Press "Enter" to skip to content

North Korean hackers are pretending to be crypto VCs in new phishing scheme — Kaspersky

The cybersecurity lab has noticed that the Lazarus Group and their associated hackers have been working hard lately. They say that this may continue in the next year or two.

BlueNoroff is a group that is associated with the North Korean government. They have recently started targeting different types of businesses and people again. A cybersecurity lab, Kaspersky, has found that this activity is on the rise. They believe that this is because the group is testing new ways to attack people and businesses.

BlueNoroff created fake domains that look like well-known companies in the venture capital and banking industries. Many of them pretend to be Japanese companies, but some are also pretending to be companies from other countries.

The group has been working on new file types and other ways to deliver malware, according to the report. Once installed, the malware avoids Windows security warnings about downloading content and then goes on to intercept large cryptocurrency transfers, changing the recipient’s address, and pushing the transfer amount to the limit, draining the account in a single transaction.

According to Kaspersky, the problem with threat actors is worsening. Researcher Seongsu Park said in a statement:

This year is going to be full of different kinds of cyber epidemics. Some of them will be more harmful than ever before. Businesses need to be extra careful in order to protect themselves from them.

The BlueNoroff cyber threat was first identified in 2016 after it attacked the Bangladeshi central bank. The U.S. Cybersecurity and Infrastructure Security Agency and Federal Bureau of Investigation have warned about this threat in recent months.

North Korean threat actors have been spotted trying to steal nonfungible tokens in recent weeks. The group was responsible for the $600-million Ronin Bridge exploit in March.

Be First to Comment

Leave a Reply

Your email address will not be published. Required fields are marked *