Paradigm: Unraveling the Mystery of the North Korean Hacker Group Lazarus Group

By: blockbeats|2025/04/02 06:15:04
シェア
copy
Original Article Title: "Demystifying the North Korean Threat"
Original Article Author: samczsun, Research Partner at Paradigm
Original Article Translation: Bright, Foresight News

One morning in February, the SEAL 911 team's alarm bells went off as we watched in confusion as Bybit moved over $1 billion worth of tokens from their cold wallet to a brand-new address and promptly initiated the liquidation of over $200 million worth of LST. Within minutes, through confirmations from the Bybit team and independent analysis (multi-signature, previously using a publicly verifiable Safe Wallet implementation, now deploying a newly deployed unverified contract), it became clear that this was not a routine maintenance. Someone had orchestrated the largest hack in cryptocurrency history, and we were sitting in the front row of this historical spectacle.

While some team members (and the broader intelligence community) began tracing the funds and notifying cooperating exchanges, other team members were trying to figure out what exactly had happened and whether other funds were at risk. Luckily, identifying the culprit was straightforward. Only one known actor had successfully stolen billions of dollars from cryptocurrency exchanges over the past few years: North Korea, also known as the DPRK.

However, beyond that, we had little to go on. Due to the cunning nature of North Korean hackers and their adeptness at self-obliteration, not only was it hard to pinpoint the root cause of the breach, but it was also challenging to determine which specific DPRK unit internally was responsible for this. Our only recourse was existing intelligence, which suggested that North Korea indeed favored infiltrating cryptocurrency exchanges through social engineering. Therefore, we speculated that North Korea likely compromised Bybit's signers and then deployed some malware to interfere with the signing process.

As it turned out, this speculation was entirely baseless. Days later, we discovered that North Korea had actually compromised the infrastructure of the Safe Wallet itself and launched a targeted malicious overload against Bybit. This level of sophistication was something no one had ever considered or prepared for, posing a significant challenge to many security models in the market.

North Korean hackers pose an increasingly serious threat to our industry, and we cannot defeat an enemy we do not know or understand. While there are numerous documented incidents and articles about various aspects of North Korean cyber operations, piecing them together has proven difficult. I hope this overview helps shed light on how North Korea operates and their tactics and procedures, making it easier for us to implement the right mitigation strategies.

Organizational Structure

Perhaps the most significant misconception to address is how to categorize and name the extensive network activities of North Korea. While using the term "Lazarus Group" informally to refer to them is acceptable, employing more precise terminology can be helpful when discussing North Korea's systemic cyber threats in detail.

Firstly, understanding North Korea's "organizational chart" can be helpful. At the top of the hierarchy is North Korea's ruling party (also the only ruling party) — the Workers' Party of Korea (WPK), which leads all of North Korea's governmental entities. This includes the Korean People's Army (KPA) and the Central Committee. Within the People's Army is the General Staff Department (GSD), with the Reconnaissance General Bureau (RGB) housed within. Under the Central Committee is the Ministry of Military Affairs (MID).

The RGB is responsible for nearly all of North Korea's cyber warfare activities, including almost all the activities related to the cryptocurrency industry. Apart from the notorious Lazarus Group, other threat actors that have emerged from the RGB include AppleJeus, APT38, DangerousPassword, and TraderTraitor. On the other hand, the MID oversees North Korea's nuclear missile program, serving as a primary source of North Korean IT workers, known in the intelligence community as Contagious Interview and Wagemole.

Lazarus Group

The Lazarus Group is a highly sophisticated hacking organization, with cybersecurity experts believing that some of the largest and most destructive cyberattacks in history have been attributed to this group. In 2016, Novetta first identified the Lazarus Group while analyzing the Sony Pictures Entertainment hack.

In 2014, Sony was producing the action comedy film "The Interview," with a major plot point involving the embarrassing and subsequent assassination of Kim Jong-un. Understandably, this did not sit well with the North Korean regime, which retaliated by breaching Sony's network, exfiltrating terabytes of data, leaking hundreds of gigabytes of confidential or otherwise sensitive information, and deleting originals. As then-CEO Michael Lynton put it, "The people who did this are criminals. They destroyed a company." Ultimately, the cost of investigation and remediation for Sony in this attack was at least $15 million, with potentially more losses incurred.

