.

Malicious Links & Malware: Clicking on fake links steals data and assets.

Evolving Tactics: Beyond fake profiles, they use job offers and investment scams.

Industry Needs Action: Crypto firms need stricter security and awareness.

#Lazarus Attacks & Geopolitics: These attacks fund North Korea's weapons development.

Adapting to Cybercrime: Crypto firms must stay ahead of evolving cybercriminal tactics.

#NorthKoreaHackers #Korea #cryptoniteuae
Lazarus Group Exploits Chrome Vulnerability with Fake NFT GameThe North Korean hacker group Lazarus Group created and promoted a fake game designed to drain users' wallets. Hackers Exploit Chrome Vulnerability Lazarus Group, a notorious North Korean hacking group, used a fake blockchain-based game to exploit a "zero-day" vulnerability in Google Chrome. This attack allowed hackers to install spyware that stole wallet login credentials. Analysts from Kaspersky Labs discovered the exploitation in May and promptly reported it to Google, which then fixed the issue. High Risk of Playing Fake Game The hackers developed a fully playable multiplayer battle game called DeTankZone or DeTankWar, which used #NFTs. as in-game tanks for global competitions. The game was promoted on platforms like LinkedIn and X (formerly Twitter). Users were infected simply by visiting the website, without needing to download the game. Hackers deployed malware known as Manuscrypt, along with a newly discovered vulnerability in the V8 JavaScript engine. This vulnerability was the seventh zero-day issue found in Chrome in 2024. Targeted Attack on Users Worldwide Boris Larin, a senior security expert at Kaspersky, stated that the hackers invested significant effort into this campaign. He suggested that the true impact could be far-reaching, potentially affecting users and businesses globally. The fake game was first noticed by Microsoft Security in February. The hackers removed the exploit before Kaspersky could analyze it. Nevertheless, Kaspersky reported the issue to Google, which patched the vulnerability before hackers could reuse it. North Korea and #Cryptocurrencies Zero-day vulnerabilities are particularly dangerous because no immediate patch exists. In this case, it took Google 12 days to fix the Chrome vulnerability. Earlier this year, another Chrome vulnerability was exploited by a different North Korean hacking group to target cryptocurrency holders. Lazarus Group has a long-standing focus on cryptocurrencies. Between 2020 and 2023, the group laundered over $200 million in crypto from 25 hacks, according to crypto-crime analyst ZachXBT. History of Lazarus Group Attacks The U.S. Department of the Treasury stated that #Lazarus Group was responsible for the attack on Ronin Bridge in 2022, which netted over $600 million in cryptocurrency. #cybersecurity firm Recorded Future discovered that North Korean #hackers stole more than $3 billion worth of cryptocurrency between 2017 and 2023. Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Lazarus Group Exploits Chrome Vulnerability with Fake NFT Game

The North Korean hacker group Lazarus Group created and promoted a fake game designed to drain users' wallets.
Hackers Exploit Chrome Vulnerability
Lazarus Group, a notorious North Korean hacking group, used a fake blockchain-based game to exploit a "zero-day" vulnerability in Google Chrome. This attack allowed hackers to install spyware that stole wallet login credentials. Analysts from Kaspersky Labs discovered the exploitation in May and promptly reported it to Google, which then fixed the issue.
High Risk of Playing Fake Game
The hackers developed a fully playable multiplayer battle game called DeTankZone or DeTankWar, which used #NFTs. as in-game tanks for global competitions. The game was promoted on platforms like LinkedIn and X (formerly Twitter). Users were infected simply by visiting the website, without needing to download the game.
Hackers deployed malware known as Manuscrypt, along with a newly discovered vulnerability in the V8 JavaScript engine. This vulnerability was the seventh zero-day issue found in Chrome in 2024.
Targeted Attack on Users Worldwide
Boris Larin, a senior security expert at Kaspersky, stated that the hackers invested significant effort into this campaign. He suggested that the true impact could be far-reaching, potentially affecting users and businesses globally.
The fake game was first noticed by Microsoft Security in February. The hackers removed the exploit before Kaspersky could analyze it. Nevertheless, Kaspersky reported the issue to Google, which patched the vulnerability before hackers could reuse it.

