The Story Behind the Mastermind of the Largest Heist in Web3 History, the Lazarus Group
Source: Wikipedia
Translation Source: Yobo, Foresight News
The following content is translated from the Wikipedia article "Lazarus Group":
The Lazarus Group (also known as the "Guardians" or "Peace or Whois Team") is a hacker group composed of an unknown number of individuals, reportedly controlled by the North Korean government. Although understanding of the group is limited, researchers have attributed multiple cyberattacks to them since 2010.
The group initially started as a criminal gang but is now recognized as an advanced persistent threat organization due to its attack intentions, the threats it poses, and the various tactics used during operations. They have been given various aliases by cybersecurity agencies, such as "Hidden Cobra" (used by the U.S. Department of Homeland Security to refer to malicious cyber activities conducted by the North Korean government) and "ZINC" or "Diamond Sleet" (Microsoft's terms). According to defector Kim Kuk-song from the country, the group is known within North Korea as the "414 Liaison Office."
The Lazarus Group is closely linked to North Korea. The U.S. Department of Justice has stated that the group is part of the North Korean government's strategy aimed at "disrupting global cybersecurity... and violating sanctions to generate illicit revenue." North Korea gains various benefits through its cyber operations, needing only to maintain a very lean team to pose a "global" asymmetric threat (especially against South Korea).
Development History
The earliest known attacks by the group were the "Trojan Operation" from 2009 to 2012. This was a cyber espionage campaign that utilized relatively unsophisticated Distributed Denial of Service (DDoS) attacks targeting the South Korean government in Seoul. Attacks were also carried out in 2011 and 2013. While not confirmed, a 2007 attack on South Korea is also suspected to be their doing. A notable attack by the group occurred in 2014, targeting Sony Pictures. This attack employed more sophisticated techniques, indicating the group's increasing maturity over time.
It was reported that in 2015, the Lazarus Group stole $12 million from Ecuador's Banco del Austro and $1 million from Vietnam's TPBank. They also targeted banks in Poland and Mexico. In a 2016 bank heist, they conducted an attack on a bank, successfully stealing $81 million, which is attributed to the group. In 2017, reports emerged that the Lazarus Group stole $60 million from the Far Eastern International Bank in Taiwan, although the actual amount stolen remains unclear, and most of the funds have been recovered.
The true mastermind behind this organization is currently unknown, but media reports suggest a close association with North Korea. In 2017, a Kaspersky Lab report stated that the Lazarus Group tends to focus on espionage and penetration-type cyberattacks, while an internal subdivision referred to by Kaspersky as "Bluenoroff" specifically engages in financial cyberattacks. Kaspersky identified multiple attacks worldwide and found a direct IP address association with the country in the case of Bluenoroff.
However, Kaspersky also acknowledged that code reuse could be a form of "false flag operation" aimed at misleading investigators and framing North Korea, as seen in the global "WannaCry" ransomware cyberattack that copied the U.S. National Security Agency's technology. This ransomware exploited the NSA's "EternalBlue" vulnerability, which was disclosed by a hacker group called the "Shadow Brokers" in April 2017. In 2017, a Symantec report suggested that the "WannaCry" attack was highly likely the work of the Lazarus Group.
2009 "Operation Troy"
The first major hacking incident involving the Lazarus Group occurred on July 4, 2009, marking the beginning of "Operation Troy." This attack utilized the "MyDoom" and "Dozer" malware to launch large-scale but unsophisticated DDoS attacks against U.S. and South Korean websites. Approximately 36 websites were targeted in this wave of attacks, with the insertion of "Independence Day" text in the Master Boot Record (MBR).
2013 South Korean Cyberattacks ("Operation 1" / "Dark Seoul" Operation)
Over time, the organization's attack methods became more sophisticated; their technology and tools also became more mature and effective. The "Ten Days of Rain" attack in March 2011 targeted South Korean media, financial institutions, and critical infrastructure using more complex DDoS attacks originating from compromised computers within South Korea. On March 20, 2013, the "Dark Seoul" operation was launched, which was a data-wiping attack against three South Korean broadcasting companies, financial institutions, and an internet service provider. At that time, two other groups calling themselves the "New Roman Network Legion" and "WhoIs Team" claimed responsibility for the attack, but researchers were unaware that the mastermind behind it was the Lazarus Group. Today, researchers know that the Lazarus Group was behind these destructive attacks.
