Market Cap: $3.1081T -1.930%
Volume(24h): $84.1523B 24.640%
  • Market Cap: $3.1081T -1.930%
  • Volume(24h): $84.1523B 24.640%
  • Fear & Greed Index:
  • Market Cap: $3.1081T -1.930%
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
Top News
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
bitcoin
bitcoin

$95948.582879 USD

-0.40%

ethereum
ethereum

$2733.981661 USD

-2.16%

xrp
xrp

$2.499032 USD

-2.66%

tether
tether

$1.000127 USD

0.01%

bnb
bnb

$644.381094 USD

-3.18%

solana
solana

$161.557113 USD

-5.85%

usd-coin
usd-coin

$0.999977 USD

0.00%

dogecoin
dogecoin

$0.233287 USD

-4.70%

cardano
cardano

$0.747213 USD

-3.58%

tron
tron

$0.245310 USD

1.12%

chainlink
chainlink

$16.936759 USD

-5.38%

sui
sui

$3.363904 USD

-0.65%

avalanche
avalanche

$24.153930 USD

-5.68%

stellar
stellar

$0.322611 USD

-3.09%

litecoin
litecoin

$125.230744 USD

-1.45%

Cryptocurrency News Articles

North Korean Hackers Stole $300 Million in Bitcoin From DMM Exchange, Police Say

Dec 24, 2024 at 04:40 pm

In May, approximately ¥48.2 billion JPY (approximately $306 million USD) worth of Bitcoin was unlawfully siphoned from DMM Bitcoin.

North Korean Hackers Stole $300 Million in Bitcoin From DMM Exchange, Police Say

Around ¥48.2 billion JPY (approximately $306 million USD) in Bitcoin was unlawfully siphoned from DMM Bitcoin in May. The Tokyo entity is a cryptocurrency exchange that operates under the major IT firm DMM.com.

On December 24, the National Police Agency (NPA) announced that the North Korean cyberattack group TraderTraitor was responsible for the attack. The investigation was carried out by the Metropolitan Police Department and NPA, in cooperation with the American Federal Bureau of Investigation (FBI).

TraderTraitor’s Phishing Tactics

According to the NPA, attackers from TraderTraitor posed as recruiters on the business-focused social networking site LinkedIn in late March. They contacted an employee of Ginco (Tokyo), which manages the cryptocurrency wallet system for DMM Bitcoin.

The attackers sent messages with URLs, attempting to entice the employee to click the link. When clicked, the link infected the employee’s computer with a virus.

After mid-May, the attackers used the employee’s credentials to gain unauthorized access to the Ginco system. They were able to modify the system, altering both the amounts and destinations of cryptocurrency transfers, which resulted in the theft.

Investigating the Theft

The stolen funds were eventually transferred to digital wallets controlled by TraderTraitor. Investigations confirmed that the accounts used to contact the employee and the connections for the malicious program were both managed by TraderTraitor.

In response, the NPA, together with the National Center of Incident Readiness and Strategy for Cybersecurity, issued a public attribution statement directly naming North Korea and TraderTraitor and condemning both entities. The NPA also issued a warning, highlighting the rise in cryptocurrency thefts attributed to North Korea.

Following the breach, DMM Bitcoin raised ¥55 billion with support from group companies to guarantee the full amount of the stolen funds to users. However, the company announced its closure on December 2 due to continuing restrictions on services.

Naming the Culprits

Public attribution is an effort to publicly name countries or organizations suspected of involvement in cyberattacks. It aims to prevent further damage and deter future attacks. The United States was the first to carry out public attribution in 2014. Japan has done so previously in cases involving China and North Korea. This case was Japan’s eighth instance.

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on Feb 24, 2025