North Korea and #Cryptocurrencies
Zero-day vulnerabilities are particularly dangerous because no immediate patch exists. In this case, it took Google 12 days to fix the Chrome vulnerability.
Earlier this year, another Chrome vulnerability was exploited by a different North Korean hacking group to target cryptocurrency holders.

Lazarus Group has a long-standing focus on cryptocurrencies. Between 2020 and 2023, the group laundered over $200 million in crypto from 25 hacks, according to crypto-crime analyst ZachXBT.
History of Lazarus Group Attacks
The U.S. Department of the Treasury stated that #Lazarus Group was responsible for the attack on Ronin Bridge in 2022, which netted over $600 million in cryptocurrency.
#cybersecurity firm Recorded Future discovered that North Korean #hackers stole more than $3 billion worth of cryptocurrency between 2017 and 2023.

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
The U.S. Set to Seize $2.7 Million from Lazarus Hacks via Tornado Cash and Other Mixers.The U.S. Department of Justice has filed a lawsuit to seize $2.67 million in cryptocurrency, including Tether (USDT) and Avalanche-bridged Bitcoin (BTC.b). The government claims these funds were frozen during attempts by North Korean hackers to launder stolen assets. Recovered Funds from Deribit and Stake.com Hacks The U.S. government successfully recovered $1.7 million in Tether from the hack of the Deribit crypto exchange in November 2022, and $970,000 in BTC.b from the hack of the online casino Stake.com in September 2023. Lazarus Group and Money Laundering Through Tornado Cash The first lawsuit, filed by U.S. prosecutors, focuses on how the Lazarus Group laundered stolen funds from the Deribit hack using the crypto mixer #TornadoCash . Part of the $28 million stolen was tracked, eventually ending up as Tether on the Tron blockchain. U.S. authorities traced the funds by analyzing similarities between several Ethereum wallets that made near-simultaneous transactions and used the same cross-chain bridges. Hackers attempted to launder the stolen funds in three waves. While the first two attempts were blocked when law enforcement froze some of the funds, the third attempt succeeded. U.S. authorities managed to freeze about $1.7 million in USDT from five wallets. Stake.com, Sinbad, and Yonmix Bitcoin Mixers The second lawsuit concerns the Lazarus Group’s $41 million hack of Stake.com, where the #hackers laundered the funds in three phases: converting funds to BTC via the Avalanche Bridge, moving the stolen BTC through mixers like Sinbad and Yonmix, and eventually converting BTC to #Stablecoins such as USDT. Authorities were able to freeze some funds during the first and third phases. In the first phase, authorities froze funds from multiple transactions that involved converting stolen assets into native tokens like Polygon's MATIC and Binance Smart Chain’s BNB, before bridging them into Bitcoin through the Avalanche Bridge. Despite government intervention, hackers managed to move most of the stolen assets to the Bitcoin blockchain. Once on #bitcoin☀️ , they used the mixers Sinbad and Yonmix, which operate similarly to Tornado Cash on Ethereum, to further obscure the funds' movements. However, authorities were only able to recover a small amount, approximately $6,270 worth of Bitcoin. Lazarus Group Remains Active While law enforcement has improved its ability to trace and seize illegal cryptocurrency, the #Lazarus Group remains active. Recently, they were implicated in an attack on the Indian crypto exchange WazirX, in which they allegedly stole $230 million worth of assets.

The U.S. Set to Seize $2.7 Million from Lazarus Hacks via Tornado Cash and Other Mixers.

The U.S. Department of Justice has filed a lawsuit to seize $2.67 million in cryptocurrency, including Tether (USDT) and Avalanche-bridged Bitcoin (BTC.b). The government claims these funds were frozen during attempts by North Korean hackers to launder stolen assets.
Recovered Funds from Deribit and Stake.com Hacks
The U.S. government successfully recovered $1.7 million in Tether from the hack of the Deribit crypto exchange in November 2022, and $970,000 in BTC.b from the hack of the online casino Stake.com in September 2023.
Lazarus Group and Money Laundering Through Tornado Cash
The first lawsuit, filed by U.S. prosecutors, focuses on how the Lazarus Group laundered stolen funds from the Deribit hack using the crypto mixer #TornadoCash . Part of the $28 million stolen was tracked, eventually ending up as Tether on the Tron blockchain. U.S. authorities traced the funds by analyzing similarities between several Ethereum wallets that made near-simultaneous transactions and used the same cross-chain bridges.
Hackers attempted to launder the stolen funds in three waves. While the first two attempts were blocked when law enforcement froze some of the funds, the third attempt succeeded. U.S. authorities managed to freeze about $1.7 million in USDT from five wallets.
Stake.com, Sinbad, and Yonmix Bitcoin Mixers
The second lawsuit concerns the Lazarus Group’s $41 million hack of Stake.com, where the #hackers laundered the funds in three phases: converting funds to BTC via the Avalanche Bridge, moving the stolen BTC through mixers like Sinbad and Yonmix, and eventually converting BTC to #Stablecoins such as USDT. Authorities were able to freeze some funds during the first and third phases.

