Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Bybit Hack is traced to the safety {purse} Attack of the supply chain while exploiting North Korean hackers
Global Security

Bybit Hack is traced to the safety {purse} Attack of the supply chain while exploiting North Korean hackers

AdminBy AdminFebruary 27, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


February 27, 2025Red LakshmananCybercrime / cryptocurrency

The Federal Bureau of US Investigation (FBI) has officially linked A record of 1.5 billion BYBIT Hack to North Korean subjects threats as CEO Ben Zhou declared “War against Lazarus.”

The agency stated that the Democratic People’s Republic of Korea (North Korea) is responsible for the theft of virtual assets from the cryptocurrency exchange, attributing it to a certain cluster, which it monitors as a Tradertraitor, which is also monitored as neffe wet, slow course and UNC4899.

“Actors Tradertraitor are ongoing and transformed some stolen assets into bitcoin and other virtual assets divorced by thousands of addresses on multiple blockchains,” FBI – Note. “It is expected that these assets will be washed and eventually converted into Fiat currency.”

It is worth noting that cluster tradeTraitor was Previously involved Japanese and US authorities in theft of cryptocurrency worth $ 308 million from Cryptocurrency DMM Bitcoin in May 2024.

Cybersecurity

The threatening actor is known for focusing on the Web3 sector, often deceiving the victims in loading cryptocurrencies, which are conducted on malicious programs to facilitate the theft. Alternatively, it was also revealed that the organization of social engineering companies with themes that lead to the deployment of malicious packages of NPM.

At a time when it is at a time, there launched the Bounty program To help collect stolen funds, calling for refusing to cooperate in probe and help freeze assets.

“The stolen funds have been transferred to unauthorized or impaired directions such as exchanges, mixers or bridges, or are transformed into stable frozen,” the statement reads. “We demand cooperation with all participants to either freeze the funds or provide updates about their movement so that we can continue to trace.”

A company based in Dubai also has general The conclusions of two investigations conducted by Signia and Verichen, binding the hacking with the Lazar group.

“The investigation into the criminalist of the three hosts of the signatories suggests that the root cause of the attack is a malicious code that comes from the safe infrastructure {Wallet},” Signia said.

VericHains noted that “a benign javaScript file of app.safe.global appears to be replaced by a malicious code on February 19, 2025 at 15:29 UTC, in particular, focused on Multisig Coll of Bybit Etherum”, and that ” February, 2025, at 14:13.

It is suspected that the AWS S3 or Cloudfront/API Safe.global account is probably a leak or a violation that opens the way to attack the supply chain.

In a separate statement, the Multisig Wallet Safe {Wallet} platform said the attack was carried out by compromising a safe machine developer {Wallet}, which touched upon the Bybit account. The company further noted that it had implemented additional security measures to mitigate the attack vector.

Attack “was reached through a compromised machine of a safe developer {wallet}, which has led to a proposal of a disguised malicious deal” – Note. “Lazarus is a state supported by a North Korean hacking group, which is well known for complex social engineering attacks on developers’ powers, sometimes in combination with zero days.”

It is currently unclear how the developer system was broken, although the new Silent Push analysis revealed that the Lazarus group registered a domain assessment (.) COM at 22:21:57 2025, a few hours before the theft of crypto.

Cybersecurity

Whois Records show that the domain was registered using the email address “Trevorgreer9312@gmail (.) Complained, which was previously identified as a Lazarus -used person connection since another company Duma contagious interview.

“Seems to,” bybit hest Increased interviewAlso known as the famous Chollima “company – Note.

“Victims are usually referred to LinkedIn, where they are socially designed to participate in counterfeit interviews. These interviews serve as an entry point for the purposeful deployment of malware, data cleaning and further compromise of financial and corporate assets.”

North Korea estimates have stolen more than $ 6 billion since 2017. $ 1.5 billion stolen last week, exceeded $ 1.34 billion, which the actors stole from $ 47 in all 2024.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Meta begins showing advertisements on WhatsApp after 6 years delay with the 2018 announcement

June 17, 2025

The United States seizes $ 7.74 million with a crystallian -related IT workers of North Korea

June 16, 2025

Anubis Ransomware encrypts files and napkins, making recovery impossible even after payment

June 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.