The North Korean group used has used prolonged phishing attacks to gain the trust of companies.
The North Korean group used has used prolonged phishing attacks to gain the trust of companies.
BlueNoroff, a North Korean hacking group, is now primarily targeting crypto startups, according to a report from cybersecurity firm Kaspersky.
BlueNoroff Is Solely Targeting Crypto Startups
The North Korean hacking group known as BlueNoroff is almost exclusively targeting cryptocurrency startups, according a new report from Kapersky.
BlueNoroff is a hacking group with ties to the larger crybercrime group Lazarus, which has been known to have strong ties with North Korea in the past. It initially targeted banks and the SWIFT payment network, beginning with an attack on Bangladeshs Central Bank in 2016.
But now, BlueNoroff has “shifted [its] focus…to solely cryptocurrency businesses” rather than traditional banks, Kaspersky says.
According to the report, the hacking group has historically begun each attack by “stalking and studying successful cryptocurrency startups” through prolonged phishing campaigns involving emails and internal chats.
BlueNoroff has impersonated several existing cryptocurrency businesses including Cardanos commercial arm, Emurgo, and the New York VC firm Digital Currency Group. It has also impersonated Beenos, Coinsquad, Decrypt Capital, and Coinbig.
Kaspersky noted that those companies were not compromised during the attacks.
Hackers Would Use Backdoors
After gaining the trust of the targeted startup and the members, the hackers would have the company install a modified software update with backdoor access, allowing for further intrusion.
Then, the group would use the backdoor to collect user credentials and monitor user keystrokes. This monitoring of user activity would last “for weeks or months,” Kaspersky says.
BlueNoroff would often exploit CVE-2017-0199 in Microsoft Office, which allows Visual Basic scripts to be executed in Word documents. The group would also replace browser wallet add-ons, such as Metamask, with compromised versions.
These strategies allowed the company to steal company funds as well as “set up a vast monitoring infrastructure” that notified the group of large transactions.
How Much Has Been Stolen?
Kaspersky did not state how much had been stolen via these attacks. However, Costin Raiu of Kaspersky previously identified bZx as one target of BlueNoroffs SnatchCrypto campaign. That exchange saw $55 million stolen from it in November 2021.
The U.S. Treasury has also suggested that BlueNoroff, along with Lazarus and other subgroup, stole $571 million in cryptocurrency from five exchanges between January 2017 and September 2018. BlueNoroff stole over $1.1 billion dollars from financial institutions by 2018, the Treasury said in the same report.
Incidentally, the analytics firm Chainalysis today suggested that North Korean hackers stole $400 million in 2021. However, this report mentioned only Lazarus generally, not BlueNoroff specifically.
As a reminder, WikiBit is ready to help you search the qualifications and reputation of projects in a bid to protect you from hidden dangers in this risky industry!
iOS: t.ly/UUCj
Android: t.ly/cfYt
Source: Crypto Briefing
Disclaimer:
Ang mga pananaw sa artikulong ito ay kumakatawan lamang sa mga personal na pananaw ng may-akda at hindi bumubuo ng payo sa pamumuhunan para sa platform na ito. Ang platform na ito ay hindi ginagarantiyahan ang kawastuhan, pagkakumpleto at pagiging maagap na impormasyon ng artikulo, o mananagot din para sa anumang pagkawala na sanhi ng paggamit o pag-asa ng impormasyon ng artikulo.
0.00