Web Analytics
crypto.news
2025-04-01 17:51:23

‘We can’t defeat an enemy that we don’t know’: Researcher warns of North Korea’s changing crypto tactics

Paradigm security researcher Samczsun is raising concerns that North Korea’s cyber operations extend far beyond the notorious Lazarus Group. His warnings come as the crypto industry emerges from the recent Bybit hack , which reportedly involved a sophisticated compromise of SafeWallet infrastructure. This attack marked a departure from previous North Korean hacking incidents . Instead of directly targeting Bybit, the hackers managed to breach Safe{Wallet}. This shift in tactics highlights the growing sophistication of their strategies and raises significant concerns about the security of the broader cryptocurrency ecosystem. According to Samczsun , North Korean-backed cybercrime isn’t just the work of a single group, but rather a network of state-sponsored threat actors operating under different names. You might also like: Trump family reportedly seizes majority control of World Liberty Financial North Korea’s cyber warfare structure Samczsun has been analyzing North Korea’s cyber threat for years. He explains that referring to all North Korean cyber activity as the “Lazarus Group” oversimplifies a far more complex network. North Korea’s hacking operations are primarily run through the Reconnaissance General Bureau, an intelligence agency that oversees multiple hacking units. These include not only Lazarus Group but also APT38, AppleJeus, and other specialized teams. Each of these groups has a different focus. Lazarus Group, for example, is known for high-profile cyberattacks, including the 2014 Sony Pictures hack and the 2016 Bangladesh Bank heist. APT38 specializes in financial crimes, including bank fraud and cryptocurrency theft. “APT38,” Samczsun wrote, “which spun out of Lazarus Group in around 2016 in order to focus on financial crimes, targeting banks (such as the Bank of Bangladesh) first, then cryptocurrency later.” AppleJeus has targeted cryptocurrency users with malware disguised as trading apps. These groups work under the same government umbrella, helping to fund North Korea’s weapons programs and evade international sanctions. You might also like: Bitcoin in retirement plans? Sen. Tuberville revives crypto bill Crypto is now a North Korea target North Korea has turned to cryptocurrency as a major source of revenue. Unlike traditional finance, crypto transactions are decentralized and often more difficult to track or freeze. North Korean hackers exploit this by breaching exchanges, deploying malware, and using fake job offers to gain access to internal systems. One example is the case of “Wagemole” operatives — North Korean IT workers who infiltrate legitimate tech companies. These individuals appear to be regular employees but sometimes use their access to steal funds or compromise systems. This tactic was seen in the Munchables exploit , where an employee with ties to North Korea drained assets from the protocol. Another method is supply chain attacks, where hackers compromise software providers that serve cryptocurrency firms. In one case, AppleJeus hackers inserted malware into a widely used communications tool, affecting millions of users. In another, North Korean attackers breached a contractor working with Radiant Capital, gaining access through social engineering on Telegram, according to Samczsun. You might also like: Analysis: Bitcoin may see consolidation in April and May as selling pressure drops What this means for crypto Samczsun warned that North Korea’s cyber operations are evolving. The Bybit attack shows that hackers are now targeting infrastructure providers, not just exchanges. This means the entire crypto ecosystem — from wallets to smart contract platforms — could be at risk. For crypto users and businesses, the key takeaway is that North Korean cyber threats go beyond Lazarus Group and simple exchange hacks. The industry needs stronger security protocols, improved intelligence sharing, and greater awareness of social engineering threats.

获取加密通讯
阅读免责声明 : 此处提供的所有内容我们的网站,超链接网站,相关应用程序,论坛,博客,社交媒体帐户和其他平台(“网站”)仅供您提供一般信息,从第三方采购。 我们不对与我们的内容有任何形式的保证,包括但不限于准确性和更新性。 我们提供的内容中没有任何内容构成财务建议,法律建议或任何其他形式的建议,以满足您对任何目的的特定依赖。 任何使用或依赖我们的内容完全由您自行承担风险和自由裁量权。 在依赖它们之前,您应该进行自己的研究,审查,分析和验证我们的内容。 交易是一项高风险的活动,可能导致重大损失,因此请在做出任何决定之前咨询您的财务顾问。 我们网站上的任何内容均不构成招揽或要约