CoinInsight360.com logo CoinInsight360.com logo
America's Social Casino

Moralis Money
cryptonews 2025-04-25 12:52:15

North Korea Develops Novel, More Sophisticated Methods to Target Crypto Industry

North Korean hackers have been developing fresh and increasingly sophisticated methods to steal crypto funds: Zoom meetings, hiding malware in GitHub and NPM packages, and establishing legal entities in the USA, to name just a few. Registering an actual company is the rarest method among these, and it’s the most difficult one. Yet, researchers have found several instances of threat actors creating businesses in the US to attract crypto developers and spread a data-stealing code. More specifically, according to researchers at the security firm Silent Push , they registered the companies Blocknovas LLC and Softglide LLC in New Mexico and New York using fake identities and addresses. The report has shared a list of the fake identities connected to the campaign. Source: Silent Push The researchers have discovered another business, Angeloper Agency , which has connections to this scheme. However, this one doesn’t seem to be registered in the US. Of the three, Blocknovas is the most active front company, the report says. Notably, Kasey Best, director of threat intelligence at Silent Push, was quoted by Reuters as saying that, “this is a rare example of North Korean hackers actually managing to set up legal corporate entities in the US in order to create corporate fronts used to attack unsuspecting job applicants.” Furthermore, this attack is similar – and may be linked – to the attempted data theft recently reported by a number of crypto industry insiders. Nick Bax of the Security Alliance , shared last month that a threat group is working to steal data and funds through fake business calls on Zoom . Having audio issues on your Zoom call? That's not a VC, it's North Korean hackers. Fortunately, this founder realized what was going on. The call starts with a few "VCs" on the call. They send messages in the chat saying they can't hear your audio, or suggesting there's an… pic.twitter.com/ZnW8Mtof4F — Nick Bax.eth (@bax1337) March 11, 2025 The attackers’ goal is ‘simple.’ Attract crypto developers and infect their devices with malicious software via a link they send during the interview. They may be pretending to experience technical issues, for example, and will ask the target to click on a link. Bax said the threat group stole “$10s of millions of dollars” using this tactic, and others continue to copy it. You might also like Lazarus Group Deposits 400 ETH to Tornado Cash, Hackers Target Crypto Vets on Zoom Contagious Interviews and Malicious JavaScript Silent Push says that what it found is a new campaign. The entity behind it is the North Korean APT (advanced persistent threat) group ‘Contagious Interview. ’ This is a subgroup of the notorious state-sponsored Lazarus Group . Best told Reuters that the job interviews “lead to sophisticated malware deployments in order to compromise the cryptocurrency wallets of developers.” Also, they target the developers’ passwords and credentials, possibly to use them in “further attacks on legitimate businesses.” Per the report, Silent Push confirmed “multiple victims” of the latest interview campaign. Source: blocknovas.com However, the FBI has seized Blocknovas’ domain “as part of a law enforcement action against North Korean Cyber Actors who utilized this domain to deceive individuals with fake job postings and distribute malware.” The other two websites are still operational at the time of writing. But this is not all. Another highly sophisticated line of attack is inserting malicious JavaScript into GitHub repositories and NPM packages. Lazarus began this campaign in August 2024, stealing funds and data through supply chain attacks. Furthermore, this attack vector is evolving. Notably, the malware, called Marstech1, targets popular crypto wallets. Various reports have named MetaMask , Exodus , and Atomic . Cybersecurity company SecurityScorecard found 233 victims who installed the Marstech1 implant between September 2024 and January 2025. You might also like New Malicious Campaign Targets Atomic and Exodus Wallets The post North Korea Develops Novel, More Sophisticated Methods to Target Crypto Industry appeared first on Cryptonews .

https://www.digistore24.com/redir/325658/ceobig/
면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.