Late 2014: Sony Pictures Entertainment Breach
On November 24, 2014, the Lazarus Group's attacks reached a peak. On that day, a post appeared on Reddit stating that Sony Pictures had been breached by unknown means, with the attackers claiming to be the "Guardians of Peace." A large amount of data was stolen and gradually leaked in the days following the attack. A person claiming to be a member of the organization said in an interview that they had been stealing Sony's data for over a year.
The hackers were able to access unreleased movies, partial movie scripts, future movie plans, top executives' salary information, emails, and personal information of about 4,000 employees.
Early 2016 Investigation: "Operation Blockbuster"
Code-named "Operation Blockbuster," an alliance of multiple security companies led by Novetta analyzed malicious software samples discovered in various cybersecurity incidents. Using this data, the team analyzed the hackers' modus operandi. They linked the Lazarus Group to multiple attacks through code reuse patterns. For example, they employed a little-known encryption algorithm on the internet—the "Caracasis" encryption algorithm.
2016 Bank Network Heist
In February 2016, a bank heist occurred. Security hackers used the Society for Worldwide Interbank Financial Telecommunication (SWIFT) network to send 35 fraudulent payment instructions, attempting to illegally transfer nearly $1 billion from a central bank in a certain country held at the Federal Reserve Bank of New York. Five of the fraudulent payment instructions successfully transferred $101 million, with $20 million going to Sri Lanka and $81 million to the Philippines. The Federal Reserve Bank of New York became suspicious due to a misspelling in one instruction, thwarting the remaining 30 transactions involving $850 million. Cybersecurity experts stated that the mastermind behind this attack was the Lazarus Group from a certain country.
May 2017 "WannaCry" Ransomware Attack
The "WannaCry" attack was a large-scale ransomware cyberattack. On May 12, 2017, from the UK's National Health Service (NHS) to Boeing and even some universities in China, numerous institutions worldwide were affected. The attack lasted for 7 hours and 19 minutes. Europol estimated that this attack affected nearly 200,000 computers in 150 countries, with major impacts in Russia, India, Ukraine, and Taiwan. This was one of the earliest instances of a cryptoworm attack. A cryptoworm is a type of malware that spreads between computers over a network without the need for direct user interaction—in this attack, it exploited the TCP port 445. Computers infected with the virus did not require clicking on malicious links; the malware could propagate automatically, spreading from one computer to a connected printer, then to other computers on nearby connected wireless networks, and so on. The vulnerability in port 445 allowed the malware to spread freely within internal networks, rapidly infecting thousands of computers. The "WannaCry" attack was one of the first large-scale uses of a cryptoworm.
Attack Method: The virus exploited a vulnerability in the Windows operating system, then encrypted the computer data, demanding around $300 worth of Bitcoin to obtain the decryption key. To prompt payment from the victims, the ransom would double after three days, and if not paid within a week, the malware would delete the encrypted data files. The malware utilized a legitimate software developed by Microsoft called "Windows Crypto" to encrypt files. After encryption, the file names would have the "Wincry" suffix added to them, hence the origin of the name "WannaCry." "Wincry" formed the basis of the encryption, but the malware also leveraged two other vulnerabilities, "EternalBlue" and "DoublePulsar," turning it into an encryption worm. "EternalBlue" could automatically spread the virus through networks, while "DoublePulsar" would activate the virus on the victim's computer. In other words, "EternalBlue" propagated infected links to your computer, and "DoublePulsar" clicked on it on your behalf.
Security researcher Marcus Hutchins received a sample of the virus from a friend at a security research company and discovered a "kill switch" hardcoded into the virus, halting the attack. The malware would periodically check if a specific domain name was registered and only continue with the encryption operation if the domain name did not exist. Hutchins identified this check mechanism and subsequently registered the related domain name at 3:03 PM UTC. The malware immediately ceased spreading and infecting new devices. This turn of events was quite intriguing and provided a lead to track down the virus authors. Typically, thwarting malware would require hackers and security experts to engage in a months-long battle, so easily emerging victorious was unexpected. Another unusual aspect of this attack was that files could not be recovered even after paying the ransom: the hackers received only $160,000 in ransom, leading many to believe that their goal was not financial gain.
The ease with which the "kill switch" was bypassed and the meager ransom earnings led many to believe that this attack was state-sponsored; its motive was not financial gain but rather creating chaos. Following the attack, security experts traced the "DoublePulsar" vulnerability back to the United States National Security Agency, as the vulnerability was initially developed as a cyber weapon. Subsequently, the Shadow Brokers hacker group stole this vulnerability, initially attempting to auction it off without success, and eventually opted to release it for free. The NSA then informed Microsoft of this vulnerability, and Microsoft released an update on March 14, 2017, less than a month before the attack occurred. However, this was not enough, as the update was not mandatory, and by May 12, most computers vulnerable to this attack had not been patched, resulting in significant destruction from this attack.
