Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 1 / 2
21 résultats taggé Lazarus  ✕
North Korea accused of £17m crypto heist that killed British start-up https://www.telegraph.co.uk/business/2025/08/17/north-korea-17m-crypto-heist-british-start-up/
24/08/2025 21:20:26
QRCode
archive.org

telegraph.co.uk 2025/08/17/ - Lazarus cyber gang believed to have used stolen funds to boost military and nuclear programmes

North Korean hackers have been accused of a £17m Bitcoin heist that brought down a UK-based cryptocurrency company.

Lazarus, the hermit kingdom’s notorious cyber gang, has been identified as the potential culprit behind the theft of cryptocurrency from Lykke, a trading platform incorporated in Britain.

If confirmed, it would be North Korea’s biggest-known cryptocurrency heist to target Britain. The pariah state has made billions in recent years stealing cryptocurrency to fund its military and nuclear programmes.

Lykke was founded in 2015 and operated from Switzerland but was registered in the UK. The company said last year that it had lost $22.8m (£16.8m) in Bitcoin, Ethereum and other cryptocurrencies, forcing it to halt operations.

In March a judge ordered the company to be liquidated after a legal campaign from more than 70 affected users.

North Korea was named as the potential hacker in a recent report by the Office of Financial Sanctions Implementation (OFSI), a branch of the Treasury.

“The attack has been attributed to malicious Democratic People’s Republic of Korea cyberactors, who stole funds on both the Bitcoin and Ethereum networks,” it said.

The Treasury said the OFSI did not reveal the sources of its information but that it worked closely with law enforcement.

Lazarus had been separately blamed for the attack on Lykke by Whitestream, an Israeli cryptocurrency research company.

It said the attackers had laundered the stolen funds through two other cryptocurrency companies notorious for allowing users to hide their tracks, and thus avoid money-laundering controls.

Other researchers have disagreed with the conclusions, saying it is not currently possible to determine who hacked the exchange.

Lykke was founded by Richard Olsen, a great-grandson of the Swiss banking patriarch Julius Baer, and offered cryptocurrency trading without transaction fees.

The company was run out of Zug in Switzerland’s so-called “crypto valley” but its corporate entity was registered in Britain.

In 2023, the Financial Conduct Authority issued a warning about the company, saying it was not registered or authorised to offer financial services for consumers in Britain.

Despite saying it would be able to return customers’ funds, it froze trading after the hack and officially shut down last December.

The company was liquidated in March following a winding up petition in the UK courts brought by a group of customers, who say they have lost £5.7m as a result of the company shutting down.

Interpath Advisory has been appointed to distribute the remaining funds to those who lost money. Its Swiss parent was placed into liquidation last year.

Mr Olsen was declared bankrupt in January and is the subject of criminal investigations in Switzerland, according to British legal filings. He did not respond to requests for comment.

telegraph.co.uk Lykke UK Switzerland Lazarus crypto heist
From Contagious to ClickFake Interview: Lazarus leveraging the ClickFix tactic https://blog.sekoia.io/clickfake-interview-campaign-by-lazarus/
01/04/2025 11:54:41
QRCode
archive.org
thumbnail

Discover how Lazarus leverages fake job sites in the ClickFake Interview campaign targeting crypto firms using the ClickFix tactic.

sekoia EN 2025 ClickFake Interview ClickFix Lazarus
Astrill VPN: Silent Push Publicly Releases New IPs on VPN Service Heavily Used by North Korean Threat Actors https://www.silentpush.com/blog/astrill-vpn/
03/03/2025 11:16:58
QRCode
archive.org
thumbnail

Silent Push reveals Astrill VPN is still being heavily used by NK Lazarus Group threat actors to hide their IP addresses during attacks

silentpush EN205 Astrill VPN Lazarus North-Korea
Stealthy Attributes of APT Lazarus: Evading Detection with Extended Attributes https://www.group-ib.com/blog/stealthy-attributes-of-apt-lazarus/
14/11/2024 00:02:10
QRCode
archive.org

APT Lazarus has begun attempting to smuggle code using custom extended attributes.

