CoinInsight360.com logo CoinInsight360.com logo
A company that is changing the way the world mines bitcoin

WallStreet Forex Robot 3.0
Cryptopolitan 2024-12-23 08:34:51

North Korean hackers have lost more than $700,000 in trading on Hyperliquid. Are they preparing to hack the platform?

_Marked addresses linked to North Korean hackers have reportedly engaged in trading activities on Hyperliquid, resulting in losses of more than $700,000. The trading activities have stirred concerns within the crypto community, with some speculating that these actions may signal North Korean hackers testing Hyperliquid’s systems for vulnerabilities. As reported by Chinese correspondent Colin Wu, Tayvano, a crypto enthusiast on X, has warned the Hyperliquid team of an imminent threat, saying the Democratic People’s Republic of Korea (DPRK) “does not trade; it tests.” DPRK's trading career is…uh….going…..🙈 tbh if i was the dude managing Hyperliquid's 4 validators (or those fucking ghetto ass binaries on gh) I would be shitting my pants right now. Hyperliquid dudes dont seem worried at all though so im sure its fine. 🫠 pic.twitter.com/JrrU7t1sJe — Tay 💖 (@tayvano_) December 22, 2024 Hyperliquid (HYPE) recently hit the $11 billion trading volume mark, fueled by its recent airdrop event. Analysts are optimistic the token will surge past its recent highs of $35.02. However, recent activities from DPRK hackers have the community a little worried. Expert offers to help Hyperliquid ‘mitigate imminent threat’ Just two weeks ago, crypto KOL Tayvano reached out to Hyperliquid, offering insights and assistance to counter the perceived risks. In a letter to the crypto project, Tayvano highlighted the dangers posed by the familiarity North Korean hackers have with Hyperliquid’s platform. Source: X “I would like to walk you through some of the measures that your team can and should take to mitigate risk of a sophisticated attack,” Tayvano wrote. The letter further emphasized the evolving tactics of DPRK hackers, describing them as “creative, persistent, and highly sophisticated,” with access to zero-day vulnerabilities, such as those recently patched by Chrome. Tayvano proposed an open communication channel between Hyperliquid and security experts to share updates and countermeasures effectively, aiming to prevent the platform from becoming a high-profile target. DPRK hacks dominate 2024 crypto theft According to a Chainalysis report, North Korean state-sponsored hackers stole an estimated $1.34 billion in cryptocurrency in 2024 alone, accounting for more than half of all crypto-related thefts this year. The frequency and scale of the attacks have intensified, with the hackers targeting a wider range of organizations. Notably, DPRK-linked exploits yielding profits of $50 to $100 million—or more—occurred significantly more often this year compared to 2023. Chainalysis attributes this trend to the hackers’ growing expertise in executing massive exploits. In addition to large-scale thefts, DPRK hackers have also conducted smaller attacks, pulling in as little as $10,000. These activities showcase their ability to target both high-value entities and smaller-scale opportunities. The rise in DPRK cyber activities has also been linked to North Korean IT workers infiltrating crypto and Web3 companies . Using sophisticated tactics such as false identities, third-party hiring intermediaries, and exploiting remote work opportunities, these individuals have compromised networks and stolen proprietary information. One notable case involved the U.S. Department of Justice (DOJ) indicting 14 North Korean nationals accused of posing as remote IT workers at U.S. companies. These individuals reportedly stole more than $88 million through extortion and data theft. Sanctions and blacklists: Something for the pain? As international efforts to disrupt North Korea’s illicit activities continue, countries are now joining hands to break the chain of attacks the DPRK is executing. A collaboration between the US and the United Arab Emirates (UAE) recently led to the disruption of a DPRK money-laundering network. According to the US Treasury’s Office of Foreign Assets Control (OFAC), two Chinese nationals and their UAE-based shell company, Green Alpine Trading LLC, were sanctioned for laundering millions of dollars in cryptocurrency for North Korea. The duo reportedly funneled funds for Sim Hyon-Sop, a sanctioned representative of the Korea Kwangson Banking Corporation (KKBC), who is wanted by the FBI. Sop is known for establishing complex financial pipelines to support North Korea’s weapons programs. OFAC’s sanctions freeze all US owned assets linked to the Chinese nationals and Green Alpine Trading LLC, effectively blacklisting them from global financial systems. The agency warns that financial institutions interacting with these entities may face additional penalties. The sanctions are part of broader efforts to curb North Korea’s ability to finance its weapons of mass destruction (WMD) and ballistic missile programs through illicit means, including crypto theft and money laundering operations. From Zero to Web3 Pro: Your 90-Day Career Launch Plan

면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.