Subsequently, in 2016, a hacker group bearing a striking resemblance to the Lazarus Group infiltrated the Bangladesh Bank with the intention of stealing nearly $1 billion. Over the course of a year, the hackers diligently engaged in social engineering attacks on Bangladesh Bank employees, eventually gaining remote access and moving laterally within the bank's internal network until reaching the computer responsible for interfacing with the SWIFT network. From then on, they waited for the perfect moment to strike: the Bangladesh Bank observed a Thursday holiday, while the Federal Reserve Bank of New York had a Friday holiday.

On Thursday night local time in Bangladesh, threat actors utilized their access to the SWIFT network to send 36 separate transfer requests to the Federal Reserve Bank of New York, which was Thursday morning local time. Over the next 24 hours, the Federal Reserve Bank of New York forwarded these transfers to the Rizal Commercial Banking Corporation (RCBC) in the Philippines, which took action. Subsequently, when the Bangladesh Bank resumed business hours, they discovered the hack and attempted to notify RCBC to halt the transactions in progress, only to find that RCBC was closed for the Lunar New Year.

Finally, in 2017, a large-scale WannaCry 2.0 ransomware attack crippled industries worldwide, partly attributed to the Lazarus Group. WannaCry is estimated to have caused billions of dollars in damages, exploiting an NSA-developed Microsoft Windows 0day, encrypting local devices and spreading to other accessible devices, eventually infecting hundreds of thousands of devices globally. Fortunately, security researcher Marcus Hutchins discovered and activated a kill switch within eight hours, limiting the ultimate damage.

Throughout the evolution of the Lazarus Group, they have demonstrated high technical capabilities and operational sophistication, with one of their goals being revenue generation for the North Korean regime. Therefore, their shift of focus to the cryptocurrency industry was only a matter of time.

Derivatives

Over time, as the Lazarus Group has become the catch-all term the media likes to use when describing North Korean cyber activity, the cybersecurity industry has coined more precise names for the specific activities of the Lazarus Group and North Korea. One example is APT38, which split from the Lazarus Group around 2016, focusing on financial crime, initially targeting banks (such as the Bangladesh Bank) and later moving on to cryptocurrency. In 2018, a new threat named AppleJeus was discovered spreading malware targeting cryptocurrency users. Finally, as early as 2018, when OFAC first announced sanctions against two front companies used by North Koreans, North Korean actors posing as IT professionals had already infiltrated the tech industry.

North Korean IT Workers

Although the earliest records mentioning North Korean IT workers date back to OFAC sanctions in 2018, a Unit 42 report in 2023 provided a more detailed account, identifying two distinct threat actors: Contagious Interview and Wagemole.

It has been reported that the Contagious Interview scam involves impersonating recruiters from well-known companies to deceive developers into participating in a fake interview process. Subsequently, the prospective candidates are instructed to clone a repository for local debugging, presented as a coding challenge on the surface, but the repository actually contains a backdoor. Executing the backdoor grants the attacker control of the affected machine. This activity has been ongoing, with the most recent recorded instance on August 11, 2024.

On the other hand, Wagemole operatives' primary objective is not to hire potential victims but to be hired by companies, where they simply work like regular engineers, albeit potentially less efficiently. Nevertheless, there are records of IT workers leveraging their access for attacks, such as in the Munchables incident, where an employee associated with North Korean activities used their privileged access to smart contracts to steal all assets.

The complexity of Wagemole operatives varies, from generic resume templates and reluctance to engage in video calls, to highly customized resumes, deeply faked video interviews, and identity documents like driver's licenses and utility bills. In some cases, operatives have infiltrated victim organizations for up to a year, then used their access to breach other systems and/or cash out completely.

AppleJeus

AppleJeus primarily focuses on spreading malware and excels in sophisticated supply chain attacks. In 2023, the 3CX supply chain attack enabled attackers to potentially infect over 12 million users of 3CX VoIP software, but it was later discovered that 3CX itself was also compromised due to an attack on one of its upstream suppliers, Trading Technologies.

In the cryptocurrency industry, AppleJeus initially distributed malware disguised as legitimate software (such as trading apps or cryptocurrency wallets). However, over time, their strategy evolved. In October 2024, Radiant Capital was compromised by a threat actor who posed as a trusted contractor and sent malicious software via Telegram. Mandiant attributed this incident to AppleJeus.