Extended attributes are metadata that can be associated with files and directories in various file systems. They allow users to store additional information about a file beyond the standard attributes like file size, timestamps, and permissions.

group-ib EN 2024 Extended attributes macos Smuggling APT Lazarus
Windows 0-day was exploited by North Korea to install advanced rootkit https://arstechnica.com/security/2024/08/windows-0-day-was-exploited-by-north-korea-to-install-advanced-rootkit/
21/08/2024 21:01:00
QRCode
archive.org
thumbnail

FudModule rootkit burrows deep into Windows, where it can bypass key security defenses.

arstechnica EN 2024 FudModule rootkit Lazarus rootkit CVE-2024-38193,
Windows driver zero-day exploited by Lazarus hackers to install rootkit https://www.bleepingcomputer.com/news/microsoft/windows-driver-zero-day-exploited-by-lazarus-hackers-to-install-rootkit/
20/08/2024 07:11:59
QRCode
archive.org
thumbnail

The notorious North Korean Lazarus hacking group exploited a zero-day flaw in the Windows AFD.sys driver to elevate privileges and install the FUDModule rootkit on targeted systems.
#BYOVD #Bring #CVE-2024-38193 #Driver #Group #Lazarus #Microsoft #Own #Vulnerability #Your #Zero-Day

bleepingcomputer EN 2024 Your Lazarus Own BYOVD Driver Zero-Day Vulnerability Bring CVE-2024-38193 Group Microsoft
N. Korean hacking group stole massive amount of personal info from S. Korean court computer network https://m-en.yna.co.kr/view/AEN20240511001900320?ref=news.risky.biz
15/05/2024 11:29:45
QRCode
archive.org
thumbnail

A North Korean hacking group had stolen a massive amount of personal information from a South Korean court computer network, probe results showed on Saturday.

A total of 1,014 gigabytes worth of data and documents were leaked from Seoul's court computer network between January 2021 and February 2023 by the hacking group, presumed to be Lazarus, according to the joint probe by the police, the prosecution and the National Intelligence Service.

m-en.yna.co.kr North-Korea stolen Seoul Lazarus Court South-Korea
Lazarus and the FudModule Rootkit: Beyond BYOVD with an Admin-to-Kernel Zero-Day - Avast Threat Labs https://decoded.avast.io/janvojtesek/lazarus-and-the-fudmodule-rootkit-beyond-byovd-with-an-admin-to-kernel-zero-day/
29/02/2024 09:25:00
QRCode
archive.org
thumbnail

The Lazarus Group is back with an upgraded variant of their FudModule rootkit, this time enabled by a zero-day admin-to-kernel vulnerability for CVE-2024-21338. Read this blog for a detailed analysis of this rootkit variant and learn more about several new techniques, including a handle table entry manipulation technique that directly targets Microsoft Defender, CrowdStrike Falcon, and HitmanPro.

avast EN 2024 Lazarus FudModule CVE-2024-21338 vulnerability
Hackers stole $2 billion in crypto in 2023, data shows https://techcrunch.com/2023/12/26/hackers-stole-2-billion-in-crypto-in-2023-data-shows/
30/12/2023 14:05:18
QRCode
archive.org
thumbnail

Data shows hackers stole around $2 billion in crypto this year, according to data analyzed by blockchain security firms.

TechCrunch EN 2023 stole hackers cyberattacks crypto Lazarus DeFi Finance
Diamond Sleet supply chain compromise distributes a modified CyberLink installer https://www.microsoft.com/en-us/security/blog/2023/11/22/diamond-sleet-supply-chain-compromise-distributes-a-modified-cyberlink-installer/
29/11/2023 11:39:24
QRCode
archive.org
thumbnail

Microsoft has uncovered a supply chain attack by the threat actor Diamond Sleet (ZINC) involving a malicious variant of an application developed by CyberLink Corp. This malicious file is a legitimate CyberLink application installer that has been modified to include malicious code that downloads, decrypts, and loads a second-stage payload. The file, which was signed using a valid certificate issued to CyberLink Corp., is hosted on legitimate update infrastructure owned by the organization.

microsoft EN Lazarus Supply-chain-attack CyberLink
New macOS 'KandyKorn' malware targets cryptocurrency engineers https://www.bleepingcomputer.com/news/security/new-macos-kandykorn-malware-targets-cryptocurrency-engineers/
05/11/2023 11:22:34
QRCode
archive.org

A new macOS malware dubbed 'KandyKorn' has been spotted in a campaign attributed to the North Korean Lazarus hacking group, targeting blockchain engineers of a cryptocurrency exchange platform.

The attackers impersonate members of the cryptocurrency community on Discord channels to spread Python-based modules that trigger a multi-stage KandyKorn infection chain.

