Join our Telegram Channel to stay up to date on the coverage of information on the breakup
The Lazare group, a leading hacking group associated with the North Korean government with a long history of targeting societies and individuals in cryptocurrency and the non-bubbable token space, shows no sign of slowing down its odious attacks against crypto and non-dassible token communities. Recently, the North Korean hacking group seems to have transferred its objective to the communities of Crypto and NFT on LinkedIn.
The Lazarus hacking group explained
Revealed in 2017, the Lazare group is a leading hacking group associated with the North Korean government with a long history of targeting companies and individuals in the cryptocurrency space. The Lazarus pirate group is made up of an unknown number of users who are formed by the Government of North Korea. They were linked to the violations of Phemex, Wazirx, among others.
Earlier this year, the Lazarus hacking group was linked to the violation of Bybit, which left more than $ 1.5 billion in stolen crypto. On February 21, criminals hacked one of the suppliers of Bybit to secretly modify the address of the digital portfolio to which 401,000 pieces of Crypto Ethereum were sent. Since then, it has been a cat and mouse game with crypto detectives to follow and prevent the pirates from converting the crypto into usable money.
Bybit Hack $ 1.5 billion. Delocated by the blind signature, a screen can solve this problem.
– Nicolas Dorier (@nicolasdorier) June 1, 2025
In the violation of Bybit, the hacking group prompted a safe portfolio employee to execute malicious code on his computer to establish initial access. Once this point of view has been obtained, which looks like a more sophisticated “division” of the group took over and continued after exploitation, obtaining access to the AWS account of Safe and modifying the front source code of the wallet, which led to the ultimate flight of their cold portfolios.
Lazarus groups now targets NFT users on Linkedin
Piracy and scam groups, such as Lazare group, are increasingly sophisticated in their tactics. This time, they have evolved and started to secretly hunt Crypto and NFT projects on LinkedIn. Last month, a Bitmex employee was contacted via LinkedIn for a potential collaboration of the “NFT Marketplace” web3 project. This pretext was sufficiently similar to other common attacks in this industry that the employee suspected that it was an attempt to encourage them to execute malicious code on their device.
Fortunately, the Bitmex employee quickly alerted the security team, who investigated with the aim of understanding how this campaign worked and how to protect the business. After a few back and forth with the striker, the employee Bitmex was invited to a private Github repository, which contained code for a website Next.js / React. The objective was to make the victim work the project, which includes malicious code, on their computer. The security team then noted that the striker was linked to the North Korean Piracy of Lazarus.
Related NFT News:
Best wallet – diversify your crypto wallet
- Easy to use cryptographic wallet, easy to use
- Get early access to ICO to toys to come
- Multi-chaînes, multi-walk, non-guardians
- Now on the App Store, Google Play
- Pape to win the native token $ the best
- 250,000+ monthly active users
Join our Telegram Channel to stay up to date on the coverage of information on the breakup