North Korea has been employing hackers to finance some state operations via “crypto heists”, according to a report by cybersecurity firm Mandiant.
“The country’s espionage operations are believed to be reflective of the regime’s immediate concerns and priorities, which is likely currently focused on acquiring financial resources through crypto heists, targeting of media, news, and political entities, information on foreign relations and nuclear information, and a slight decline in the once spiked stealing of COVID-19 vaccine research.”
The report details the country’s cyber operations and how they are structured within the Reconnaissance General Bureau, or RGB — North Korea’s intelligence agency akin to the CIA or MI-6. It also sheds light on the infamous hacker group “Lazarus” which has been operating out of North Korea since 2009.
According to the report, Lazarus is not a single group of hackers, rather an umbrella term reporters use to refer to numerous different state-backed hacker groups operating out of The Democratic Republic of North Korea. However, these different groups operate in different “sectors” and have unique responsibilities. One of the responsibilities is raising funds through the theft of cryptocurrencies.
Latest cyber espionage activity
Hacker groups linked to Lazarus have recently been active and were exploiting a google Chrome vulnerability from early January 2022 until mid-February, when the exploit was patched out.
Google’s Threat Analysis Group, or TAG, said in a blog post on March 24th that North Korean state-backed attacker groups — tracked publicly as “Operation Dream Job” and “Operation AppleJeus” — had been exploiting a “remote code execution vulnerability in Chrome” since early January 2022 to conduct various hacks and phishing attacks. TAG’s Adam Weidemann said in the blogpost:
“We observed the campaigns targeting U.S.-based organizations spanning news media, IT, cryptocurrency, and fintech industries. However, other organizations and countries may have been targeted.”
The exploit allowed the hackers to send bogus job offers to people working in the aforementioned industries, which would then lead to spoofed versions of popular job-hunting websites like Indeed.com. The exploit kit and phishing are similar to those tracked in Operation Dream Job. Meanwhile, another hacker group has been targeting crypto firms and exchanges using the same exploit kit.
Google said that roughly 340 people had been targeted by hacker groups. It added that all identified websites and domains were added to its Safe Browsing service to protect users and it is continuing to monitor the situation.
Lazarus targeting financial services, crypto
Lazarus-linked hacker groups have been involved in various hacks on crypto firms and traditional banks for several years now. Some notable hacks include the 2016 Bangladesh Bank cyber heist and various crypto-related attacks in 2017.
The main hacker group focused on financial services attacks is APT38, which was behind the notorious SWIFT hack. It includes a subgroup called CryptoCore or “Open Password.”
Most of these hacks have been successful and it is estimated that hackers have raised over $400 million for North Korea. An investigation by the UN concluded that proceeds from these cyber heists have been used to fund the hermit country’s ballistic missile program.
Get your daily recap of Bitcoin, DeFi, NFT and Web3 news from CryptoSlate
Get an Edge on the Crypto Market 👇
Become a member of CryptoSlate Edge and access our exclusive Discord community, more exclusive content and analysis.
On-chain analysis
Price snapshots
More context
Comments (No)