Here’s yet another development in cyber warfare.
Lazarus, the infamous North Korean hacker group, has set its sights on cryptocurrency firms, using advanced malware tactics through the professional network LinkedIn. This revelation comes after a warning from SlowMist, a blockchain security firm, indicating that Lazarus may be posing as blockchain developers on the lookout for crypto-related jobs.
According to SlowMist, Lazarus executes a meticulous plan, targeting unsuspecting LinkedIn users. Under the pretense of job inquiries, hackers coax victims into sharing personal information. Once contact is established, victims are encouraged to download seemingly harmless code, supposedly for troubleshooting purposes.
However, beneath this facade lies a malicious agenda. The seemingly harmless code hides sophisticated capabilities designed to steal funds and sensitive data from targets. Using a recurring algorithm set to activate at specific intervals, the malware carries out its primary function: indiscriminate data theft, funneling the stolen assets to servers controlled by the hackers.
Also Check Out : SHOCKING: UN Exposes North Korea’s $3 Billion Cybercrime Scheme
Unrelenting in their efforts, Lazarus continues to deploy this deceitful strategy, reminiscent of past schemes like posing as fictitious recruiters in December 2023. Victims are enticed with enticing tasks, including coding challenges, unknowingly granting hackers remote access to their networks.
Lazarus’ malicious activities extend far beyond LinkedIn manipulation. The group’s aggressive crypto heists have amassed over $3 billion in stolen digital assets since its inception. Notable breaches include the $37 million theft from CoinPaid and the staggering $625 million Ronin Bridge hack.
The Crypto Connection
To cover their tracks, Lazarus utilizes crypto mixing services to launder stolen funds back to North Korea. Allegations suggest that these funds support the regime’s military efforts, highlighting the link between cybercrime and geopolitical instability.
The international security councils, in this regard, recognize the connection between the operations of Lazarus Group and North Korea’s unauthorized weapons of mass destruction (WMD) programs. A report from a U.N. panel of experts published last month revealed that an estimated 40% of North Korea’s weapons of mass destruction (WMD) were funded through illicit cyber means mostly stolen crypto.
In response to this growing threat, the U.S. and its allies have implemented robust diplomatic measures. Sanctions targeting entities facilitating illicit activities, such as the crypto mixer Sinbad, underscore the firm stance against cyber-enabled crimes.
Also Read: Crypto Hack Report Q1 2024: Trends, Losses, and Recovery Efforts
Is your crypto safe? Don’t be a LinkedIn victim. Stay vigilant and update your security measures.
Story Highlights The live price of the VeChain token is . The VET price could…
WazirX, a major crypto exchange, is preparing to restart its operations after suffering a massive…
Story Highlights The live price of the PEPE meme coin is . Pepe coin price…
According to Pine Analytics Report over 15,000 Solana memecoin launches on Pump.fun have been manipulated…
As the crypto market begins to recover from recent uncertainty and volatility over macro factors,…
Coinbase is back in the legal spotlight, but this time, it's not the SEC knocking…