Lazarus Group

The cryptocurrency exchange eXch announced it will cease operations on May 1 due to money laundering allegations

ChainCatcher news, according to Cointelegraph, the cryptocurrency exchange eXch announced that it will cease operations on May 1. Earlier reports indicated that the exchange was used for money laundering, involving some of the stolen funds from the $1.4 billion hack incident related to Bybit.In an announcement on April 17, eXch stated that the majority of the management team voted to adopt a "stop and retreat" strategy in response to allegations that the North Korean hacking group Lazarus Group laundered approximately $35 million through the platform—funds that originated from the $1.4 billion hack suffered by Bybit.The exchange claimed it had become a target of a "transatlantic joint law enforcement operation" aimed at shutting down its business and potentially filing criminal charges. eXch stated in its announcement: "Although we have withstood multiple attempts to shut down our infrastructure and maintained operations, we believe it is pointless to continue operating in an environment where we have become a target of signals intelligence surveillance, solely due to the hostile environment created by the misinterpretation of our mission by certain individuals." The exchange initially denied blockchain detective claims that it assisted the Lazarus Group in laundering money but acknowledged handling a "very small portion of funds" from the February hack incident.

The North Korean hacker group Lazarus has implanted malware for stealing cryptocurrency in a new batch of JavaScript packages

ChainCatcher news, according to Decrypt, the Socket research team has discovered in a new attack that the North Korean hacker group Lazarus is associated with six new malicious npm packages that attempt to deploy backdoors to steal user credentials.Additionally, this malware can extract cryptocurrency data and steal sensitive information from Solana and Exodus crypto wallets. The attacks primarily target files from Google Chrome, Brave, and Firefox browsers, as well as keychain data on macOS, specifically tricking developers into inadvertently installing these malicious packages.The six discovered malicious packages include: is-buffer-validator, yoojae-validator, event-handle-package, array-empty-validator, react-event-dependency, and auth-validator. They lure developers into installation through "typosquatting" (exploiting misspelled names). The APT group has created and maintained GitHub repositories for five of these packages, disguising them as legitimate open-source projects, increasing the risk of developers using the malicious code. These packages have been downloaded over 330 times. Currently, the Socket team has requested the removal of these packages and reported the related GitHub repositories and user accounts.Lazarus is a notorious North Korean hacker group, linked to the recent $1.4 billion Bybit hack, the $41 million Stake hack, the $27 million CoinEx hack, and countless other attacks in the crypto industry.

Bybit proposes to request the ParaSwap DAO to return the fees obtained from the hacker exchange

ChainCatcher news, according to Cointelegraph, the cryptocurrency exchange Bybit has confirmed that it has initiated a proposal requesting the decentralized finance (DeFi) protocol ParaSwap to return the transaction fees generated from trading with digital assets stolen from the exchange by the Lazarus hacker group.On March 4, a proposal was published on the ParaSwap decentralized autonomous organization (DAO) forum, requesting the freezing and return of 44.67 wETH worth nearly $100,000. The proposal initially raised skepticism, with several DAO members demanding verification of its origin. Bybit posted a verification message on its official X account on March 5, confirming that the proposal was initiated by them.This proposal for fund return sparked intense discussions among DAO members. DeFi researcher and ParaSwap DAO representative Ignas pointed out that profiting from a hacker attack gives a "bad image" to the DAO, and returning the funds would demonstrate support for industry peers. He added that retaining these funds could attract regulatory scrutiny and legal troubles. However, he also warned that refunds would set a dangerous precedent for DeFi: "Code is law. The DAO legally earned the fees through smart contracts. If we return the funds now, what happens in similar situations in the future? This would set a dangerous precedent."Opinions among ParaSwap DAO members are divided, with some supporting conditional refunds of the fees, while others voted against the refund. DAO member SEED Gov proposed three possible courses of action: full refund, rejection of the request, or negotiating a structured refund that includes retaining 10% as a bounty, consistent with Bybit's existing bug bounty program.

Safe: The developer's machine was compromised, leading to the theft of Bybit; there are no vulnerabilities in the contract and frontend code

ChainCatcher news, Safe responded on platform X to Bybit's hacking forensic report, stating that the forensic review of the targeted attack by the Lazarus Group on Bybit concluded that the attack on Bybit Safe was executed through compromised Safe{Wallet} developer machines, leading to disguised malicious transactions.Lazarus is a government-backed North Korean hacking organization known for its complex social engineering attacks on developer credentials, sometimes combined with zero-day vulnerabilities. The forensic review by external security researchers did not indicate any vulnerabilities in the Safe smart contracts or the source code of the front end and services.Following the recent incident, the Safe{Wallet} team conducted a thorough investigation and has now phased the restoration of Safe{Wallet} on the Ethereum mainnet. The Safe{Wallet} team has completely rebuilt and reconfigured all infrastructure and rotated all credentials to ensure the complete elimination of the attack vector.After the final results of the investigation are released, the Safe{Wallet} team will publish a complete post-mortem analysis. The Safe{Wallet} front end is still operational and has implemented additional security measures. However, users need to be extra cautious and vigilant when signing transactions.

Slow Fog Cosine: Confirmed that the attacker of the CEX theft incident is the North Korean hacker group Lazarus Group, which has revealed its attack methods

ChainCatcher news, Slow Mist founder Yu Xian posted on social media, "Through forensic analysis and correlation tracking, we confirm that the attackers of the CEX theft incident are the North Korean hacker group Lazarus Group. This is a nation-state APT attack targeting cryptocurrency trading platforms. We have decided to share the relevant IOCs (Indicators of Compromise), which include some IPs of cloud service providers, proxies, etc. It is important to note that this disclosure does not specify which platform or platforms were involved, nor does it mention Bybit; if there are similarities, it is indeed not impossible."The attackers utilized pyyaml for RCE (Remote Code Execution), enabling the delivery of malicious code to control target computers and servers. This method bypassed most antivirus software. After synchronizing intelligence with partners, multiple similar malicious samples were obtained. The main goal of the attackers is to gain control over wallets by infiltrating the infrastructure of cryptocurrency trading platforms, thereby illegally transferring a large amount of cryptocurrency assets from the wallets.Slow Mist published a summary article revealing the attack methods of the Lazarus Group, and also analyzed their use of social engineering, vulnerability exploitation, privilege escalation, internal network penetration, and fund transfer tactics. At the same time, based on actual cases, they summarized defense recommendations against APT attacks, hoping to provide references for the industry and help more institutions enhance their security capabilities and reduce the impact of potential threats.
ChainCatcher Building the Web3 world with innovators