Aftermath: The U.S. Department of Justice and UK authorities later determined that the "WannaCry" attack was carried out by the North Korean hacker group Lazarus Group.
2017 Cryptocurrency Attack Event
In 2018, Recorded Future released a report stating that the Lazarus Group was associated with attacks against cryptocurrency Bitcoin and Monero users, primarily targeting South Korean users. These attacks were reported to be technically similar to previous attacks using the "WannaCry" ransomware and attacks against Sony Pictures. One of the methods used by Lazarus Group hackers was exploiting a vulnerability in the South Korean word processing software Hangul (developed by Hancom). Another method was to send spear-phishing lures containing malware, targeting South Korean students and users of cryptocurrency exchanges like Coinlink.
If users opened the malware, their email addresses and passwords would be stolen. Coinlink denied that its website or user email addresses and passwords were compromised by hackers. The report concluded that "this series of attacks at the end of 2017 demonstrates that a certain country's interest in cryptocurrency shows no signs of abating, and we now know this interest extends to a wide range of activities including mining, ransomware attacks, and direct theft...". The report also noted that a certain country used these cryptocurrency attacks to circumvent international financial sanctions.
In February 2017, hackers from a certain country stole $7 million from the South Korean cryptocurrency exchange Bithumb. Another South Korean Bitcoin exchange, Youbit, was attacked in April 2017 and then suffered another attack in December of the same year, resulting in the theft of 17% of its assets and leading to bankruptcy. The Lazarus Group and hackers from a certain country were identified as the masterminds behind these attacks. In December 2017, the cryptocurrency cloud mining market NiceHash lost over 4,500 bitcoins. An updated investigation linked this attack to the Lazarus Group.
September 2019 Attack Event
In mid-September 2019, the U.S. issued a public alert, revealing a new malware called "ElectricFish." Since the beginning of 2019, a certain country's operatives have carried out five major global cyber heists, including successfully stealing $49 million from an institution in Kuwait.
End-of-2020 Pharmaceutical Company Attack Event
Due to the ongoing COVID-19 pandemic, pharmaceutical companies became a primary target for the Lazarus Group. Members of the Lazarus Group used spear-phishing techniques, posing as health officials, to send malicious links to pharmaceutical company employees. Several large pharmaceutical companies are believed to have been targeted, but only AstraZeneca, a joint venture with British and Swedish interests, has been confirmed so far. According to Reuters, numerous employees were targeted, many of whom were involved in COVID-19 vaccine development. The purpose of these attacks by the Lazarus Group is currently unclear but may include: stealing sensitive information for profit, carrying out extortion schemes, and enabling foreign powers to access proprietary research on the COVID-19 virus. AstraZeneca has not yet commented on the incident, with experts suggesting that no sensitive data breaches have occurred.
January 2021 Cyber Attack Targeting Security Researchers
In January 2021, both Google and Microsoft publicly reported that a group of hackers from a certain country had targeted security researchers through social engineering tactics, with Microsoft specifically attributing the attack to the Lazarus Group.
The hackers created multiple user profiles on platforms such as Twitter, GitHub, and LinkedIn, posing as legitimate software vulnerability researchers and engaging with posts and content from other members of the security research community. They would then directly contact specific security researchers under the guise of collaborative research, leading the victims to download files containing malware or to visit blog posts on websites controlled by the hackers.
Some victims who visited the blog posts reported that despite using fully patched versions of Google Chrome, their computers were still compromised, suggesting that the hackers may have exploited a previously unknown Chrome zero-day vulnerability for the attack; however, Google stated upon the report's release that they could not pinpoint the exact intrusion method.
March 2022 Axie Infinity Chain Game Attack
In March 2022, the Lazarus Group was implicated in stealing $620 million worth of cryptocurrency from the Ronin network used by the Axie Infinity game. The FBI stated, "Through investigation, we confirm that the Lazarus Group and APT38 (network actors associated with North Korea) are the masterminds behind this theft."
June 2022 Horizon Bridge Attack
The FBI confirmed that the North Korean malicious network actor organization Lazarus Group (also known as APT38) was the mastermind behind the $100 million virtual currency theft incident reported on June 24, 2022, from Harmony's Horizon Bridge.
