Analysis of attack methods of the Lazarus Group

Date: 2024-04-24 Author: Gabriel Deangelo Categories: IN WORLD
news-banner
Experts found that more than 70% of the stolen funds, amounting to $1.7 billion, were stolen by compromising private keys. This method has been used by the hacker group Lazarus Group since 2020.

Data analysis and damage assessment

UN reports indicate that the group has stolen about $3 billion since 2017, but Chainalysis analysts believe that these figures are underestimated and estimate losses for 2023 at $1 billion. They also note that determining the group’s involvement in attacks is often difficult.

Attack methods and preparation

Hackers from the Lazarus Group use a combination of phishing and social engineering to achieve their goals. The prerequisite for an attack is a thorough analysis of the targets and preparation, which allows them to find and exploit vulnerabilities in the computer systems of companies.

Latest attacks and recovery of stolen funds

The group's recent target was the gaming platform Munchables, where 17,500 ETH was stolen. One of the project developers was associated with the Lazarus Group. However, after pressure from the project team, he returned all the stolen funds and renounced control over the assets.
image

Leave Your Comments