Dangerous Password

Dangerous Password is responsible for conducting low-complexity, social engineering-based attacks on the cryptocurrency industry. As early as 2019, JPCERT/CC documented that Dangerous Password would send phishing emails with enticing attachments for users to download. In the earlier years, Dangerous Password was known for impersonating industry figures to send phishing emails with subjects like "Stablecoin and Cryptocurrency Risk Assessment."

Today, Dangerous Password is still sending phishing emails, but has also expanded to other platforms. For example, Radiant Capital reports that they received a phishing message via Telegram from someone impersonating a security researcher, who distributed a file named "Penpie_Hacking_Analysis_Report.zip." Furthermore, users reported that someone impersonating journalists and investors contacted them, requesting a call using an inconspicuous video conferencing app. Similar to Zoom, these apps would download a one-time installation program that would, when run, install malware on the device.

TraderTraitor

TraderTraitor is the most seasoned North Korean hacker targeting the cryptocurrency industry, initiating hacks on platforms such as Axie Infinity and Rain.com. TraderTraitor primarily targets exchanges and other companies with significant reserves, opting not to deploy zero-day vulnerabilities against its targets but instead using highly sophisticated spear-phishing techniques to attack victims. In the Axie Infinity hack case, TraderTraitor reached out to a senior engineer via LinkedIn, successfully convincing them to undergo a series of interviews and then sending a "proposal," which delivered malware.

Subsequently, in the WazirX hack, TraderTraitor operatives disrupted an as-yet-unidentified component in the signing pipeline and drained the exchange's hot wallet through repeated deposits and withdrawals, forcing WazirX engineers to rebalance from cold to hot wallet. When the WazirX engineers attempted to sign transactions to transfer funds, they were tricked into signing a transaction handing control of the cold wallet to TraderTraitor. This incident was very similar to the attack on Bybit in February 2025, where TraderTraitor first compromised the Safe{Wallet} infrastructure through social engineering attacks and then deployed malicious JavaScript to the Safe Wallet frontend specifically targeting Bybit's cold wallet. When Bybit attempted to rebalance their wallets, the malicious code was triggered, leading Bybit engineers to sign a transaction handing control of the cold wallet to TraderTraitor.

Stay Safe

North Korea has demonstrated the ability to exploit zero-day vulnerabilities against adversaries, but currently has no recorded incidents or known events of North Korea deploying zero-day vulnerabilities against the cryptocurrency industry. Therefore, typical security recommendations apply to almost all North Korean hacker threats.

For individuals, it is important to use common sense and be cautious of social engineering tactics. For example, if someone claims to have highly confidential information and is willing to share it with you, proceed with caution. Or if someone is exerting time pressure on you to download and run certain software, consider if they are trying to push you into a situation where rational thinking may be compromised.

For organizations, applying the principle of least privilege is crucial. Minimize the number of people with access to sensitive systems as much as possible, and ensure they use password managers and 2FA. Keep personal devices separate from work devices, and install Mobile Device Management (MDM) and Endpoint Detection and Response (EDR) software on work devices to ensure security pre-breach and visibility post-breach.

Unfortunately, for large exchanges or other high-value targets, TraderTraitor can cause more damage than expected even without the need for zero-day vulnerabilities. Therefore, additional preventive measures must be taken to eliminate single points of failure and prevent total loss of funds from a single intrusion.

However, even if all else fails, there is still hope. The FBI has a dedicated division to track and prevent North Korean intrusions, which has been conducting victim notifications for years, and recently I was pleased to assist agents from that division in reaching out to potential North Korean targets. Therefore, to be prepared for the worst-case scenario, ensure you have public contact information available, or that you are connected with a sufficient number of people in the ecosystem (e.g., SEAL 911), so that messages traversing the social graph can reach you at the fastest pace.

Original Article Link

関連記事

Trust Walletハッキングでユーザーは350万ドルの資産を失う

Key Takeaways Trust Walletのハッキング事件で、最大の損失を出したのは350万ドル相当の資産を持つアドレス。 第二の損失者は140万ドル相当の資産を失い、これらのウォレットは長期間休眠していた。 今回の事件で、Trust Walletから合計600万ドル以上の暗号資産が盗まれた。 この事件は、非托管型ウォレットのセキュリティーに関する大きな懸念を生む。 WEEX Crypto News, 26 December 2025 Trust Walletの概要とハッキング事件の発生 Trust Walletは、2017年にウクライナの開発者ヴィクトル・ラドチェンコによって設立され、現在は100以上のブロックチェーンをサポートする多機能暗号通貨ウォレットです。Binanceによる初めての買収として2018年に買収されたことで、その成長は加速しました。モバイルデバイスだけでなく、デスクトップブラウザでも使用でき、デジタル資産の保存、送信、受信をより確実に行うために設計されています。…