2023 Other Crypto-Related Attack Events
A report released by the blockchain security platform Immunefi stated that the Lazarus Group was responsible for over $300 million in losses in the 2023 cryptocurrency hacking events, accounting for 17.6% of the total losses that year.
June 2023 Atomic Wallet Attack: In June 2023, users of the Atomic Wallet service had over $100 million worth of cryptocurrency stolen, an event subsequently confirmed by the FBI.
September 2023 Stake.com Hack: In September 2023, the Federal Bureau of Investigation confirmed that the online casino and gambling platform Stake.com was hacked, with $41 million worth of cryptocurrency stolen by the Lazarus Group.
U.S. Sanctions
On April 14, 2022, the U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) under the country's Sanctions Regulations section 510.214, added the Lazarus Group to the Specially Designated Nationals (SDN) List.
2024 Cryptocurrency Attack
According to Indian media reports, a local cryptocurrency exchange named WazirX was attacked by the group, resulting in the theft of $234.9 million worth of cryptocurrency assets.
Personnel Development
It is rumored that some North Korean hackers are sent to Shenyang, China for specialized training to learn how to implant various types of malware into computers, computer networks, and servers. Within North Korea, Kim Chaek University of Technology, Kim Il-sung University, and Mirim College undertake related educational tasks, selecting the most outstanding students nationwide to receive six years of special education. In addition to university education, "some of the best programmers ... will be sent to Mirim College or Mirim College for further study."
Organizational Branches
The Lazarus Group is believed to have two branches.
·BlueNorOff
BlueNorOff (also known as APT38, "Stellar Llama," "BeagleBoyz," "NICKEL GLADSTONE") is an economically motivated organization that conducts illegal fund transfers by forging Society for Worldwide Interbank Financial Telecommunication (SWIFT) instructions. Mandiant refers to it as APT38, while Crowdstrike calls it the "Stellar Llama."
According to a 2020 U.S. Army report, BlueNorOff has approximately 1700 members who focus on the sustained assessment and exploitation of enemy networks' vulnerabilities and systems, engaging in financial cybercrime activities to secure economic benefits for the regime or control related systems. From 2014 to 2021, their targets included at least 16 institutions in 13 countries, such as Bangladesh, Chile, India, Mexico, Pakistan, the Philippines, South Korea, Taiwan, Turkey, and Vietnam. It is believed that these illicit gains were used for the country's missile and nuclear technology development.
BlueNorOff's most notorious attack was the 2016 bank heist, where they attempted to illegally transfer nearly $1 billion from a certain country's central bank's account at the New York Federal Reserve Bank via the SWIFT network. After partially succeeding in some transactions ($20 million to Sri Lanka and $81 million to the Philippines), the New York Federal Reserve Bank became suspicious due to a spelling error in one instruction, halting the remaining transactions.
Malware associated with BlueNorOff includes: "DarkComet," "Mimikatz," "Nestegg," "Macktruck," "Wantcry," "Whiteout," "Quickcafe," "Rawhide," "Smoothride," "TightVNC," "Sorrybrute," "Keylime," "Snapshot," "Mapmaker," "net.exe," "sysmon," "Bootwreck," "Cleantoad," "Closeshave," "Dyepack," "Hermes," "Twopence," "Electricfish," "Powerratankba," and "Powerspritz," among others.
BlueNorOff's common tactics include phishing, backdooring, exploiting vulnerabilities, watering hole attacks, executing code on systems by exploiting outdated and insecure Apache Struts 2 versions, strategically hacking websites, and accessing Linux servers. There are reports suggesting they sometimes collaborate with cybercriminal hackers.
· AndAriel
AndAriel, also spelled Andarial, goes by other aliases: Silent Chollima, Dark Seoul, Rifle, and Wassonite. Logically, its characteristic is to target South Korea. The nickname "Silent Chollima" stems from the organization's secretive nature [70]. Any institution in South Korea could be targeted by AndAriel, including government agencies, defense institutions, and various economic landmarks.
According to a 2020 U.S. Army report, the AndAriel organization has around 1,600 members whose mission is to conduct reconnaissance, assess network vulnerabilities, and map out enemy networks for potential attacks. Apart from South Korea, they also target other countries' governments, infrastructures, and businesses. Their attack methods include exploiting ActiveX controls, South Korean software vulnerabilities, watering hole attacks, spear-phishing (macro virus method), attacking IT management products (such as antivirus software and project management software), and launching attacks through the supply chain (installers and updaters). The malware used includes: Aryan, Gh0st RAT, Rifdoor, Phandoor, and Andarat.
