In February, North Korean thieves broke stories with what is now regarded as the largest single steal in crypto story.

The Lazarus Group stole at least$ 1.4 billion from Bybit and afterward funneled those resources to crypto machines.

” One had pulled off the biggest hack in]crypto] past, and we had a front-row seat”, Samczsun, Research Partner at Paradigm, recalled in a blog post.

The scholar said they witnessed the robbery in real-time and collaborated with Bybit to ensure the illicit entry.

Samczsun was working with SEAL 911, an emergency response system affiliated with the Security Alliance, a nonprofit organization dedicated to securing decentralized techniques.

But these problems aren’t most just about the Lazarus Group. There’s more to North Korea’s computer insurgencies than originally thought.

There’s a misunderstanding about how to” identify and name” the team’s businesses.

While the name” Lazarus Group” is” commonly acceptable”, discussing how the DPRK ( Democratic People’s Republic of Korea ) runs its computer functions on the offensive requires more strictness, Samczsun claimed.

Lazarus Group has become the preferred name by the press when describing DPRK cyberactivity. Security experts” created more accurate names” to present which types are working on certain activities, they added.

A phishing ministry

The DPRK’s hackers habitat operates under the Reconnaissance General Bureau (RGB), which houses many different parties: AppleJeus, APT38, DangerousPassword, and TraderTraito

These organizations operate with certain targeting approaches and technical capabilities.

TraderTraitor, identified as the most powerful DPRK professional targeting the crypto industry, focuses on exchanges with huge reserves and employs advanced techniques, properly compromising Axie Infinity through false job offers and manipulating WazirX.

AppleJeus specializes in sophisticated supply chain episodes, including the 2023 3CX exploit that probably affected 12 million customers.

Harmful Password, however, conducts lower-end cultural executive through phishing emails and malignant communications on platforms like Telegram.

Another group, APT38, spun out of Lazarus in 2016 and focused on economic acts. It first focused traditional lenders before shifting focus to crypto platforms.

In 2018, the OFAC second mentioned” North Korean IT workers”, which in 2023 were identified by researchers as” Deadly Meeting” and” Wagemole”, operating through schemes where the danger actors either pose as consultants or try to get hired by target organizations.

There’s also hope

While the DPRK has shown its potential to build zero-day attacks, there have been” no observed or known situations” of it deploying straight against the blockchain industry, Samczsun said.

The researcher urged crypto companies to implement basic security practices such as least privilege access, two-factor authentication, and device segregation. If preventive measures fail, connecting with security groups like SEAL 911 and the FBI’s DPRK unit would also be helpful.

” DPRK hackers are an ever-growing threat against our industry, and we can’t defeat an enemy that we don’t know or understand”, Samczsun wrote.

Daily Debrief Newsletter

Start every day with the top news stories right now, plus original features, a podcast, videos and more.

Share This Story, Choose Your Platform!