Educational2024-01-04
12 Minutes Read
MetaTrust Labs
It should be noted that security threats and preventive recommendations should be evaluated and customized according to the actual situation and the latest security intelligence.
On January 1, 2024, a hacker attack against Orbit Chain drew the attention of the global cryptocurrency community. According to reports, hackers exploited a vulnerability in Orbit Chain, stealing $81.5 million worth of cryptocurrencies and transferring them to other addresses. Orbit Chain officials have confirmed the incident and said they are working with international law enforcement agencies to track down the attackers' identity and motives. Some security researchers believe that the attack's methods and targets are similar to the style of the North Korean hacker group "Lazarus", which may be another cybercrime by the group. Who is "Lazarus", and why do their activities raise such high alert internationally? How does the group use cryptocurrencies to circumvent international sanctions and anti-money laundering measures?
Lazarus is a well-known hacker group with a North Korean official background that has been operating for more than a decade since 2009. The group is known for targeting organizations worldwide, and its actions so far include attacks on financial institutions, media, and government agencies. Lazarus Group is controlled by the 121 Bureau under the North Korean General Bureau of Reconnaissance. The group is known for attacking banks and cryptocurrency exchanges, obtaining economic benefits by stealing funds and data. Lazarus Group treats programmers with high standards and encourages people with computer talents to join the official "hacker" ranks.
Pyongyang Automation University is one of the important sources of Lazarus Group hackers. The group has shifted its focus from political attacks to economic attacks, focusing on attacking the cryptocurrency world. Their activities also involve targeting security researchers, embedding malicious code in open-source cryptocurrency platforms, executing large-scale cryptocurrency robberies, and spreading malware through fake job interviews. These hacker groups use funds obtained by illegal means to go through the typical money laundering process adopted by traditional cybercrime groups, and the stolen cryptocurrencies are often converted into fiat currencies to evade anti-money laundering measures.
South Korea, the United States, and Japan have been on high alert for the activities of North Korean hacker groups. It is reported that North Korean hacker groups have successfully stolen $3 billion worth of cryptocurrency funds in the past few years, which have been used to support North Korea's nuclear and ballistic missile programs. Security advisers from the United States, South Korea, and Japan met in Seoul to discuss how to deal with North Korea's cyber risks and announced a new trilateral cooperation initiative, focusing on addressing North Korea's cybercrime and cryptocurrency laundering activities. The meeting was held at a time when tensions on the Korean Peninsula escalated, and North Korea accelerated the expansion of its nuclear weapons and missile programs and publicly demonstrated its attitude of using nuclear weapons preemptively.
Lazarus hacker group's attack methods and targets are diverse, ranging from SWIFT network attacks on financial institutions to more widespread cryptocurrency robberies, showing the group's high technical ability and threat. However, the preventive measures for these attacks are relatively few. Since 2018, North Korean hackers have stolen about $2 billion worth of virtual currencies. In 2023 alone, they stole about $200 million worth of cryptocurrencies, accounting for 20% of the stolen funds that year. These hackers pose a continuous threat to the virtual currency ecosystem, and their cyberattack methods are evolving and becoming more complex.
The scale of North Korean hacker groups' activities exceeds that of other malicious actors by 10 times, and they also target the decentralized financial ecosystem. They use various methods to carry out cyberattacks, including phishing, supply chain attacks, and other forms of hacking. Therefore, enterprises and individual users need to strengthen cybersecurity measures, update software regularly, strengthen password policies, and increase their awareness of cybersecurity. At the same time, regulators also need to strengthen supervision, formulate stricter laws and regulations to curb this kind of cybercrime.
Attack process and means:
Attack process:
Technical means:
Targets: Cryptocurrency exchanges, wallets, decentralized finance (DeFi) ecosystem Attack time: Since 2018, especially in 2023 Attack process and technical means:
Based on the above cases, attackers can steal sensitive data, including confidential business information, customer data, and personal identity information, resulting in privacy breaches and potential legal consequences. Since hackers can fully control the target system, they may obtain a large amount of sensitive information, including the internal data and customer profiles of the enterprise. Lazarus's hacker operations not only caused data leakage and system damage to the victimized organizations, but also may have a serious impact on the victims' business operations.
These attacks usually involve complex supply chain attacks, making prevention and detection more difficult. Attacks may cause financial losses, including the costs of malware removal, data recovery, and system repair, as well as revenue losses due to business interruption. The hackers' attacks resulted in a large amount of virtual currency being stolen, which not only caused economic losses to the victims, but also may expose their personal information and transaction data. Attacks on cross-chain bridges may paralyze the entire system, affecting the normal conduct of transactions.
To cope with such security threats, it is recommended that organizations take the following preventive measures:
Patch vulnerabilities in a timely manner: Ensure that security patches are applied in time to fix known vulnerabilities. Especially for software and components used in the supply chain, MetaScan's automated audit function can timely detect and patch potential vulnerabilities.