Persons Involved in Legal Actions
In February 2021, the U.S. Department of Justice filed a lawsuit against three members of the North Korean military intelligence agency Reconnaissance General Bureau—Park Jin Hyok, Jon Chang Hyok, and Kim Il Park—accusing them of participating in multiple hacking activities attributed to the Lazarus Group. Park Jin Hyok had been indicted as early as September 2018. These suspects are currently not detained in the United States. Additionally, one Canadian and two Chinese individuals have also been charged as money launderers and funders for the Lazarus Group.
Das könnte Ihnen auch gefallen
WEEXPERIENCE Whales Night: KI-Handel, Krypto-Community und Krypto-Markteinblicke
Am 12. Dezember 2025 veranstaltete WEEX die WEEXPERIENCE Whales Night, ein Offline-Gemeinschaftstreffen, das lokale Kryptowährungs-Communitymitglieder zusammenbringen sollte. Die Veranstaltung kombinierte Content Sharing, interaktive Spiele und Projektpräsentationen, um ein entspanntes und dennoch ansprechendes Offline-Erlebnis zu schaffen.

AI Trading Risk in Kryptowährung: Warum können bessere Krypto-Handelsstrategien größere Verluste verursachen?
Risiko sitzt nicht mehr in erster Linie in schlechten Entscheidungen oder emotionalen Fehlern. Sie lebt zunehmend in Marktstruktur, Ausführungswegen und kollektivem Verhalten. Diesen Wandel zu verstehen ist wichtiger als die nächste „bessere“ Strategie zu finden.
KI-Agenten ersetzen Kryptoforschung? Wie autonome KI den Kryptohandel verändert
KI entwickelt sich von der Unterstützung von Händlern zur Automatisierung des gesamten Research-to-Execution-Prozesses in Kryptomärkten. Der Vorsprung hat sich von menschlichen Erkenntnissen hin zu Datenpipelines, Geschwindigkeit und ausführungsbereiten KI-Systemen verlagert, wodurch Verzögerungen bei der KI-Integration zu einem Wettbewerbsnachteil werden.

AI Trading Bots und Copy Trading: Wie synchronisierte Strategien die Volatilität des Kryptomarktes verändern
Krypto-Händler im Einzelhandel stehen seit langem vor denselben Herausforderungen: schlechtes Risikomanagement, späte Einstiege, emotionale Entscheidungen und inkonsequente Ausführung. KI-Handelstools versprachen eine Lösung. Heute helfen KI-gestützte Copy-Trading-Systeme und Breakout-Bots Händlern, Positionen zu vergrößern, Stopps zu setzen und schneller als je zuvor zu handeln. Über Geschwindigkeit und Präzision hinaus verändern diese Tools die Märkte im Stillen – Trader handeln nicht nur intelligenter, sie bewegen sich synchron und schaffen eine neue Dynamik, die sowohl Risiken als auch Chancen verstärkt.
AI Trading in Crypto Erklärt: Wie autonomer Handel Kryptomärkte und Kryptobörsen verändert
KI-Handel verändert die Krypto-Landschaft rasant. Traditionelle Strategien haben Schwierigkeiten, mit der Nonstop-Volatilität und komplexen Marktstruktur von Krypto Schritt zu halten, während KI massive Daten verarbeiten, adaptive Strategien generieren, Risiken managen und Trades autonom ausführen kann. Dieser Artikel führt WEEX-Nutzer durch, was KI-Handel ist, warum Krypto seine Einführung beschleunigt, wie sich die Branche hin zu autonomen Agenten entwickelt und warum WEEX das KI-Handelsökosystem der nächsten Generation aufbaut.
Aufruf zur Teilnahme an AI Wars: WEEX Alpha Awakens — Globaler KI-Handelswettbewerb mit 880.000 US-Dollar Preispool
Jetzt rufen wir KI-Händler aus aller Welt dazu auf, sich AI Wars anzuschließen: WEEX Alpha Awakens, ein globaler KI-Handelswettbewerb mit 880.000 US-Dollar Preispool.

AI Trading in Crypto Markets: Von automatisierten Trading Bots zu algorithmischen Strategien
KI-gesteuerter Handel verlagert Krypto von Einzelhandelsspekulationen zu institutionellem Wettbewerb, bei dem Ausführung und Risikomanagement wichtiger sind als Richtung. Da der KI-Handel skaliert, steigen Systemrisiken und regulatorischer Druck, was langfristige Leistung, robuste Systeme und Compliance zu den wichtigsten Unterscheidungsmerkmalen macht.
