Market Cap: $2.6971T 0.080%
Volume(24h): $96.2402B -19.260%
  • Market Cap: $2.6971T 0.080%
  • Volume(24h): $96.2402B -19.260%
  • Fear & Greed Index:
  • Market Cap: $2.6971T 0.080%
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
Top News
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
bitcoin
bitcoin

$83431.384543 USD

1.12%

ethereum
ethereum

$1892.151092 USD

-0.03%

tether
tether

$0.999942 USD

0.02%

xrp
xrp

$2.278148 USD

3.41%

bnb
bnb

$578.808477 USD

3.91%

solana
solana

$127.225561 USD

2.56%

usd-coin
usd-coin

$1.000010 USD

0.01%

cardano
cardano

$0.727715 USD

-0.81%

dogecoin
dogecoin

$0.172018 USD

3.11%

tron
tron

$0.224692 USD

1.50%

pi
pi

$1.713684 USD

3.42%

unus-sed-leo
unus-sed-leo

$9.723476 USD

-1.81%

chainlink
chainlink

$13.386106 USD

2.19%

stellar
stellar

$0.274124 USD

7.50%

hedera
hedera

$0.198131 USD

-1.41%

Cryptocurrency News Articles

North Korea's Lazarus Group continues crypto laundering operations, deploying new malware to target developers

Mar 13, 2025 at 03:55 pm

On Mar. 13, blockchain security firm CertiK detected a deposit of 400 Ethereum (ETH), worth around $750,000, to Tornado Cash. The transaction was traced back to Lazarus's activity on the Bitcoin (BTC) network.

North Korea's Lazarus Group continues crypto laundering operations, deploying new malware to target developers

North Korea's notorious Lazarus Group, known for its persistent crypto laundering operations and cyberattacks, continues to deploy new malware to steal digital assets from developers.

The group's activity was evident as early as March 13, when CertiK, a leading blockchain security firm, detected a substantial deposit of 400 Ethereum (ETH), valued at approximately $750,000, into Tornado Cash.

Further analysis revealed that the ETH deposit was part of a broader transaction on the Bitcoin (BTC) network, directly linked to Lazarus Group's operations.

This activity follows the group's involvement in the massive $1.4 billion Bybit exploit, which unfolded on February 20.

Following the heist, Lazarus Group engaged in sophisticated efforts to launder the stolen BTC, aiming to obfuscate its trail and maximize gains.

To facilitate the exchange and transfer of such large cryptocurrency amounts, the hackers utilized decentralized exchanges (DEXs), such as THORChain (RUNE), which do not require identity verification.

This strategy aligns with Lazarus Group's broader goal of evading detection by cryptocurrency exchanges, which typically require Anti-Money Laundering (AML) procedures.

Reports from Token Terminal indicate that an astounding $2.91 billion flowed through ThorChain in just five days, beginning March 10.

This volume of transactions is significantly higher than usual, suggesting a concentrated effort to move and mix the stolen funds.

In another wave of cyber attacks, Lazarus Group has also deployed six new malicious software packages on the Node Package Manager (npm) platform.

npm is a critical tool used by web3 developers to manage and install JavaScript packages for their projects.

On March 11, security firm Socket published an analysis of the malware, highlighting its design to steal credentials and crypto wallet data.

The malware, which includes a package called BeaverTail, is disguised as legitimate JavaScript libraries using a common technique called typosquatting.

This method involves slightly altering the names of trusted software to deceive developers into downloading it.

The primary targets of the malware are stored credentials for Chrome, Brave, and Firefox browsers, as well as Solana and Exodus wallets.

The group has also been attempting to deceive crypto founders with fake Zoom calls.

Hackers are posing as venture capitalists (VCs) and sending crypto founders fake meeting links with claims of audio issues.

When victims download a supposed Zoom audio fix, malware is installed on their devices.

Security researchers have reported that several crypto founders have encountered these scams, confirming the scale of Lazarus Group's efforts.

According to Chainalysis, North Korean hackers stole over $1.3 billion in crypto across 47 attacks in 2024, more than double the amount stolen in 2023.

The majority of these funds were stolen from DeFi protocols, with smaller amounts taken from centralized exchanges and hot wallets.

As Lazarus Group continues its crypto heist and laundering operations, the broader blockchain community is urged to remain vigilant and prioritize robust security measures to mitigate the threat posed by these sophisticated hackers.

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on Mar 13, 2025