{"id":126189,"date":"2025-03-31T22:15:27","date_gmt":"2025-03-31T22:15:27","guid":{"rendered":"http:\/\/cryptospotters.net\/?p=126189"},"modified":"2025-03-31T22:15:27","modified_gmt":"2025-03-31T22:15:27","slug":"north-korean-crypto-attacks-rising-in-sophistication-actors-paradigm","status":"publish","type":"post","link":"http:\/\/cryptospotters.net\/?p=126189","title":{"rendered":"North Korean crypto attacks rising in sophistication, actors \u2014 Paradigm"},"content":{"rendered":"<p>Source: Cointelegraph.com NewsNorth Korean cyberwarfare attacks on the cryptocurrency industry are growing in sophistication and in the number of groups involved in such criminal activity, crypto firm Paradigm warns in report titled \u201cDemystifying the North Korean Threat.\u201d<br \/>\nNorth Korea-originated cyberattacks range from assaults on exchanges and social engineering attempts to phishing attacks and complex supply chain hijacks, the report says. In some cases, the attacks take a year to play out, with North Korean operatives biding their time.<br \/>\nThe United Nations estimates that between 2017 and 2023, North Korean hackers have netted the country $3 billion. The total haul has skyrocketed in 2024 and this year, with successful attacks against crypto exchanges WazirX and Bybit, which together netted attackers around $1.7 billion.<br \/>\nParadigm writes that the North Korean organizations orchestrating these attacks number at least five: Lazarus Group, Spinout, AppleJeus, Dangerous Password, and TraitorTrader. There is also a coalition of North Korean operatives who pose as IT workers, infiltrating tech companies around the world.<br \/>\nRelated: Typosquatting in crypto, explained: How hackers exploit small mistakes<br \/>\nHigh-profile attacks and predictable laundering methods<br \/>\nLazarus Group, the most well-known North Korean hacking team, is given credit for some of the most high-profile cyberattacks since 2016. According to Paradigm, the group hacked Sony and the Bank of Bangladesh in 2016 and helped orchestrate the WannaCry 2.0 ransomware attack in 2017.<br \/>\nIt has also taken aim at the cryptocurrency industry, sometimes to great effect. In 2017, the group hit two crypto exchanges \u2014 Youbit and Bithumb. In 2022, Lazarus Group exploited the Ronin Bridge, resulting in hundreds of millions in lost assets. And in 2025, it infamously stole $1.5 billion from Bybit, sending shock throughout the crypto community. The group may be behind some Solana memecoin scams.<br \/>\nAs Chainalysis and other organizations have explained, Lazarus Group also has predictable money laundering methods after securing a haul. It breaks up the stolen amount into smaller and smaller pieces, sending them to countless other wallets. It then swaps the more illiquid coins for those with higher liquidity and converts much of it to Bitcoin (BTC). After that, the group may sit on the stolen money for a long period of time until the attention from law enforcement dies down.<br \/>\nThe FBI has so far identified three alleged members of the Lazarus Group, accusing them of cybercrimes. In February 2021, the US Justice Department indicted two of those members for involvement in global cybercrimes.\u00a0<br \/>\nMagazine: Lazarus Group\u2019s favorite exploit revealed \u2014 Crypto hacks analysis<a href=\"https:\/\/cointelegraph.com\/news\/north-korean-crypto-attacks-rising-sophistication-actors-paradigm?utm_source=rss_feed&amp;utm_medium=rss&amp;utm_campaign=rss_partner_inbound\" target=\"_blank\" class=\"feedzy-rss-link-icon\" rel=\"noopener\">Read More<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Source: Cointelegraph.com NewsNorth Korean cyberwarfare attacks on the cryptocurrency industry are growing in sophistication and in the number of groups involved in such criminal activity, crypto firm Paradigm warns in&hellip; <\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"_links":{"self":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts\/126189"}],"collection":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=126189"}],"version-history":[{"count":0,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts\/126189\/revisions"}],"wp:attachment":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=126189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=126189"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=126189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}