Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
 |
2025-03-10 01:11:47 |
Les pirates nord-coréens encaissent des centaines de millions à partir de 1,5 milliard de dollars de piratage North Korean hackers cash out hundreds of millions from $1.5bn ByBit hack (lien direct) |
Les pirates du tristement célèbre groupe Lazare sont dans un jeu de chat et de souris pour blanchir leurs fonds volés au braquage du Bybit.
Hackers from the infamous Lazarus Group are in a cat-and-mouse game to launder their stolen funds from the ByBit heist. |
Hack
|
APT 38
|
★★★
|
 |
2025-03-03 14:05:24 |
Comment la Corée du Nord a exécuté le plus gros crispo de tous les temps How North Korea Executed the Largest Crypto Heist Ever (lien direct) |
Le groupe de Lazarus de la Corée du Nord a réussi le piratage de 1 milliard de dollars, ce qui en fait le plus grand braquage de crypto de tous les temps. Voici comment ils l'ont fait et ce qui est à côté.
North Korea\'s Lazarus Group pulled off the $1.5B Bybit hack, making it the biggest crypto heist ever. Here\'s how they did it-and what\'s next. |
Hack
|
APT 38
|
★★★
|
 |
2025-02-27 15:28:39 |
Le FBI exhorte la communauté crypto à éviter le blanchiment de fonds de Bybit Hack FBI urges crypto community to avoid laundering funds from Bybit hack (lien direct) |
Le Bureau a attribué le piratage de 1,5 milliard de dollars à l'acteur de menace nord-coréen connu sous le nom de TraderTraitor, ou Lazarus, à la suite d'évaluations similaires de chercheurs en cybersécurité.
The bureau attributed the $1.5 billion hack to the North Korean threat actor known as TraderTraitor, or Lazarus, following similar assessments by cybersecurity researchers. |
Hack
Threat
|
APT 38
|
★★★
|
 |
2025-02-27 12:45:00 |
Bybit Hack Traced to Safe {Wallet} Attaque de la chaîne d'approvisionnement exploitée par des pirates nord-coréens Bybit Hack Traced to Safe{Wallet} Supply Chain Attack Exploited by North Korean Hackers (lien direct) |
Le Federal Bureau of Investigation (FBI) des États-Unis a officiellement lié le piratage record de 1,5 milliard de dollars à des acteurs de menace nord-coréens, alors que le PDG de la société Ben Zhou a déclaré une «guerre contre Lazare».
L'agence a déclaré que la République de Corée du peuple démocrate (Corée du Nord) était responsable du vol des actifs virtuels de l'échange de crypto-monnaie, l'attribuant à un cluster spécifique
The U.S. Federal Bureau of Investigation (FBI) formally linked the record-breaking $1.5 billion Bybit hack to North Korean threat actors, as the company\'s CEO Ben Zhou declared a "war against Lazarus."
The agency said the Democratic People\'s Republic of Korea (North Korea) was responsible for the theft of the virtual assets from the cryptocurrency exchange, attributing it to a specific cluster |
Hack
Threat
|
APT 38
|
★★★
|
 |
2025-02-23 20:13:39 |
Les enquêteurs relient 1,4 milliard de dollars de piratage par bybit au groupe de Lazarus de la Corée du Nord Investigators Link $1.4B Bybit Hack to North Korea\\'s Lazarus Group (lien direct) |
Les enquêteurs relient le piratage de 1 milliard de dollars au groupe de Lazarus de la Corée du Nord, exposant un braquage de crypto majeur lié à la cybercriminalité et au blanchiment d'argent soutenues par l'État.
Investigators link the $1.4B Bybit hack to North Korea\'s Lazarus Group, exposing a major crypto heist tied to state-backed cybercrime and money laundering. |
Hack
|
APT 38
|
★★
|
 |
2024-09-11 17:09:36 |
Test de codage de Fake Password Manager utilisé pour pirater les développeurs Python Fake password manager coding test used to hack Python developers (lien direct) |
Les membres du groupe de pirates nord-coréen Lazarus se faisant passer pour les recruteurs apporcent les développeurs Python avec un projet de test de codage pour des produits de gestion de mot de passe qui incluent des logiciels malveillants.[...]
