AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Cyberattacks and cryptocurrency laundering: North Korea's strategy

Sanction evasion strategies and social engineering techniques adopted

The North Korea-linked Lazarus Group uses technology to steal cryptocurrencies, bypassing sanctions. They stole around $3 billion in 6 years, taking advantage of DeFi systems to mask their tracks.

This pill is also available in Italian language

According to Record Future sources, it appears that North Korea is using its IT resources to conduct cyber attacks aimed at the cryptocurrency sector. Thanks to access to advanced technologies and privileged information, members of the North Korean elite would have developed the skills necessary to carry out such operations, evading the international sanctions imposed on their country.

Cyber-espionage operations

The latest US Treasury Department sanctions hit Sinbad, a virtual currency mixing platform associated with North Korea's Lazarus Group, used to launder illicitly sourced capital. The hacker group's actions have resulted in the theft of approximately $3 billion in crypto-assets over the past 6 years, with a peak of $1.7 billion recorded in 2022 alone, Chainalysis reports.

How North Korea affects DeFi protocols

A report from the US Department of Homeland Security (DHS) highlighted the Lazarus Group's ability to exploit DeFi protocols. These, by allowing transitions between cryptocurrencies without intermediaries, offer hackers the ability to mask their tracks, thus complicating attribution and tracking efforts of illicit financial activity.

The North Korean impact on the crypto industry

The cryptocurrency sector remains a major target for North Korean state cyber threat actors. Sophisticated tactics such as social engineering target employees of online exchange platforms, in order to propagate malware and empty liquid assets into wallets controlled by the DPRK. The shadow of the lack of regulations in the KYC (Know Your Customer) and AML (Anti-Money Laundering) fields hangs over exchange platforms, making mixing operations a still effective method for muddying the waters in attribution investigations, as highlighted Recorded Future in his report.

Follow us on Telegram for more pills like this

11/30/2023 12:39

Marco Verro

Last pills

Zero-day threat on Android devices: Samsung prepares a crucial updateFind out how Samsung is addressing critical Android vulnerabilities and protecting Galaxy devices from cyber threats

CrowdStrike: how a security update crippled the tech worldGlobal impact of a security update on banking, transportation and cloud services: what happened and how the crisis is being addressed

Checkmate the criminal networks: the Interpol operation that reveals the invisibleFind out how Operation Interpol exposed digital fraudsters and traffickers through extraordinary global collaboration, seizing luxury goods and false documents

Google Cloud security predictions for 2024: how AI will reshape the cybersecurity landscapeFind out how AI will transform cybersecurity and address geopolitical threats in 2024 according to Google Cloud report