AI Sentiment Analysis and Cryptocurrency Volatility: Was bewegt Kryptopreise
KI-Sentiment beeinflusst zunehmend die Kryptomärkte, wobei sich Verschiebungen der KI-bezogenen Erwartungen in Volatilität für wichtige digitale Assets niederschlagen. Kryptomärkte neigen dazu, KI-Narrative zu verstärken, so dass sentimentgetriebene Ströme kurzfristig die Fundamentaldaten überwiegen. Zu verstehen, wie sich KI-Sentiments bilden und verbreiten, hilft Anlegern, Risikozyklen und Positionierungsmöglichkeiten in digitalen Assets besser zu antizipieren.

AI Wars: Teilnehmerleitfaden
In diesem ultimativen Showdown werden Top-Entwickler, Quants und Trader aus aller Welt ihre Algorithmen in realen Marktkämpfen einsetzen und um einen der höchsten Preispools in der Geschichte des KI-Kryptohandels konkurrieren: 880.000 USD, einschließlich eines Bentley Bentayga S für den Champion. Dieser Leitfaden führt Sie durch alle erforderlichen Schritte von der Anmeldung bis zum offiziellen Start des Wettbewerbs.

Zentralbankwoche und Kryptomarktvolatilität: Wie Zinsentscheidungen die Handelsbedingungen an WEEX prägen
Zinsentscheidungen großer Zentralbanken wie der Federal Reserve sind bedeutende makroökonomische Ereignisse, die die globalen Finanzmärkte beeinflussen und die Liquiditätserwartungen und die Risikobereitschaft der Märkte unmittelbar beeinflussen. Da sich der Kryptowährungsmarkt weiter entwickelt und seine Handelsstruktur und Teilnehmer reifen, wird der Kryptomarkt schrittweise in das makroökonomische Preissystem integriert.
WEEX API Testing: Offizieller Leitfaden für KI Trading Hackathon und Krypto Trading APIs
WEEX API Testing wurde entwickelt, um sicherzustellen, dass jeder Teilnehmer Handelslogik in echte Ausführung umsetzen kann. Alle API-Interaktionen finden auf dem Live-Trading-System von WEEX statt, sodass die Teilnehmer unter authentischen Marktbedingungen und nicht unter Simulationen arbeiten können. Mit einer geringen Einstiegsvoraussetzung ist die Aufgabe sowohl für erfahrene Entwickler als auch für motivierte Anfänger zugänglich und validiert dennoch wesentliche technische Fähigkeiten.
AI Wars: Teilnehmerführung test
Teil 1: Die empfohlene Methode (Cloud-Server)
Für beste Stabilität empfehlen wir dringend die Verwendung eines Cloud-Servers mit statischer öffentlicher IP und Unterstützung für einen unterbrechungsfreien Betrieb rund um die Uhr, wie z. B.: AWS (Amazon Web Services), Alibaba Cloud und Tencent Cloud.
Teil 2: Die alternative Methode (lokaler Computer)
Wenn Sie Ihren Handelsbot über einen PC oder ein Heimnetzwerk ausführen möchten, müssen Sie bestätigen, dass Ihre ausgehende IP-Adresse statisch ist. Eine sich ändernde IP führt zu Verbindungsproblemen.
Sie haben zwei Hauptoptionen, um eine stabile ausgehende IP zu gewährleisten:
Verwenden Sie eine statische IP, die von Ihrem Internet Service Provider (ISP) bereitgestellt wird.Verwenden Sie einen VPN- oder Proxydienst mit einer festen Ausgangs-IP (und stellen Sie sicher, dass das VPN/Proxy konsistent aktiviert ist, ohne Server zu wechseln).Schritte zum Auffinden Ihrer lokalen öffentlichen IP:
Deaktivieren Sie alle VPNs, oder behalten Sie nur das einzelne VPN bei, dessen IP Sie auf die Whitelist setzen möchten.Besuchen Sie whatismyip.com in Ihrem Browser.Die Seite zeigt Ihre öffentliche IPv4-Adresse an.Kopieren Sie diese IP und senden Sie sie an die Whitelist.Hinweis: Die meisten Heim-Breitband-IPv4-Adressen sind dynamisch und können sich periodisch ändern. Es wird dringend empfohlen, eine Cloud-Serverumgebung zu verwenden, um Verbindungsausfälle während des Wettbewerbs zu vermeiden.
