Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » DPRK HACCERS stole $ 137 million from TRON users in one -day phishing attack
Global Security

DPRK HACCERS stole $ 137 million from TRON users in one -day phishing attack

AdminBy AdminApril 23, 2025No Comments4 Mins Read
TRON Phishing Attack
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


April 23, 2025Red LakshmananMalicious software / cryptocurrency

Phishing -ataka tron

Multiple threatening clusters related to North Korea (aka the Democratic People’s Republic of Korea or the DPRK) were associated with attacks aimed at organizations and persons in Web3 and cryptocurrency.

‘The main attention on the Web3 and the cryptocurrency appears – Note In his M-Trends report for 2025, Hacker News shared.

“These activities are aimed at obtaining financial income, the financing of the North Korean mass destruction program and other strategic assets.”

Cybersecurity firm said DPRK-NEXUSEUS DEGROM Actor has developed custom tools written in different languages ​​such as Golang, C ++ and Rust, and are able to infect Windows, Linux and Macos operating systems.

At least three clusters were found to be monitored as UNC1069, UNC4899 and UNC5342, aimed at the members of the cryptocurrency and blockchain development community, in particular, focusing on developers working on projects on the Internet to get illegal access to the internet and for organizations. use them.

A brief description of each threat subjects is below –

  • UNC1069 (Active with at least April 2018), which is aimed at various industries for financial benefits using social engineering, sending fake meetings and presenting as investors from reputable companies in Telegram to access digital assets and cryptocurrency
  • UNC4899 (Active since 2022), which is known by organizations on work with the topics that deliver malicious software within the intended coding task and previously put compromises of supply chains for financial income (covered Jade Sno, Pukhong, slow pipes, tradeTraitor and unc489)
  • UNC5342 (Active since January 2024), which is also known for using work related to cheat developers to launch malware (intersecting with contagious interview, depeptivevevevelment, dev#popper and famous Cholima)

Another North Korean actor threatening notes UNC4736The allocated Blockchain industry by trajoning the trade software and has been associated with a cascade supply chain attack at 3CX in early 2023.

Cybersecurity

Mandiant said he also identified a separate cluster of North Korean activity, which is traced as the UNC3782, which conducts large -scale phishing companies aimed at the cryptocurrency sector.

“In 2023, the UNC3782 conducted phishing -operations against TRON users and handed over $ 137 million in one day,” the company said. “UNC3782 launched the company in 2024 to aim at Solana users and send them to pages that contained cryptocurrencies.”

Theft of cryptocurrencies is one of the several funds that the DPRK pursues in international sanctions Sidestep. At least since 2022, an active cluster threatened, called UNC5267 He sent thousands of his citizens to ensure remote work in companies in the US, Europe and Asia, mainly living in China and Russia.

It is said that the main piece of IT workers is related to 313 total ammunition department, which is responsible for the North Korea nuclear program.

North Korean IT -workers except use stolen identityUsed fully fabricated characters to support their activities. It is also supplemented by the use of Deepfake technology in real time to create compelling synthetic identity during the interview.

“This offers two key prompt preferences. First, it allows one operator several times interviews in the same position using different synthetic – Note.

‘By -second, it helps operatives avoid identification and adding security and Wanted messages. In conjunction, this helps DPRK workers enjoy expanded surgical safety and reduced severity. “

A DPRK IT -WORK SHOEM“

Cybersecurity

“They also strengthened the demanding companies against employers, and they switched to operations in corporate virtual labor starts, networks and servers,” “Jami Coler and Michael Barnhart” Google (GTIG) and Michael Barnhart – Note In the report last month.

“Now they use their privileged access to the theft and allow cyberattacks except for profit for North Korea.”

In 2024, Mandiant stated that he had determined the suspicious IT worker of the DPRK, using at least 12 characters, seeking work in the US and Europe, emphasizing the effectiveness of such non -traditional methods for penetration of organizations under false affiliations.

“At least, in one case, two false identities were considered to work in the American company, and one IT worker DPRK won over the second,” the company said. In another case, “Four suspected IT workers of the DPRK were employed during the 12-month period in one organization.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.