Members of the North Korean hacker group Lazarus posing as recruiters are baiting Python developers with coding test project for password management products that include malware. [...] |
Malware
Hack
|
APT 38
|
★★★
|
 |
2024-09-03 14:00:00 |
ATTENTIONS DÉFÉRENCES - Examiner les cambriolages Web3 DeFied Expectations - Examining Web3 Heists (lien direct) |
Written by: Robert Wallace, Blas Kojusner, Joseph Dobson
Where money goes, crime follows. The rapid growth of Web3 has presented new opportunities for threat actors, especially in decentralized finance (DeFi), where the heists are larger and more numerous than anything seen in the traditional finance sector. Mandiant has a long history of investigating bank heists. In 2016, Mandiant investigated the world\'s largest bank heist that occurred at the Bank of Bangladesh and resulted in the theft of $81 million by North Korea\'s APT38. While the group\'s operations were quite innovative and made for an entertaining 10-episode podcast by the BBC, it pales in comparison to Web3 heists. In 2022, the largest DeFi heist occurred on Sky Mavis\' Ronin Blockchain, which resulted in the theft of over $600 million by North Korean threat actors. While North Korea is arguably the world\'s leading cyber criminal enterprise, they are not the only player. Since 2020, there have been hundreds of Web3 heists reported, which has resulted in over $12 billion in stolen digital assets
Source: Chainalysis 2024 Crypto Crime Report
While social engineering, crypto drainers, rug pulls (scams), and |
Malware
Hack
Vulnerability
Threat
Cloud
|
APT 38
|
★★
|
 |
2024-03-19 14:01:20 |
Lazarus Group : Hack de HTX et Heco (lien direct) |
En novembre 2023, une attaque coordonnée a visé la plateforme d'échange HTX et le pont cross-chain Heco, entraînant le vol de 112,5 millions de dollars en cryptomonnaies. Le groupe de hackers nord-coréen Lazarus Group derrière l'attaque ?... |
Hack
|
APT 38
|
★★★
|
 |
2023-09-29 05:30:00 |
Lazarus Hackers inaugure une entreprise aérospatiale avec de nouveaux logiciels malveillants sans lumière Lazarus hackers breach aerospace firm with new LightlessCan malware (lien direct) |
Le groupe de piratage nord-coréen \\ 'Lazarus \' a ciblé les employés d'une entreprise aérospatiale située en Espagne avec de fausses possibilités d'emploi pour pirater le réseau d'entreprise à l'aide d'une porte dérobée \\ 'sans lightlescan \'.[...]
The North Korean \'Lazarus\' hacking group targeted employees of an aerospace company located in Spain with fake job opportunities to hack into the corporate network using a previously unknown \'LightlessCan\' backdoor. [...] |
Malware
Hack
|
APT 38
|
★★★
|
 |
2023-08-23 14:49:00 |
Les hackers de Lazarus de la Corée du Nord derrière les récentes cris de crypto: FBI North Korea\\'s Lazarus hackers behind recent crypto heists: FBI (lien direct) |
Le FBI a attribué trois cyberattaques récentes sur les plateformes de crypto-monnaie au groupe de piratage APT38 du gouvernement nord-coréen - connu par de nombreux chercheurs sous le nom de Lazarus ouTRADERTRAITOR .Juin a vu trois incidents à la tête de titre impliquant des sociétés de crypto-monnaie: un 100 millions de dollars de pirate de portefeuille atomique le 2 juin , ainsi que deux attaques du 22 juin dans lesquelles les cybercriminels
The FBI has attributed three recent cyberattacks on cryptocurrency platforms to the North Korean government\'s APT38 hacking group - known by many researchers as Lazarus or TraderTraitor. June saw three headline-grabbing incidents involving cryptocurrency companies: a $100 million hack of Atomic Wallet on June 2, as well as two June 22 attacks in which cybercriminals |
Hack
|
APT 38
APT 38
|
★★
|
 |
2023-04-22 12:16:00 |
Lazarus X_Trader Hack a un impact sur les infrastructures critiques au-delà Lazarus X_TRADER Hack Impacts Critical Infrastructure Beyond 3CX Breach (lien direct) |
Lazare, le prolifique groupe de piratage nord-coréen derrière l'attaque de la chaîne d'approvisionnement en cascade ciblant 3CX, a également violé deux organisations d'infrastructures critiques dans le secteur de l'énergie et de l'énergie et deux autres entreprises impliquées dans le négociation financière en utilisant l'application X_Trader Trojanisée.
Les nouvelles conclusions, qui viennent gracieuseté de l'équipe Hunter Hunter de Symantec \\, confirment les soupçons antérieurs que le
Lazarus, the prolific North Korean hacking group behind the cascading supply chain attack targeting 3CX, also breached two critical infrastructure organizations in the power and energy sector and two other businesses involved in financial trading using the trojanized X_TRADER application.
