Skip to content

North Korean Hacking Groups Establish Sham American Corporations to Attack Cryptocurrency Developers

North Korean hacking group Lazarus Group reportedly established companies Blocknovas LLC and Softglide LLC, as claimed by cybersecurity company Silent Push.

The Deception Unveiled: Lazarus Group's Crypto Con

Job Offers Masked as Gateways to Malware

North Korean Hacking Groups Establish Sham American Corporations to Attack Cryptocurrency Developers

Recent intelligence reveals that cyber spies from North Korea have cleverly infiltrated the crypto industry by pseudo-establishing two shell companies, Blocknovas LLC and Softglide LLC, in the United States. These fake businesses, which were secretly controlled by underlings of the Lazarus Group-a subsidiary of Pyongyang's main intelligence agency-were used to plant malicious software upon unsuspecting victims.

The cybersecurity firm Silent Push pointed toward Lazarus Group's involvement, explaining that both Blocknovas and Softglide were designed to distribute malware to developers working within the cryptocurrency sector. The companies' registration documents bore false information and violated Office of Foreign Assets Control (OFAC) and United Nations (UN) sanctions.

A third entity, Angeloper Agency, was believed to be connected to the scheme, though it seems to lack official documentation in the U.S.

Crypto Heists through Employment Fraud

Perpetrators falsified job interviews to lure victims into compromising their crypto wallets. This mission employed advanced malware techniques, stealing passwords, credentials, and other sensitive data. Multiple victims reported attacks, with Blocknovas being the campaign's most active front.

A Persistent Threat to the US

North Korea's Lazarus Group has been examined as a significant adversary to the U.S., boasting one of the most sophisticated cyber operations in the world. The recent crypto market infiltration suggest the Group is diversifying its phishing tactics to include the crypto industry.

This linguistic exploration into the exploits of Lazarus Group serves as an example of their adaptability and resourcefulness in executing advanced financial heists. This group remains focused on funding North Korea's regime, pouring money into its weapons program through a conduit of cyber espionage and theft.

In broader context:

A Long History of Cyber Crimes

Lazarus Group has been implicated in a series of sophisticated cyberattacks on financial institutions, cryptocurrency exchanges, and corporations across the globe. By deploying ridiculously sophisticated social engineering techniques, Lazarus successfully pilfered billions of dollars, allowing North Korea to maintain its substantial economic resilience.

High-profile victims include the February $1.4 billion hack of crypto exchange Bybit, a massive financial heist that underscored Lazarus's expertise in organizing large-scale cybergangs.

The ClickFake Campaign

Lazarus deployed the "ClickFake" campaign to trick victims with fake job offers, enticing them into clicking on malicious links. This tactic, expertly crafted to elude detection, has led to substantial financial losses for numerous victims worldwide.

Stay Alert and Protect Your Assets

Given the ever-evolving nature of cybercrime, it is essential to remain vigilant when applying for job opportunities. Approach any job offer with skepticism, especially if it originates from a company you aren't familiar with. Verify the authenticity of job offers via legitimate sources, and never disclose sensitive information or run unverified software on your devices.

In an effort to combat this activity, the FBI continues to pursue culprits and collaborators, concentrating on enforcing repercussions that extend beyond the North Korean actors themselves to those supporting their illegal operations.

  1. underlings of the Lazarus Group, a subsidiary of Pyongyang's main intelligence agency, have secretly controlled shell companies Blocknovas LLC and Softglide LLC in the United States, using them to plant malicious software on unsuspecting victims in the cryptocurrency sector.
  2. Silent Push, a cybersecurity firm, has linked Blocknovas and Softglide to Lazarus Group, stating that they were designed to distribute malware to developers working within the cryptocurrency industry.
  3. Angeloper Agency is believed to be connected to the scheme, though it seems to lack official documentation in the U.S.
  4. The Lazarus Group has employed advanced malware techniques to lure victims into compromising their crypto wallets through fake job interviews.
  5. By deploying ridiculously sophisticated social engineering techniques, Lazarus Group has been implicated in a series of sophisticated cyberattacks on financial institutions, cryptocurrency exchanges, and corporations worldwide, pilfering billions of dollars.
  6. The "ClickFake" campaign, expertly crafted to elude detection, has led to substantial financial losses for numerous victims worldwide, with the February $1.4 billion hack of crypto exchange Bybit being a high-profile example.
  7. In an effort to combat this activity, the FBI continues to pursue culprits and collaborators, focusing on enforcing repercussions that extend beyond North Korean actors to those supporting their illegal operations, and encourages individuals to stay alert, remaining vigilant when applying for job opportunities to protect their assets.
Two enterprises, Blocknovas LLC and Softglide LLC, have reportedly been established by the Lazarus Group of North Korea, as stated by cybersecurity company Silent Push.

Read also:

    Latest