ビットコインとイーサリアムの歴史的オプション満期が迫る:市場はどう反応するか

Key Takeaways 本日、ビットコインとイーサリアムのオプション満期が合計270億ドルに達し、史上最大の規模となる。 ビットコインは約236億ドルのオプションを抱えており、88000ドル付近での価格動向が注目される。 イーサリアムでは、オプションの約37億ドル分が満期を迎え、短期的には3000ドルが重要な価格ポイント。 オプション満期後の資金フローと機関投資家の動向により、市場の次の動きが左右される。 WEEX Crypto News, 26 December 2025 オプション満期の影響について 本日、ビットコイン(BTC)とイーサリアム(ETH)のオプションが合わせて約270億ドルに達し、暗号通貨市場に大きな影響を及ぼすとみられています。特に、ビットコインのオプション満期は歴史的に最大規模で、これは市場に新たな波紋を投げかけています。オプション市場は、通常の現物市場とは異なり、価格変動やトレーダーの心理に大きな影響を与えることが知られていますが、今回の規模の大きさは特筆すべき事態です。 ビットコイン市場の展望 ビットコインのオプション満期額は236億ドルに達し、その多くがDeribitで取引されています。BTCの価格は現在87,000ドル近辺で推移しており、この満期は短期的な価格動向に大きな影響をもたらす可能性があります。特に、ビットコインオプションのプット・コール比率が0.33とされており、これが市場のボラティリティをさらに高める要因となっています。 イーサリアム市場の行方 イーサリアムは、本日満期を迎えるオプションが37億ドル分あり、これはトレーダーの動向にさらなる波乱をもたらす可能性があります。ETHの価格は3000ドルを軸に揺れ動いており、今回の満期が価格の上昇や下降を引き起こすか注目されています。特に、プット・コール比率が0.43であるため、ここでの動きが市場センチメントをどう変えるかが鍵となります。…

BDXNプロジェクトが40万ドル相当のBDXNトークンを複数の取引所に送金

Key Takeaways BDXN関連の3つのウォレットアドレスが、合計40万ドル相当のBDXNトークンを複数の取引所に送金。 トークンはプロジェクトのウォレットから2ヶ月前に移動された。 関与したアドレスは以下の通り:0xD5682dcA35D78c13b5103eB85c46cDCe28508dfB、0xD0Fc2894Dd2fe427a05980c2E3De8B7A89CB2672、0xAc245a570A914C84300f24a07eb59425bbdC1B48。 お金の動きはonchainschool.proによって監視されていた。 この出来事は、仮想通貨マーケットの透明性と監視能力の重要性を強調している。 WEEX Crypto News, 26 December 2025 BDXNトークンの大量送金の背景 BDXNプロジェクト関連の3つのウォレットアドレスが、いくつかの主要な仮想通貨取引所に40万ドル相当のBDXNトークンを送金したことが明らかになりました。この情報はonchainschool.proの監視によって報告されており、ウォレットの動きが詳細に追跡されています。 プロジェクトの目的と送金の理由 BDXNは、新興のプロジェクトであり、そのトークンは様々な用途に利用されます。この度の送金は、プロジェクトの資金管理や市場での取引に関連する可能性があります。特に、多くのプロジェクトが取引所での流動性を高めるためにトークンを移動することが一般的です。 ウォレットのアドレスとトークンの送金履歴…

