- The report said F-Secure’s investigators found operational similarities between this attack and other efforts that have been associated with the Lazarus group.
- Carried out as a phishing attack, the hackers used a LinkedIn message to send over a fake job offer document to a systems administrator at the crypto firm that when downloaded allowed the attackers to get in through the back door.
- Once in, the hackers used backdoor network implants and malware to extract information from the infected computers. According to the report, the attackers also employed Mimikatz, a tailored form of malware used to extract crypto wallet information or bank account details.
- “The evidence also suggests this is part of an ongoing campaign targeting organizations in over a dozen countries,” Matt Lawrence, the Helsinki-based F-secure’s director of detection and response, said in a blog post on the firm’s website.
- Earlier in March, the U.S. Treasury Department announced sanctions against two Chinese nationals who had helped hackers from the Lazarus group launder proceeds from an attack on crypto exchange in 2018.
The leader in news and information on cryptocurrency, digital assets and the future of money, CoinDesk is a media outlet that strives for the highest journalistic standards and abides by a strict set of editorial policies. CoinDesk is an independent operating subsidiary of Digital Currency Group, which invests in cryptocurrencies and blockchain startups.