In the first phase, authorities froze funds from multiple transactions that involved converting stolen assets into native tokens like Polygon's MATIC and Binance Smart Chain’s BNB, before bridging them into Bitcoin through the Avalanche Bridge. Despite government intervention, hackers managed to move most of the stolen assets to the Bitcoin blockchain. Once on #bitcoin☀️ , they used the mixers Sinbad and Yonmix, which operate similarly to Tornado Cash on Ethereum, to further obscure the funds' movements. However, authorities were only able to recover a small amount, approximately $6,270 worth of Bitcoin.
Lazarus Group Remains Active
While law enforcement has improved its ability to trace and seize illegal cryptocurrency, the #Lazarus Group remains active. Recently, they were implicated in an attack on the Indian crypto exchange WazirX, in which they allegedly stole $230 million worth of assets.
--
Bearish
#Hackers.from.this.country steal $600 million in cryptocurrencies in 2023 🔥 _Once a target is compromised, #Lazarus uses the compromised private keys and seed phrases. They are the main aspects of storing cryptocurrencies, to initiate unauthorized #blockchain.transactions . In most cases, stolen assets are distributed across several wallets. A portion of it is eventually deposited into a cryptocurrency mixer such as Tornado Cash or #Sinbad. . North Korean hackers are also cashing out their funds via OTC desks, where they exchange currencies such as the stablecoin Tether USDT for fiat currencies. The company has reportedly strengthened its vigilance against money laundering and is working with the US Treasury Department to combat illicit financing. Protocols like Tornado Cash, Sinbad, and Blender.io that allow users to obfuscate transactions have also been sanctioned by the Treasury Department's Office of Foreign Assets Control (OFAC). OFAC's sanctions support a greater "whole-of-government" approach to Lazarus and its operations. Which authorities believe funnels profits into North Korea's nuclear program. The Financial Crimes Enforcement Network has described cryptocurrency mixers as a threat to national security. While the United States involved other world governments. Authorities from the United States, South Korea, and Japan announced a tripartite initiative to address cryptocurrency money laundering by Lazarus and other DPRK-financed actors. #continued To see more breaking news 🚀🚰✅
#Hackers.from.this.country steal $600 million in cryptocurrencies in 2023 🔥

_Once a target is compromised, #Lazarus uses the compromised private keys and seed phrases. They are the main aspects of storing cryptocurrencies, to initiate unauthorized #blockchain.transactions . In most cases, stolen assets are distributed across several wallets. A portion of it is eventually deposited into a cryptocurrency mixer such as Tornado Cash or #Sinbad. . North Korean hackers are also cashing out their funds via OTC desks, where they exchange currencies such as the stablecoin Tether USDT for fiat currencies. The company has reportedly strengthened its vigilance against money laundering and is working with the US Treasury Department to combat illicit financing. Protocols like Tornado Cash, Sinbad, and Blender.io that allow users to obfuscate transactions have also been sanctioned by the Treasury Department's Office of Foreign Assets Control (OFAC).
OFAC's sanctions support a greater "whole-of-government" approach to Lazarus and its operations. Which authorities believe funnels profits into North Korea's nuclear program. The Financial Crimes Enforcement Network has described cryptocurrency mixers as a threat to national security. While the United States involved other world governments. Authorities from the United States, South Korea, and Japan announced a tripartite initiative to address cryptocurrency money laundering by Lazarus and other DPRK-financed actors.

#continued To see more breaking news 🚀🚰✅
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number