Strengthen supply chain security: Establish a secure partnership with supply chain partners, review and verify software and components, and ensure that each link in the supply chain is not attacked by hackers. With MetaScout's monitoring function, you can dynamically update the blacklist and block attacks from potential North Korean hacker addresses.
Security awareness training: Strengthen employee security awareness training. Educate employees on the importance of being alert to watering hole attacks, malicious scripts, and supply chain security, to reduce the impact of human factors on security. Scantist's DevSecOps solution can provide organizations with one-stop security training and guidance.
Network traffic monitoring: Implement network traffic monitoring and intrusion detection systems (IDS/IPS), and timely detect abnormal activities and attack behaviors. MetaScout's attack blocking mechanism can combine network traffic monitoring, timely identify and block hacker attacks on transactions.
Multi-layer defense: Adopt multi-layer defense measures, including firewalls, intrusion detection systems, anti-virus software, etc., to improve the security of the system. MetaScan's Prover function can be used in conjunction with existing security tools and measures, forming a more comprehensive defense system.
Continuous monitoring and response: Establish a security monitoring and response mechanism, monitor network and system activities in real time, timely detect abnormal behaviors and take appropriate response measures, to minimize the losses caused by attacks. Scantist's component analysis function can continuously monitor the vulnerabilities in the software supply chain and timely intercept problematic open source and third-party components.
Strengthen the security measures of cryptocurrency exchanges and wallets: Cryptocurrency exchanges and wallets should strengthen their security measures, such as using strong passwords, regularly changing private keys, implementing multi-layer security policies, etc. MetaScout's blocking mechanism can provide cryptocurrency exchanges with attack blocking protection based on dynamic blacklists, ensuring the security of users' digital assets.
Regular audits and inspections: Organizations should regularly conduct security audits and inspections of the system, to ensure that there are no potential security vulnerabilities. MetaScan's automated audit function can help organizations conduct a comprehensive security assessment and timely detect potential vulnerabilities and risks.
Raise public awareness: Educate the public about the importance of cybersecurity, and let them know how to protect their digital assets. Organizations can raise public awareness of cybersecurity through publicity campaigns, social media, and other channels, and provide relevant security advice and guidance.
It should be noted that security threats and preventive recommendations should be evaluated and customized according to the actual situation and the latest security intelligence. In addition, regular backup and recovery of data, using strong passwords and multi-factor authentication, limiting privileged access, etc. are also effective measures to improve security.
About MetaTrust Labs
MetaTrust Labs is a leading security service provider dedicated to creating a secure infrastructure for web 3.0 developers. We provide automated security vulnerability scanning service MetaScan, integrating multiple advanced security scanning engines, to protect all aspects of the application beyond the smart contract layer. In addition, we also provide MetaScout's 24/7 runtime security monitoring service, and MetaScore's comprehensive security and risk assessment service.
Moreover, our Prover tool is a powerful smart contract formal verification tool, suitable for Solidity programming language. It provides rigorous Solidity code semantic analysis, and generates comprehensive verification error reports, for effective fault localization. With MetaTrust Labs and our security tools and services, developers can build a secure and reliable web 3.0 development environment, ensuring the security and reliability of the application.
Website:metatrust.io
Twitter: @MetaTrustLabs
Linkedin: https://www.linkedin.com/in/metatrust
Discord: https://discord.gg/bhct3gRWky
About Scantist
Scantist is a solution for code quality management that seamlessly integrates into projects and workflows, ensuring consistent code quality standards. Through integrated policy management, it ensures that the code meets predefined quality standards. Its fast, real-time analysis function provides actionable insights, helping to solve code problems. By integrating with IDE, it can detect code problems in real time, speeding up the process.
Scantist has comprehensive code evaluation capabilities, which can evaluate the code quality and security of more than 20 languages and frameworks, becoming the central reference for all projects. With more than 5,000 coding rules and extensive program analysis, it provides accurate feedback. Through enterprise-level reporting, it conducts comprehensive risk assessment and monitoring. At the same time, Scantist's solution has customization flexibility and scalability, which can adapt to your unique needs, providing flexible pricing and deep integration, meeting the requirements of enterprises.
Scantist can also easily integrate with top DevOps platforms (such as GitHub, GitLab, Azure, Bitbucket) and major CI tools, achieving fast project access and continuous code analysis. It simplifies the workflow, improves productivity and efficiency. By providing support for developers and DevSecOps teams, Scantist can actively enhance software security, provide wise component selection, simplify code review, and promote the code quality, compliance, and efficient development process of the development team.
Website:scantist.com
MetaTrust Labs
It should be noted that security threats and preventive recommendations should be evaluated and customized according to the actual situation and the latest security intelligence.