header banner
Default

FBI: Millions of Bitcoin that have been stolen may soon be cashed in by North Korean hackers using the Lazarus exploit


Table of Contents

The infamous North Korean state-sponsored threat actor Lazarus Group is getting ready to dump $41 million worth of Bitcoin on the market, a new Federal Bureau of Investigation (FBI) report has claimed.

The U.S. federal law enforcement agency recently issued a warning, saying it observed Bitcoin stolen last year moving to different wallets:

"Over the last 24 hours, the FBI tracked cryptocurrency stolen by the Democratic People's Republic of Korea (DPRK) TraderTraitor-affiliated actors (also known as Lazarus Group and APT38)," the warning reads. "The FBI believes the DPRK may attempt to cash out the bitcoin worth more than $40 million dollars."

A warning to trading platforms

The FBI says it’s tracking approximately 1,580 Bitcoin as it’s being moved to six separate wallets:

3LU8wRu4ZnXP4UM8Yo6kkTiGHM9BubgyiG

39idqitN9tYNmq3wYanwg3MitFB5TZCjWu

3AAUBbKJorvNhEUFhKnep9YTwmZECxE4Nk

3PjNaSeP8GzLjGeu51JR19Q2Lu8W2Te9oc

3NbdrezMzAVVfXv5MTQJn4hWqKhYCTCJoB

34VXKa5upLWVYMXmgid6bFM4BaQXHxSUoL

The law enforcement agency is now urging cryptocurrency trading platforms and other firms dealing with the nascent technology to be careful when receiving Bitcoin and to analyze the blockchain data to make sure they’re not laundering money stolen in various hacks and scams. 

"The FBI will continue to expose and combat the DPRK's use of illicit activities—including cybercrime and virtual currency theft—to generate revenue for the regime," the FBI concluded.

Lazarus Group is one of the deadliest threat actors out there, whose campaigns netted hundreds of millions of dollars in stolen cryptocurrencies. The North Korean state-sponsored actor was responsible for the attack on the Ronin Network, which resulted in the theft of more than $600 million. Lazarus was also responsible for the attack on Harmony bridge, in which it walked away with roughly $100 million. 

In many instances, Lazarus impersonated large cryptocurrency firms and approached crypto developers on LinkedIn with seemingly lucrative job offers. Gullible developers were delivered malware, which allowed Lazarus’ operatives to infiltrate different networks, infect endpoints, and ultimately - steal money. Some researchers believe the money is being spent on North Korea’s weapons program.

  • Check out the best endpoint protection services

Via: BleepingComputer

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

Sources


Article information

Author: Timothy Burton DDS

Last Updated: 1702769403

Views: 937

Rating: 4.6 / 5 (84 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Timothy Burton DDS

Birthday: 1977-07-06

Address: USNV Moreno, FPO AA 92478

Phone: +3947785294585869

Job: Accountant

Hobby: Skydiving, Photography, Camping, Aquarium Keeping, Bird Watching, Billiards, Traveling

Introduction: My name is Timothy Burton DDS, I am a receptive, dedicated, risk-taking, capable, striking, rich, expert person who loves writing and wants to share my knowledge and understanding with you.