Elastic Security discovered and attributed the attacks to Lazarus based on overlaps with past campaigns concerning the employed techniques, network infrastructure, code-signing certificates, and custom Lazarus detection rules.

bleepingcomputer EN 2023 macOS Lazarus Discord Python-based cryptocurrency engineers Targeted
A cascade of compromise: unveiling Lazarus' new campaign https://securelist.com/unveiling-lazarus-new-campaign/110888/
27/10/2023 08:48:29
QRCode
archive.org
thumbnail

We unveil a Lazarus campaign exploiting security company products and examine its intricate connections with other campaigns

securelist EN 2023 Backdoor Lazarus Malware-Descriptions SIGNBT
Lazarus luring employees with trojanized coding challenges: The case of a Spanish aerospace company https://www.welivesecurity.com/en/eset-research/lazarus-luring-employees-trojanized-coding-challenges-case-spanish-aerospace-company/
30/09/2023 00:18:33
QRCode
archive.org

ESET researchers uncover a Lazarus attack against an aerospace company in Spain, where the group deployed several tools, including a publicly undocumented backdoor we named LightlessCan.

welivesecurity 2023 ESET Spain LightlessCan Lazarus lure aerospace challenges
Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack https://www.welivesecurity.com/2023/04/20/linux-malware-strengthens-links-lazarus-3cx-supply-chain-attack/
21/04/2023 08:43:29
QRCode
archive.org
thumbnail

Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the 3CX attack was carried out by Lazarus.

welivesecurity EN 2023 3CX Lazarus Operation DreamJob
Not just an infostealer: Gopuram backdoor deployed through 3CX supply chain attack | Securelist https://securelist.com/gopuram-backdoor-deployed-through-3cx-supply-chain-attack/109344/
04/04/2023 20:43:33
QRCode
archive.org
thumbnail

A DLL named guard64.dll, which was loaded into the infected 3CXDesktopApp.exe process, was used in recent deployments of a backdoor that we dubbed “Gopuram” and had been tracking internally since 2020.

securelist APT Backdoor Data-theft Lazarus Malware-Descriptions Gopuram guard64.dll 3CX
No Pineapple! –DPRK Targeting of Medical Research and Technology Sector https://labs.withsecure.com/publications/no-pineapple-dprk-targeting-of-medical-research-and-technology-sector
02/02/2023 15:16:56
QRCode
archive.org
thumbnail

During Q4 2022, WithSecure™ detected and responded to a cyber attack conducted by a threat actor that WithSecure™ have attributed with high confidence to an intrusion set referred to as Lazarus Group. Attribution with high confidence was based off of overlapping techniques tactics and procedures as well as an operational security mistake by the threat actor. Amongst technical indications, the incident observed by WithSecure™ also contains characteristics of recent campaigns attributed to Lazarus Group by other researchers.

WithSecure 2023 EN Case-study Report Lazarus attack
ZetaNile: Open source software trojans from North Korea https://www.reversinglabs.com/blog/zetanile-open-source-software-trojans-from-north-korea
28/12/2022 11:38:24
QRCode
archive.org
thumbnail

ReversingLabs Malware Researcher Joseph Edwards takes a deep dive into ZetaNile, a set of open-source software trojans being used by Lazarus/ZINC.

reversinglabs EN 2022 ZetaNile Malware deepdive apt Lazarus ZINC open-source trojans
Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium https://www.welivesecurity.com/2022/09/30/amazon-themed-campaigns-lazarus-netherlands-belgium/
02/10/2022 12:32:50
QRCode
archive.org
thumbnail

ESET researchers have discovered Lazarus attacks against targets in the Netherlands and Belgium that use spearphishing emails connected to fake job offers.

welivesecurity EN 2022 Lazarus report campaign Netherlands Belgium spearphishing
Lazarus ‘Operation In(ter)ception’ Targets macOS Users Dreaming of Jobs in Crypto https://www.sentinelone.com/blog/lazarus-operation-interception-targets-macos-users-dreaming-of-jobs-in-crypto/
28/09/2022 15:24:54
QRCode
archive.org
thumbnail

First Coinbase, now Crypto.com. Lazarus campaign targets more crypto exchange platform job seekers with multi-stage malware.

sentinelone EN 2022 Lazarus Lazarus-Group crypto macOS operation APT38
MagicRAT: Lazarus’ latest gateway into victim networks https://blog.talosintelligence.com/2022/09/lazarus-magicrat.html
08/09/2022 23:21:24
QRCode
archive.org
thumbnail
  • Cisco Talos has discovered a new remote access trojan (RAT) we're calling "MagicRAT," developed and operated by the Lazarus APT group, which the U.S. government believes is a North Korean state-sponsored actor.
  • Lazarus deployed MagicRAT after the successful exploitation of vulnerabilities in VMWare Horizon platforms.
  • We've also found links between MagicRAT and another RAT known as "TigerRAT," disclosed and attributed to Lazarus by the Korean Internet & Security Agency (KISA) recently.
  • TigerRAT has evolved over the past year to include new functionalities that we illustrate in this blog.
talosintelligence EN 2022 MagicRAT Lazarus Lazarus-Group North-Korea TigerRAT RAT
page 1 / 2
4737 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio