Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

North Korean Hackers Stole $400 Million Worth of Cryptocurrency in 2021

North Korea-linked hacking group Lazarus stole close to $400 million worth of crypto-assets last year, Chainalysis reports.

North Korea-linked hacking group Lazarus stole close to $400 million worth of crypto-assets last year, Chainalysis reports.

The most well-known APT operating on behalf of the North Korean government and active for more than a decade, Lazarus is believed to have been involved in multiple high-profile attacks, including the $81 million cyber theft from the central bank of Bangladesh in 2016, and the WannaCry attack.

Starting in 2018, Lazarus conducted multiple cryptocurrency heists to generate revenue in support of North Korea’s military programs.

After stealing roughly $500 million in crypto-assets in 2018, the group pilfered only $200-$300 million in 2019 and 2020. In 2021, however, it managed to divert close to $400 million in crypto-coins.

The higher amount, Chainalysis says, is the result of intensified activities: there were seven North Korea-linked hacks in 2021, compared to only four in 2020. Furthermore, the value extracted from these attacks went up by 40%.

Chainalysis also noticed that Lazarus no longer focuses on stealing Bitcoin. In 2021, only 20% of the stolen crypto-assets were Bitcoin, with Ether accounting for 58% and ERC-20 tokens or altcoins for 22%.

Lazarus’ crypto-heist efforts, Kaspersky notes in a new report, also include creating fake cryptocurrency software development companies to distribute legitimate-looking applications and steal funds from the unsuspecting victims.

Lazarus’ SnatchCrypto campaign, which has been ongoing since 2017, has hit small and medium-sized companies worldwide, including organizations in the Czech Republic, China, Hong Kong, India, Poland, Russia, Singapore, Slovenia, Ukraine, the US, the UAE, and Vietnam.

Advertisement. Scroll to continue reading.

In 2021, Kaspersky’s researchers observed Lazarus studying successful cryptocurrency startups to identify topics of interest and compromise these organizations without raising suspicion. The group abused the brand and employee names of 15 venture businesses to conduct their attacks.

As part of the campaign, the hackers built a complex infrastructure, as well as exploits and malware implants, and distributed a full-featured Windows backdoor that features surveillance functions.

The hacking group intercepted notifications of large transfers and, when the users attempted to move funds to other accounts, they injected their own logic into the transaction process, changing the recipient’s address and draining the account.

The stolen funds were then laundered using a complex mechanism involving mixers and swapping the funds for other cryptocurrencies. Following the Liquid.com hack in August 2021, the North Korean hackers laundered $91 million.

However, Lazarus has yet to launder $170 million in funds stolen in 49 separate hacks.

“This suggests that DPRK-linked hackers aren’t always quick to move stolen cryptocurrencies through the laundering process. It’s unclear why the hackers would still be sitting on these funds, but it could be that they are hoping law enforcement interest in the cases will die down, so they can cash out without being watched,” Chainalysis says.

Related: North Korean Hackers Targeting IT Supply Chain: Kaspersky

Related: U.S. Charges North Korean Hackers Over $1.3 Billion Bank Heists

Related: Here’s How North Korean Hackers Stole Data From Isolated Network Segment

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

Former DoD CISO Jack Wilmer has been named CEO of defensive and offensive cyber solutions provider SIXGEN.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.