1.3 Fehlende Informationen? Wir folgen weiterNachdem Sie Ihre BUIDL eingereicht haben, wird das WEEX-Team Ihre Bewerbung anhand der Wettbewerbsanforderungen prüfen. Der Überprüfungsprozess dauert normalerweise einen Geschäftstag.
Wenn Informationen fehlen oder geklärt werden müssen, wird unser Team Sie über einen der folgenden Kanäle kontaktieren:
DoraHacks NachrichtensystemOffizielles WEEX Messaging-SystemIhre registrierten Kontaktdaten (Telegramm, X, etc.)Bitte halten Sie Ihre Kontaktdaten aktiv und zugänglich.
Sobald Ihr BUIDL genehmigt ist, erhalten Sie Ihr Gewinnspielkonto und den exklusiven API Key, mit dem Sie zur nächsten Stufe übergehen können: API-Test und Modellintegration.
. Bitte lesen Sie die offizielle WEEX API Dokumentation sorgfältig durch: https://www.weex.com/api-doc/ai/intro
2. Verbinden Sie sich mit einem Cloud-Server und führen Sie den untenstehenden Code aus. Sie sollten eine Antwort erhalten, die bestätigt, ob Ihre Netzwerkverbindung ordnungsgemäß funktioniert.
curl -s --max-time 10 "https://api-contract.weex.com/capi/v2/market/time"{"epoch":"1765423487.896","iso":"2025-12-11T03:24:47.896Z","timestamp":1765423487896
2. Verbinden Sie sich mit einem Cloud-Server und führen Sie den untenstehenden Code aus. Sie sollten eine Antwort erhalten, die bestätigt, ob Ihre Netzwerkverbindung ordnungsgemäß funktioniert.
import time import hmac import hashlib import base64 import requests api_key = "" secret_key = "" access_passphrase = "" def generate_signature_get(secret_key, timestamp, method, request_path, query_string): message = timestamp + method.upper() + request_path + query_string signature = hmac.new(secret_key.encode(), message.encode(), hashlib.sha256).digest() return base64.b64encode(signature).decode() def send_request_get(api_key, secret_key, access_passphrase, method, request_path, query_string): timestamp = str(int(time.time() * 1000)) signature = generate_signature_get(secret_key, timestamp, method, request_path, query_string) headers = "ACCESS-KEY": api_key, "ACCESS-SIGN": signature, "ACCESS-TIMESTAMP": timestamp, "ACCESS-PASSPHRASE": access_passphrase, "Inhaltstyp": "application/json", "locale": "en-US" } url = "https://api-contract.weex.com/" # Bitte ersetzen Sie durch die tatsächliche API-Adresse, wenn Methode == "GET": response = requests.get(url + request_path+query_string, headers=headers) return response def assets(): request_path = "/capi/v2/account/assets" query_string = "" response = send_request_get(api_key, secret_key, access_passphrase, "GET", request_path, query_string) print(response.status_code) print(response.text) if __name__ == '__main__': assets()

WEEX AI Trading Hackathon Guide: Finden Sie Ihre WEEX-UID und registrieren Sie sich
Bis Februar 2026 veranstaltet WEEX die AI Wars: WEEX Alpha Awakens, den weltweit ersten globalen Krypto-KI-Trading-Hackathon. Melden Sie sich mit Ihrer UID für den WEEX Global AI Trading Hackathon an.

Warum ist WEEX Alpha Awakens der beste KI-Handelswettbewerb 2025? Alles, was Sie wissen müssen
Um die Durchbrüche an der Schnittstelle von KI und Krypto zu beschleunigen, startet WEEX den weltweit ersten globalen KI Trading Hackathon – AI Wars: Alpha Erwacht. Das Event verfügt über einen bahnbrechenden Preispool von mehr als 880.000 US-Dollar, einschließlich eines Bentley Bentayga S für den ultimativen Champion.

AI Wars: WEEX Alpha Awakens | WEEX Global Hackathon API Test Process Guide
AI Wars: Die Registrierung für WEEX Alpha Awakens ist nun geöffnet. Diese Anleitung beschreibt, wie Sie auf den API-Test zugreifen und den Prozess erfolgreich abschließen können.

Was ist WEEX Alpha Awakens und wie kann man teilnehmen? Eine vollständige Anleitung
Um die Durchbrüche an der Schnittstelle von KI und Krypto zu beschleunigen, startet WEEX den weltweit ersten globalen KI Trading Hackathon – AI Wars: Alpha Erwacht.
