U.S. Seizes $2.7M in Crypto as Crackdown on North Korean Hackers Escalates After $879M Theft

U.S. Seizes $2.7M in Crypto as North Korean Hackers Face Crackdown After $879M Theft
hacker

U.S. Seizes $2.7M in Crypto as Crackdown on North Korean Hackers Intensifies Following $879M Theft

In a series of strategic legal maneuvers, the United States government is ramping up its crackdown on North Korea’s infamous Lazarus Group, a cybercrime syndicate notorious for its global hacking operations. On October 4, 2024, U.S. authorities took decisive action, seizing over $2.67 million in stolen digital assets traced back to the group. This move is part of a broader effort to dismantle the financial infrastructure that supports North Korea's illicit activities.

Two major thefts were highlighted in the legal filings: the theft of 1.7 million USDT from the Deribit exchange and the heist of 15.5 Bitcoin—valued at nearly $971,000—from Stake.com. The Lazarus Group has been linked to several other high-profile breaches, including a recent attack on the WazirX crypto exchange, which resulted in losses of approximately $234.9 million. These incidents underscore the group's sophisticated hacking capabilities and their growing focus on exploiting weaknesses in the cryptocurrency sector.

Operating on a global scale, the Lazarus Group has targeted countries such as Japan, Singapore, Vietnam, and the U.S. Their methods range from advanced cyberattacks to extortion and financial theft. The group’s persistent ability to evade authorities and strike new targets has drawn comparisons to the biblical figure Lazarus, who famously rose from the dead. Determined to cut off the group’s financial lifelines, U.S. officials are actively tracking and freezing stolen funds in an effort to curb their illicit operations.

Previously, the FBI had issued warnings about North Korean hackers luring unsuspecting cryptocurrency investors into downloading malware under the guise of fake employment offers. In February 2021, indictments were handed down against three North Korean programmers, signaling a significant escalation in the U.S. government’s efforts to disrupt state-sponsored cybercriminal activities.

The Lazarus Group’s long history of high-profile attacks includes the notorious 2014 hack of Sony Pictures and the global spread of the WannaCry ransomware. While they have attempted to obscure their tracks using cryptocurrency mixers like Tornado Cash, law enforcement agencies have made significant strides in tracing and recovering some of the stolen assets. The recent seizures are seen as a key victory in the U.S.’s ongoing mission to sever North Korea’s access to cryptocurrency, which has become a crucial source of funding for the regime’s rogue activities.

About the author

Daud
Hey! I'm Daud, Currently Working in IT Company BD. I always like to learn something new and teach others.

Post a Comment

To avoid SPAM, all comments will be moderated before being displayed.
Don't share any personal or sensitive information.