Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert & block trade
Convert crypto with one click and zero fees
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
Slow Fog Cosine: Confirmed that the CEX theft incident was attacked by North Korean hacker Lazarus Group, their attack method has been revealed

Slow Fog Cosine: Confirmed that the CEX theft incident was attacked by North Korean hacker Lazarus Group, their attack method has been revealed

Bitget2025/02/23 13:43

The founder of SlowMist, Yu Cosine, posted on social media stating that through evidence analysis and associated tracking, we have confirmed that the attacker in the CEX theft incident is indeed the North Korean hacker organization Lazarus Group. This is a state-level APT attack targeting cryptocurrency trading platforms. We decided to share related IOCs (Indicators of Compromise), which include some cloud service providers and proxies whose IPs were exploited. It should be noted that this disclosure does not specify which platform or platforms are involved, nor does it mention CEX specifically; if there are similarities, it's not impossible.

The attackers used pyyaml for RCE (Remote Code Execution) to deliver malicious code and thus control target computers and servers. This method bypasses most antivirus software scans. After synchronizing intelligence with partners, multiple similar malicious samples were obtained. The main goal of the attackers is to gain control over wallets by invading the infrastructure of cryptocurrency trading platforms and then illegally transferring large amounts of encrypted assets from these wallets.

SlowMist published a summary article revealing Lazarus Group's attack methods and analyzed their use of tactics such as social engineering, vulnerability exploitation, privilege escalation, internal network penetration and fund transfer etc.. At the same time based on actual cases they summarized defensive suggestions against APT attacks hoping to provide references for industry helping more organizations enhance security protection capabilities reducing potential threat impacts.

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!