Der WEEX HODL’em Trading Royale und Dubai Offline Trading Competition erfolgreich abgeschlossen
Am 4. Dezember 2025 veranstaltete die WEEX ihren ersten Dubai HODL’em Trading Royale und Dubai Offline Trading Competition, der die Leidenschaft von AI WARS in die reale Welt brachte.

Beitritt zu AI Wars: WEEX Alpha Erwacht!Global Call for AI Trading Alphas
AI Wars: WEEX Alpha Awakens ist ein globaler KI-Handelshackathon in Dubai, der Quantenteams, algorithmische Händler und KI-Entwickler aufruft, ihre KI-Krypto-Handelsstrategien in Live-Märkten für einen Anteil von 880.000 US-Dollar Preispool freizusetzen.
WEEXPERIENCE Whales Night: KI-Handel, Krypto-Community und Krypto-Markteinblicke
Am 12. Dezember 2025 veranstaltete WEEX die WEEXPERIENCE Whales Night, ein Offline-Gemeinschaftstreffen, das lokale Kryptowährungs-Communitymitglieder zusammenbringen sollte. Die Veranstaltung kombinierte Content Sharing, interaktive Spiele und Projektpräsentationen, um ein entspanntes und dennoch ansprechendes Offline-Erlebnis zu schaffen.
AI Trading Risk in Kryptowährung: Warum können bessere Krypto-Handelsstrategien größere Verluste verursachen?
Risiko sitzt nicht mehr in erster Linie in schlechten Entscheidungen oder emotionalen Fehlern. Sie lebt zunehmend in Marktstruktur, Ausführungswegen und kollektivem Verhalten. Diesen Wandel zu verstehen ist wichtiger als die nächste „bessere“ Strategie zu finden.
KI-Agenten ersetzen Kryptoforschung? Wie autonome KI den Kryptohandel verändert
KI entwickelt sich von der Unterstützung von Händlern zur Automatisierung des gesamten Research-to-Execution-Prozesses in Kryptomärkten. Der Vorsprung hat sich von menschlichen Erkenntnissen hin zu Datenpipelines, Geschwindigkeit und ausführungsbereiten KI-Systemen verlagert, wodurch Verzögerungen bei der KI-Integration zu einem Wettbewerbsnachteil werden.
AI Trading Bots und Copy Trading: Wie synchronisierte Strategien die Volatilität des Kryptomarktes verändern
Krypto-Händler im Einzelhandel stehen seit langem vor denselben Herausforderungen: schlechtes Risikomanagement, späte Einstiege, emotionale Entscheidungen und inkonsequente Ausführung. KI-Handelstools versprachen eine Lösung. Heute helfen KI-gestützte Copy-Trading-Systeme und Breakout-Bots Händlern, Positionen zu vergrößern, Stopps zu setzen und schneller als je zuvor zu handeln. Über Geschwindigkeit und Präzision hinaus verändern diese Tools die Märkte im Stillen – Trader handeln nicht nur intelligenter, sie bewegen sich synchron und schaffen eine neue Dynamik, die sowohl Risiken als auch Chancen verstärkt.
AI Trading in Crypto Erklärt: Wie autonomer Handel Kryptomärkte und Kryptobörsen verändert
KI-Handel verändert die Krypto-Landschaft rasant. Traditionelle Strategien haben Schwierigkeiten, mit der Nonstop-Volatilität und komplexen Marktstruktur von Krypto Schritt zu halten, während KI massive Daten verarbeiten, adaptive Strategien generieren, Risiken managen und Trades autonom ausführen kann. Dieser Artikel führt WEEX-Nutzer durch, was KI-Handel ist, warum Krypto seine Einführung beschleunigt, wie sich die Branche hin zu autonomen Agenten entwickelt und warum WEEX das KI-Handelsökosystem der nächsten Generation aufbaut.
Aufruf zur Teilnahme an AI Wars: WEEX Alpha Awakens — Globaler KI-Handelswettbewerb mit 880.000 US-Dollar Preispool
Jetzt rufen wir KI-Händler aus aller Welt dazu auf, sich AI Wars anzuschließen: WEEX Alpha Awakens, ein globaler KI-Handelswettbewerb mit 880.000 US-Dollar Preispool.
Beliebte Coins
Neueste Krypto-Nachrichten
Kundenservice:@weikecs
Geschäftliche Zusammenarbeit:@weikecs
Quant-Trading & MM:[email protected]
VIP-Services:[email protected]