ハイパーリクイッドでのビットコインとイーサリアムポジションの変化が浮き彫りに

Key Takeaways 最近、ハイパーリクイッドにおけるBTCの多頭巨鯨数が約2ヶ月で半減した。 ETHでは空頭巨鯨が多頭の2倍に増加している。 大手BTC空頭巨鯨の平均ポジション価格は8.82万ドル、清算価格は9.41万ドル。 ETH最大空頭巨鯨はポジション平均価格が3129ドル、清算価格が3796ドル。 WEEX Crypto News, 26 December 2025 ハイパーリクイッドにおけるポジションの動向 仮想通貨市場での最近の出来事は、投資家やトレーダーにとても重要な情報を提供しています。特にハイパーリクイッドプラットフォームでのビットコイン(BTC)およびイーサリアム(ETH)の動向に変化が見られます。市場分析ツールHyperInsightによると、このプラットフォーム上での多頭(買い)と空頭(売り)ポジションに大きな変化がありました。 BTC多頭ポジションの急減 過去2ヶ月間で、ハイパーリクイッドにおけるBTCの多頭巨鯨数が劇的に減少しました。今年の10月14日には234名の多頭巨鯨が存在しましたが、最新のデータではこれが122名にまで減少しています。これは約50%の減少を意味し、多頭の勢いが弱まっていることを示しています。一方で、現在の空頭巨鯨数は116名で、過去に比べて変化は少なく、若干の増加に留まっています。この動きは、ビットコインに対する市場全体のリスクアペタイトの変化を示唆しています。 ETH空頭の増加 イーサリアム市場では、空頭が多頭をかなり上回っています。現在、ETHの空頭巨鯨は113名で、多頭の58名に対して倍に達しています。このことは、特にイーサリアム市場での売り圧力が増している可能性を示唆しています。市場のセンチメントが冷却し、ETHに対して伝統的な強気ポジションを取り控える動きが広まっていると言えるでしょう。…

ビットコイン、9万ドルへの勢いを再び満たす

Key Takeaways マーケットでは短期的にビットコインが8.2万ドルから9.5万ドルまでの変動が予測される。 BTC価格が9万ドルを超え、24時間で1.53%上昇した。 Deribitで270億ドル相当のビットコインとイーサリアムのオプションが到期し、市場に影響を与える。 現物金と銀の価格が歴史的高値を更新、多くの投資家が注目している。 WEEX Crypto News, 26 December 2025 ビットコインの価格動向と市場の反応 12月26日、ビットコインの価格は再び9万ドルを試す動きを見せ、価格は急騰しています。最新のデータによれば、特に12月22日以降の上昇が顕著で、90,027ドルを記録し、24時間での上昇率は1.53%でした。この背景には、近日中に満期を迎えるビットコイン・オプションが市場に与える影響があると見られています。12月26日に予定されている270億ドル相当のオプション到期は、市場に新たな変革をもたらす可能性があります。 マーケットの変動と価格の背景 現時点でのビットコインの動きは、年内に9.5万ドルを超える可能性があると予測されています。この見通しの中では、特にオプション取引の影響が注目されています。取引所情報によると、ビットコイン価格の上昇は、このオプション取引の満期に伴う市場動向との関連が指摘されています。 また、市場は過去のビットコイン価格の大幅な変動に基づき、価格への影響を予測しています。今年初の価格からの回復は比較的遅れたものの、オプションの影響で通常の市場ダイナミクスが回復しつつあります。 現物資産の相場動向…

比特コイン史上最大の期権到期、BTC価格に波紋

Key Takeaways 236億ドル規模のビットコイン期権が到期し、短期的な価格変動が予想される。 BTCの取引価格は現在約8.7万ドルで推移している。 取引所Deribitで大量の未平倉契約が期権到期により清算される見込み。 市場は最大痛点価格9.5万ドルに向かって動く可能性がある。 短期的には約8.2万ドルまで下落した後に反発する予測がある。 WEEX Crypto News, 26 December 2025 史上最大の期権到期が及ぼすBTCの今後の動向 2025年12月26日、ビットコイン(BTC)は8.7万ドルの水準で圧力が続いている中、史上最大とされる期権到期を迎え、短期価格の動向を大きく揺るがしそうです。約236億ドル規模のBTC期権契約が12月24日にDeribitで到期する予定で、これは同取引所での未清算契約の半分以上を占めます。この結果、ビットコイン価格の短期的な方向性に注目が集まっています。 Deribit上の巨大な期権到期による市場への影響 Deribitでは、約30万枚のビットコイン期権と44.6万枚のiSharesビットコイン信託期権が到期します。この期権決済だけで市場の風向きを変えることはないかもしれませんが、過去数回のクリスマス期にみられた5%から7%の価格変動が再び発生する可能性が指摘されています。 Deribitのデータは、「最大痛点価格」が約9.5万ドルであることを示しており、多くの期権はこの価格で無価値となります。市場では0.38のプット・コール比率が報告されており、投資家は全体としてビットコインの中期的な見込みを楽観視しています。…

人気のコイン

最新暗号資産ニュース

もっと見る