Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert
Zero fees, no slippage
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
US seizes $2.7 million in crypto linked to Lazarus Group hacks

US seizes $2.7 million in crypto linked to Lazarus Group hacks

GrafaGrafa2024/10/07 10:40
By:Mahathir Bayena

The U.S. government has seized over $2.7 million in Bitcoin (CRYPTO:BTC) and Tether (CRYPTO:USDT) linked to North Korean hacking group Lazarus, which is responsible for a series of cyber heists totaling $879 million.  

On October 4, 2024, legal actions were filed to confiscate the stolen assets, targeting the group's involvement in multiple high-profile hacks across different platforms and countries.  

According to official filings, the seizures relate to two major incidents.  

The first involves the theft of $1.7 million in USDT from Deribit, an options exchange, and the second covers the theft of 15.5 Bitcoin (valued at approximately $971,000) from Stake.com.  

The Lazarus Group is also believed to be responsible for a $234.9 million hack of the WazirX (CRYPTO:WRX) exchange.  

Lazarus, a North Korean state-sponsored hacking group, has targeted organizations in several countries, including Japan, Singapore, the U.S., and Vietnam.  

U.S. authorities noted that the group uses a combination of cyberattacks, extortion, and theft to carry out its operations.  

The group's name, “Lazarus,” comes from the biblical figure who rose from the dead, fitting for a group that constantly resurfaces with new tactics.  

The FBI recently issued warnings about Lazarus Group's evolving strategies.  

Their tactics often include fake employment offers or investment opportunities, designed to lure unsuspecting victims into installing malware.  

These prolonged interactions give the group enough time to execute their attacks without raising immediate suspicion.  

In previous years, Lazarus has been involved in notable cybercrimes, including the 2014 Sony Pictures hack and the creation of the WannaCry ransomware.  

The group often launders stolen funds through mixers like Tornado Cash (CRYPTO:TORN), but law enforcement agencies have successfully traced some of these transactions.  

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Earn new token airdrops
Lock your assets and earn 10%+ APR
Lock now!

You may also like