CoinInsight360.com logo CoinInsight360.com logo
America's Social Casino

crypto.news 2025-04-25 07:38:33

Lazarus Group spies set up U.S. shell companies to dupe crypto developers: report

Silent Push researchers claim cyber spies from North Korea’s Lazarus Group, have set up U.S. shell companies under fake aliases to infect crypto developers with malware. According to a recent Reuters report , U.S. cybersecurity company Silent Push has identified two shell companies that can be traced back to the North Korean hacker group. Researchers claimed that the two companies, Blocknovas LLC and Softglide LLC, were set up in New Mexico and New York respectively under fake personas and addresses. Upon further inspection, Reuters found that the address listed for Blocknovas in Warrenville, South Carolina appeared as an empty lot on Google Maps. Meanwhile, Softglide’s address in Buffalo, New York was occupied by a small tax office. Moreover, the contact persons listed under the companies could not be found. Director of threat intelligence at Silent Push, Kasey Best called it a “rare example of North Korean hackers actually managing to set up legal corporate entities in the U.S.” He explained how the Lazarus Group hackers would seek to infect users through fake job applications with at least three strains of detected malware linked to North Korean cyber operations. You might also like: Lazarus Group allegedly makes a profit of $2.51m from selling WBTC The malicious cyber attacks would use fake aliases to offer job interviews for prospective crypto or web3 developers, which would enable the hackers to deploy sophisticated malware designed to compromise the cryptocurrency wallets of developers. “They also target the developers’ passwords and credentials which could be used to further attacks on legitimate businesses,” said Best. The hackers behind these firms are allegedly part of a subgroup within the Lazarus Group, which is part of the Reconnaissance General Bureau, Pyongyang’s main foreign intelligence agency. Lazarus Group is known for being the actors behind some of the largest crypto hacks in history, including the most recent Bybit hack which resulted in losses of up to $1.5 billion. When asked about these shell companies and their possible ties to the North Korean hacker group, the New York Department of State declined to comment on companies registered in the state. Meanwhile, the New Mexico secretary of state’s office told Reuters in an email that it has no way of knowing about the firm’s connection to North Korea. On April 24, the FBI posted a domain seizure notice on the Blocknovas website, starting that “as part of a law enforcement action against North Korean Cyber Actors who utilized this domain to deceive individuals with fake job postings and distribute malware.” Read more: Bybit returns 40k ETH post-hack loan from Bitget

Read the Disclaimer : All content provided herein our website, hyperlinked sites, associated applications, forums, blogs, social media accounts and other platforms (“Site”) is for your general information only, procured from third party sources. We make no warranties of any kind in relation to our content, including but not limited to accuracy and updatedness. No part of the content that we provide constitutes financial advice, legal advice or any other form of advice meant for your specific reliance for any purpose. Any use or reliance on our content is solely at your own risk and discretion. You should conduct your own research, review, analyse and verify our content before relying on them. Trading is a highly risky activity that can lead to major losses, please therefore consult your financial advisor before making any decision. No content on our Site is meant to be a solicitation or offer.