4月に 18, 連邦捜査局 (FBI), アメリカ. 財務省, およびサイバーセキュリティおよびインフラストラクチャ セキュリティ エージェンシー (CISA) サイバーセキュリティ アドバイザリを公開 (CSA) 北朝鮮政府が支援する悪意のある仮想通貨活動に関する報告. 米国によると. 政府, law enforcement officials have observed North Korean cyber actors targeting specific blockchain companies in the industry.


FBI Alleges North Korean Hacking Activity Is on the Rise, Report Highlights Lazarus Groups Activities

The FBI, alongside a number of U.S. agencies, published a CSA レポート と呼ばれる “North Korean State-Sponsored APT Targets Blockchain Companies.The report details that the APT (高度で持続的な脅威) has been state-sponsored and active since 2020. The FBI explains that the group is commonly known as ラザログループ, and U.S. officials accuse the cyber actors of a number of malicious hack attempts.

North Korean cyber actors target a variety of organizations such asorganizations in the blockchain technology and cryptocurrency industry, including cryptocurrency exchanges, 分散型金融 (定義) プロトコル, play-to-earn cryptocurrency video games, cryptocurrency trading companies, venture capital funds investing in cryptocurrency, and individual holders of large amounts of cryptocurrency or valuable non-fungible tokens (NFT).”

The FBIs CSA report follows the recent Office of Foreign Assets Control (OFAC) update which accuses Lazarus Group and North Korean cyber actors of being involved in the Ronin bridge attack. After the OFAC update was published, the ethereum mixing project Tornado Cash 明らかに it was leveraging Chainalysis tools, and blocking OFAC-sanctioned ethereum addresses from using the ether mixing protocol.

Apple JesusMalware and theTraderTraitorTechnique

According to the FBI, Lazarus Group leveraged malicious malware calledApple Jesus,” which trojanizes cryptocurrency companies.

As of April 2022, North Koreas Lazarus Group actors have targeted various firms, entities, and exchanges in the blockchain and cryptocurrency industry using spearphishing campaigns and malware to steal cryptocurrency,” the CSA report highlights. “These actors will likely continue exploiting vulnerabilities of cryptocurrency technology firms, ゲーム会社, and exchanges to generate and launder funds to support the North Korean regime.

The FBI says the North Korean hackers utilized massive spearphishing campaigns sent to employees working for crypto firms. Typically the cyber actors would target software developers, IT operators, and Devops employees. The tactic is calledTraderTraitorand it often mimicsa recruitment effort and offer high-paying jobs to entice the recipients to download malware-laced cryptocurrency applications.The FBI concludes that organizations should report anomalous activity and incidents to the CISA 24/7 Operations Center or visit a local FBI field office.

What do you think about the FBIs claims about North Korean state-sponsored cyber attackers? Let us know what you think about the FBIs latest report in the comments section below.