The new findings, which come courtesy of Symantec\'s Threat Hunter Team, confirm earlier suspicions that the |
Hack
Threat
|
APT 38
|
★★
|
 |
2023-03-31 12:16:00 |
Plus de preuves relie l'attaque de la chaîne d'approvisionnement 3CX au groupe de piratage nord-coréen [More evidence links 3CX supply-chain attack to North Korean hacking group] (lien direct) |
L'attaque de la chaîne d'approvisionnement contre la société de téléphone d'entreprise 3CX a utilisé le code de piratage qui «correspond exactement» au malware maltraité précédemment dans les attaques par un groupe nord-coréen notoire, selon une nouvelle analyse.L'établissement de l'étendue des dommages causés par le pirat
The supply-chain attack on the enterprise phone company 3CX used hacking code that “exactly matches” malware previously seen in attacks by a notorious North Korean group, according to new analysis. Establishing the extent of the damage caused by the hack has been a priority for researchers after a number of cybersecurity businesses went public with |
Malware
Hack
|
APT 38
|
★★
|
 |
2023-03-08 16:04:00 |
Lazarus Group Exploits Zero-Day Vulnerability to Hack South Korean Financial Entity (lien direct) |
The North Korea-linked Lazarus Group has been observed weaponizing flaws in an undisclosed software to breach a financial business entity in South Korea twice within a span of a year.
While the first attack in May 2022 entailed the use of a vulnerable version of a certificate software that's widely used by public institutions and universities, the re-infiltration in October 2022 involved the |
Hack
Vulnerability
Medical
|
APT 38
|
★★★
|
 |
2023-02-28 14:00:00 |
CyberheistNews Vol 13 #09 [Eye Opener] Should You Click on Unsubscribe? (lien direct) |
CyberheistNews Vol 13 #09 | February 28th, 2023
[Eye Opener] Should You Click on Unsubscribe?
By Roger A. Grimes.
Some common questions we get are "Should I click on an unwanted email's 'Unsubscribe' link? Will that lead to more or less unwanted email?"
The short answer is that, in general, it is OK to click on a legitimate vendor's unsubscribe link. But if you think the email is sketchy or coming from a source you would not want to validate your email address as valid and active, or are unsure, do not take the chance, skip the unsubscribe action.
In many countries, legitimate vendors are bound by law to offer (free) unsubscribe functionality and abide by a user's preferences. For example, in the U.S., the 2003 CAN-SPAM Act states that businesses must offer clear instructions on how the recipient can remove themselves from the involved mailing list and that request must be honored within 10 days.
Note: Many countries have laws similar to the CAN-SPAM Act, although with privacy protection ranging the privacy spectrum from very little to a lot more protection. The unsubscribe feature does not have to be a URL link, but it does have to be an "internet-based way." The most popular alternative method besides a URL link is an email address to use.
In some cases, there are specific instructions you have to follow, such as put "Unsubscribe" in the subject of the email. Other times you are expected to craft your own message. Luckily, most of the time simply sending any email to the listed unsubscribe email address is enough to remove your email address from the mailing list.
[CONTINUED] at the KnowBe4 blog:https://blog.knowbe4.com/should-you-click-on-unsubscribe
[Live Demo] Ridiculously Easy Security Awareness Training and Phishing
Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense.
Join us TOMORROW, Wednesday, March 1, @ 2:00 PM (ET), for a live demo of how KnowBe4 introduces a new-school approac |
Malware
Hack
Tool
Vulnerability
Threat
Guideline
Prediction
|
APT 38
ChatGPT
|
★★★
|
 |
2023-02-17 12:19:21 |
Norwegian police recover $5.8M crypto from massive Axie Infinity hack (lien direct) |
Norwegian police (Økokrim) have seized 60 million kroner ($5,800,000) worth of cryptocurrency stolen by the North Korean Lazarus hacking group last year from Axie Infinity's Ronin Bridge. [...] |
Hack
|
APT 38
|
★★
|
 |
2023-02-17 05:15:06 |
Norway finds a way to recover crypto North Korea pinched in Axie heist (lien direct) |
Meanwhile South Korea's Do Kwon is sought for fraud by US authorities Norwegian authorities announced on Thursday that they had recovered $5.9 million of cryptocurrency stolen in the Axie Infinity hack – an incident widely held to have been perpetrated by the Lazarus Group, which has links to North Korea.… |
Hack
Medical
|
APT 38
|
★★★
|
 |
2023-01-24 17:28:00 |
FBI Says North Korean Hackers Behind $100 Million Horizon Bridge Crypto Theft (lien direct) |
The U.S. Federal Bureau of Investigation (FBI) on Monday confirmed that North Korean threat actors were responsible for the theft of $100 million in cryptocurrency assets from Harmony Horizon Bridge in June 2022.
The law enforcement agency attributed the hack to the Lazarus Group and APT38, the latter of which is a North Korean state-sponsored threat group that specializes in financial cyber |
Hack
Threat
Medical
|
APT 38
|
★★
|
 |
2023-01-24 17:00:00 |
FBI Confirms Lazarus Group Was Behind $100m Harmony Hack (lien direct) |
The North Korean cyber actors laundered over $60m worth of Ethereum stolen during the heist |
Hack
|
APT 38
|
★★★
|
 |
2023-01-24 09:49:59 |
FBI: North Korean hackers stole $100 million in Harmony crypto hack (lien direct) |
The FBI has concluded its investigation on the $100 million worth of ETH heist that hit Harmony Horizon in June 2022 and validated that the hackers responsible for it are the Lazarus group and APT38. [...] |
Hack
Medical
|
APT 38
|
★★
|
 |
2022-10-31 01:57:31 |
A Case of Malware Infection by the Lazarus Attack Group Disabling Anti-Malware Programs With the BYOVD Technique (lien direct) |
In the ASEC blog post uploaded on April 2022 (New Malware of Lazarus Threat Actor Group Exploiting INITECH Process, https://asec.ahnlab.com/en/33801/), the team discussed the fact that the Lazarus attack group had been exploiting the INITECH process to infect systems with malware. This article aims to cover the details of the Lazarus group using the watering hole technique to hack into systems before exploiting the vulnerability of the MagicLine4NX product from Dream Security in order to additionally hack into systems in...
|
Malware
Hack
Vulnerability
Threat
Medical
|
APT 38
|
|
 |
2022-09-27 14:55:43 |
Lazarus hackers drop macOS malware via Crypto.com job offers (lien direct) |
The North Korean Lazarus hacking group is now using fake 'Crypto.com' job offers to hack developers and artists in the crypto space, likely with a long-term goal of stealing digital assets and cryptocurrency. [...] |
Malware
Hack
|
APT 38
|
|
 |
2022-09-12 14:24:45 |
Lazarus APT Uses Log4j Flaw To Hack US, Canadian Energy Co\'s – Cyber Experts Comment (lien direct) |
Researchers have uncovered a new campaign targeting U.S., Canadian and Japanese energy providers to the North Korean Lazarus APT hacking group. The initial vector was the exploitation of the Log4j vulnerability on exposed VMware Horizon servers which was used to gain an initial foothold into targeted organizations https://blog.talosintelligence.com/2022/09/lazarus-three-rats.html |
Hack
|
APT 38
|
|
 |
2022-08-17 09:33:15 |
(Déjà vu) Job Seekers Targeted in Lazarus Group Hack (lien direct) |
The North Korea state-backed Lazarus Group has been observed to be targeting job seekers with malware capable of executing on Apple Macs with Intel and M1 chipsets. ESET, a Slovak cybersecurity firm, linked these events to a campaign dubbed “Operation In(ter)ception” that was first disclosed in June 2020 and involved using social engineering tactics to […]
|
Malware
Hack
Medical
|
APT 38
|
|
 |
2022-07-08 16:00:00 |
Spear Phishing Fake Job Offer Likely Behind Axie Infinity\'s Lazarus $600m Hack (lien direct) |
The message with the fake offer contained a PDF that would have delivered spyware |
Hack
|
APT 38
|
|
 |
2022-06-30 17:58:47 |
Experts blame North Korea-linked Lazarus APT for the Harmony hack (lien direct) |
>North Korea-linked Lazarus APT group is suspected to be behind the recent hack of the Harmony Horizon Bridge. Recently, threat actors have stolen $100 million in cryptocurrency from the Blockchain company Harmony. The company reported the incident to the authorities, the FBI is investigating the cyber heist with the help of several cybersecurity firms. Harmony's […]
|
Hack
Threat
|
APT 38
|
|
 |
2022-06-30 17:27:16 |
North Korea Lazarus Hackers Blamed for $100 Million Horizon Bridge Heist (lien direct) |
The infamous North Korean Lazarus hacking group is the prime suspect in the $100 million hack of Harmony's Horizon Bridge, according to new data and research from blockchain analytics firm Elliptic.
