According to Crypto Sleuth ZachxBT, North Korea’s Lazaro Hacking Group is suspected of stealing $5.2 million worth of code after the victim was infected with malware.
He shared a wallet address related to the theft in the telegram this morning, saying that a suspect, who may be linked to the government, is running $2.6 million worth of 1,000 ether (ETH) via crypto mixer tornado cash to wash his proceeds.
The three addresses linked to the May 24th hack are:
- 0x9D42A049F88F1DB4B304441081AFF7C40D857BEA
- 0x4BE5023AD49573A544A9A4109E4F1880A32FE5C3
- 0x31088345396D0CF00A81A3E3B8E8C5B8C768A3
Read more: FBI confirms North Korean ‘Trader Traitor’ blames $1.5 billion Buybit Hack
In addition to Tornado Cash, a report from blockchain analyst TRM Lab highlights North Korea’s dependence on Chinese commercial brokers to wash stolen funds. It details how North Korea provides cybercriminals and how China and Russia criminal networks provide infrastructure for moving stolen cryptography.
Lazarus is suspected of funding the North Korean government through various cybercrimes; Hacked Crypto Exchange Bybit for $1.5 billion.
Remote job applications are also being targeted by North Korean provincial officials who are trying to break into businesses with their stolen identity and direct funds to the state.
To fund states that have been heavily affected by the effects of sanctions. A few days before the hack, the Hermit Kingdom may have needed another cash injection. A newly built 5,000 tonne warship has capsized After a miserable sideways launch.
These destroyers are not cheap, and the construction of some South Korean warships costs almost $1 billion.
Discover more from Earlybirds Invest
Subscribe to get the latest posts sent to your email.