The North Korean hackers responsible for the theft of $100 million in virtual currency in 2022, have attempted to launder those funds through various crypto transactions. According to the FBI, the hackers known as Lazarus Group (a.k.a. APT28), executed the Harmony’s Horizon bridge attack followed by the massive virtual currency theft on June 24, 2022.
North Korean threat actors have been very active in the past few years, with an estimated $400 million of cryptocurrency stolen in 2021 alone. One of the most active threat actors, the Lazarus Group, is also behind one of the biggest crypto thefts in 2022.
APT28 tried to launder a large part of the money stolen in 2022 through a privacy protocol, but their efforts were only partially successful, the FBI explained.
“On Friday, January 13, 2023, North Korean cyber actors used RAILGUN, a privacy protocol, to launder over $60 million worth of ethereum (ETH) stolen during the June 2022 heist,” the FBI said. “A portion of this stolen ethereum was subsequently sent to several virtual asset service providers and converted to bitcoin (BTC). A portion of these funds were frozen, in coordination with some of the virtual asset service providers.”
The initial attack was only possible because the attackers persuaded their victims, using an assortment of communication platforms, to download trojanized cryptocurrency applications on Windows or macOS, in a campaign dubbed “TraderTraitor.”
Using the newly obtained access, the North Korean hackers propagated malware across the victim’s network environment, stole private keys and exploited other security gaps. The result of the intrusion let them initiate fraudulent blockchain transactions.
The initial analysis by Binance’s Changpeng Zhao revealed that the authorities managed to recover around $3 million before the transfers were blocked.
___
If this information is helpful to you read our blog for more interesting and useful content, tips, and guidelines on similar topics. Contact the team of COMPUTER 2000 Bulgaria now if you have a specific question. Our specialists will be assisting you with your query.
Content curated by the team of COMPUTER 2000 on the basis of news in reputable media and marketing materials provided by our partners, companies, and other vendors.
Follow us to learn more
CONTACT US
Let’s walk through the journey of digital transformation together.