|
Hack
|
APT 38
|
|
 |
2022-06-30 16:00:00 |
North Korea\'s Lazarus Group Suspected of $100m Harmony Hack (lien direct) |
Elliptic used Tornado demixing techniques to trace the stolen funds to new Ethereum wallets |
Hack
|
APT 38
|
|
 |
2022-06-29 23:01:41 |
North Korean Hackers Suspected to be Behind $100M Horizon Bridge Hack (lien direct) |
The notorious North Korea-backed hacking collective Lazarus Group is suspected to be behind the recent $100 million altcoin theft from Harmony Horizon Bridge, citing similarities to the Ronin bridge attack in March 2022.
The finding comes as Harmony confirmed that its Horizon Bridge, a platform that allows users to move cryptocurrency across different blockchains, had been breached last week. |
Hack
Medical
|
APT 38
|
|
 |
2022-05-27 08:00:43 |
IT threat evolution Q1 2022 (lien direct) |
Kaspersky IT threat review in Q1 2022: activity of APTs such as MoonBounce, BlueNororff, Lazarus and Roaming Mantis, attacks against Ukraine, phishing kits, Okta hack and more. |
Hack
Threat
|
APT 38
|
★★★
|
 |
2022-05-06 21:23:05 |
U.S. Sanctions Cryptocurrency Mixer Blender for Helping North Korea Launder Millions (lien direct) |
The U.S. Treasury Department on Friday moved to sanction virtual currency mixer Blender.io, marking the first time a mixing service has been subjected to economic blockades.
The move signals continued efforts on the part of the government to prevent North Korea's Lazarus Group from laundering the funds stolen from the unprecedented hack of Ronin Bridge in late March.
The newly imposed sanctions, |
Hack
Medical
|
APT 38
APT 28
|
★★★
|
 |
2022-04-16 01:31:45 |
Lazarus Group Behind $540 Million Axie Infinity Crypto Hack and Attacks on Chemical Sector (lien direct) |
The U.S. Treasury Department has implicated the North Korea-backed Lazarus Group (aka Hidden Cobra) in the theft of $540 million from video game Axie Infinity's Ronin Network last month.
On Thursday, the Treasury tied the Ethereum wallet address that received the stolen funds to the threat actor and sanctioned the funds by adding the address to the Office of Foreign Assets Control's (OFAC) |
Hack
Threat
Medical
|
APT 38
APT 28
|
|
 |
2021-11-10 12:08:04 |
Lazarus hackers target researchers with trojanized IDA Pro (lien direct) |
A North Korean state-sponsored hacking group known as Lazarus is again trying to hack security researchers, this time with a trojanized pirated version of the popular IDA Pro reverse engineering application. [...] |
Hack
|
APT 38
APT 28
|
|
 |
2018-11-10 14:47:00 |
(Déjà vu) Symantec shared details of North Korean Lazarus\'s FastCash Trojan used to hack banks (lien direct) |
North Korea-linked Lazarus Group has been using FastCash Trojan to compromise AIX servers to empty tens of millions of dollars from ATMs. Security experts from Symantec have discovered a malware, tracked as FastCash Trojan, that was used by the Lazarus APT Group, in a string of attacks against ATMs. The ATP group has been using this malware […]
|
Malware
Hack
Medical
|
APT 38
|
|
 |
2018-09-07 18:26:02 |
North Korean hacker charged for WannaCry and Sony cyberattacks (lien direct) |
U.S. charges North Korean hacker for WannaCry, Sony cyber attacks The U.S. government on Thursday charged and sanctioned a North Korean hacker for the 2014 Sony hack and the 2017 WannaCry global ransomware cyberattack, U.S. officials said. The accused, Park Jin Hyok worked as part of a team of hackers, also known as the Lazarus […]
|
Ransomware
Hack
|
Wannacry
APT 38
|
|
 |
2018-06-26 04:44:00 |
Lazarus APT hackers leverages HWP Documents in a recent string of attacks (lien direct) |
Security researchers at AlienVault uncovered a series of cyber attacks on cryptocurrency exchanges leveraging weaponized Hangul Word Processor HWP documents (Hangul Word Processor documents). The string of attacks involving the HWP documents has been attributed to the North Korea-linked Lazarus APT group, and includes the hack of the South Korean virtual currency exchange Bithumb. The hackers […]
|
Hack
Threat
|
Bithumb
APT 38
|
|