gtag('config', 'G-0PFHD683JR');
Bitcoin

Lazarus Group transfer 400 ETH to Tornado Cash and distribute new harmful programs

the Lazaros Hacker GroupNorth Korea, its unlawful activities in the encrypted currency sector continue. Recently, the collective has been transferred 400 ETH, equivalent to about 750,000 dollarsThrough the confusion service Hurricane criticism. This method allows to hide the origin of the money, which makes it difficult to track transactions.

Lazarus Gonunders 400 Eth on Tornado Cash

Blockchain Security Company certificate Discover and inform this movement today only. According to experts, the money has a direct connection to the activities of the Lazarus group on the Bitcoin network.

Lazaros is one of the most dangerous piracy organizations in the encryption sector. Group Attack On the BYBIT exchange platformThat happened February 21where It was stolen 1.4 billion dollars In digital assets.

It is not the first blow to the group: In January, Lazaros is linked to another attack, which is the exchange PhenExIt appeared in that 29 million dollars It was stolen. Since the first months of 2024, North Korean infiltrators have continued to launder capital and develop new tools to attack encryption platforms.

Over the years, Lazaros was responsible for each other The largest attacks in history Criptovalute. Among them, and 600 million dollars attack on Ronin in 2022 Entry. According to data from the Blockchain analysis company seriesIn 2024, the North Korean infiltrators stole $ 1.3 billion in Criptovalute during 47 electronic attacksThe personality of that It doubles the value of thefts that occurred in 2023.

New harmful programs to attack developers

In addition to the continuous attacks on exchanges, the Lazaros Group began to spread New piracy tools to target developers and coded currency portfolios.

Cyber ​​security experts from the company socket Set Six new harmful packages It is designed to infiltrate the development environments, steal accreditation data, and extract important information about encrypted currencies. These malware also allow installation rear door In risk systems, the road paves the way for more attacks.

Targeted Node package director (NPM)One of the most used libraries to develop the Javascript app. To spread malware, Lazarus uses a well -known technology SummaryWhich includes the creation of harmful packages with names that are very similar to those legitimate libraries.

One of the specific malware, called “Beavertail”It was discovered inside these fake packages. Once installed, beavertail is able to steal Funds from the governor of the encrypted currencyWith special attention to Solana and exit governor.

until Most of the web browsers used, such as Google Chrome, Brave and FirefoxIt falls within the scope of the attack. In addition, malware works on McCos Systems, targeting Key series Files to access entry login data and sensitive developers’ data.

Technologies attributed to Lazaros

The final attribution of these new attacks to the Lazaros group is still a challenge to cybersecurity experts. However, the approved methodology shows similarities with the techniques used by the collective in the past.

Analysts in the Maqbali indicated that the methods used in these electronic attacks coincide with Known strategies From the Lazaros group. A mixture of typographical cooling, attacks on NPM packages, and targeting developers indicate a development in the group’s operating methods.

Lazaros continues to destabilize the ecosystem for encryption

The Lazaros group is still one of the most dangerous threats for the encrypted currency sector. Its ability to adapt and develop increasingly advanced technologies a A serious danger to exchanges, developers and encryption users.

Electronic attacks conducted by North Korean infiltrators not only cause Great economic lossesBut they also put the ecosystem of the entire digital currency at risk. With the use of washing tools such as Tornado Cash and the spread of advanced malware, Lazarus continues to evade the controls of the global security authorities.

Cyber ​​security experts recommend adopting effective protection measures to reduce the risks of inflammation and digital thefts, such as accurate monitoring of software packages and the use of advanced safety tools.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button