23pds Profile picture
Jan 24 17 tweets 5 min read
1/ Today the FBI identified the North Korean hacker group Lazarus Group and APT38 as the Horizon Bridge attackers, with the hacker group using malware called 'TraderTraitor' to carry out the attack.
1/and laundered over $60 million in stolen Ether through a privacy protocol called Railgun. What are "TraderTraitor" and Railgun? @evilcos
2/ 'TraderTraitor' is Lazarus' malware that targets the cryptocurrency industry and blockchain technology primarily by luring employees of cryptocurrency-related platforms to download it.
2/Messages are sent to people working in IT operations, software creation and system administration in cryptocurrency organisations to offer well paid jobs using social engineering placements on various media social platforms, supporting macOS and Windows operating systems.
3/When employees are duped, 'TraderTraitor' will disguise itself as software for various cryptocurrency platforms and allow employees to download them, such as this platform.
4/ Regarding the technical details of TraderTraitor, CISA has a detailed analysis for those who are interested.
In it, CISA reveals that the domain name tokenais[.] com is the same as the domain name of the Lazarus sample we caught dropping the Trojan
@SlowMist_Team
4/Details disclosed by CISA:
cisa.gov/uscert/ncas/al…
5/ In response to such incidents, SlowMist suggests:
6/Railgun What is it again?
7/Railgun is a privacy and anonymity system built directly on Ether, interacting directly with DEX, lending and smart contract applications.
7/Using zero-knowledge proof to keep users' finances, personal information and behaviour safe, hidden from the public and selectively providing proof of identity or funds to others, in other words your consent is required before anyone can view your information.
8/ It is clear that Railgun's use of zero-knowledge proof allows users to send or trade without revealing any assets, value or identity, facilitating money laundering while providing privacy.
8/The North Korean hacker group Lazarus Group laundered over $60 million in stolen Ether through Railgun's privacy protocol.
9/ Flow after coin wash, SlowMist's @MistTrack_io and
@zachxbt Both have good analysis of:
10/Also thanks to @tayvano_ for the enthusiastic discussions and help in our tracing process.👏
11/Extended Reading
fbi.gov/news/press-rel…
12/North Korean hacker group Lazarus Group and APT38 intrusion process #Lazarus #APT38

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with 23pds

23pds Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @IM_23pds

Jan 24
1/今天FBI确认朝鲜黑客组织 Lazarus Group 和 APT38 是 Horizo​​n Bridge 攻击者,黑客组织使用名为「TraderTraitor」的恶意软件进行攻击,并通过名为 Railgun 的隐私协议对被盗的超 6000 万美元的以太坊进行洗钱。「TraderTraitor」、Railgun 都是什么?@evilcos
2/「TraderTraitor」是Lazarus主要针对加密货币行业和区块链技术进行攻击的恶意软件,主要是诱导加密货币相关的平台员工下载,向加密货币组织中从事 IT 运营、软件创建和系统管理工作的人员发送消息,以提供高薪工作在各种媒体社交平台使用社会工程学投放,支持 macOS 和 Windows 操作系统。
3/员工上钩后,「TraderTraitor」会伪装成各种加密货币平台的软件,让员工下载,如这个平台:
Read 10 tweets
Jan 19
1/Redline从你电脑盗走你的MetaMask相关文件后,干什么? What does Redline do after stealing your MetaMask-related files from your computer? @MetaMask @MetaMaskSupport @Jon_HQ @tayvano_ @NFT_GOD
2/攻击者会安装一个全新的metamask扩展,然后用你的文件覆盖它本地的文件。The attacker will install a brand new metamask extension and then overwrite its local files with your files ImageImage
3/然后攻击者使用获取到的受害者各种密码去尝试受害者的metamask密码。The attacker then uses the various passwords obtained locally to try the victim's metamask password ImageImage
Read 9 tweets
Jan 18
1/Just like @vxunderground discovered, I followed his findings and went on to disclose this new cryptocurrency theft ring below.
我顺着他的发现继续披露下这个新的加密货币盗窃团伙。
Rhadamanthys is another group using Google Ad for phishing after Redline, also targeting the cryptocurrency user community.
Rhadamanthys是继Redline之后的另一个使用Google Ad进行钓鱼的团伙,目标也是加密货币用户群体。 Image
Similar to Redline, the developers are active in tg, but differ in that they are English speakers, whereas the Redline development group is mainly Russian speakers.
和Redline类似,开发者活跃在tg,但是不一样的是他们是英语使用者,而Redline开发团伙主要是俄语使用者。 Image
Read 12 tweets
Sep 11, 2022
🔥最近RedLine黑客更新了产品视频,我们来看下他们的攻击手法、常用工具等:1/🧵
🔥The RedLine hackers have recently updated their product videos, so let's take a look at their attack techniques, common tools and more: 1/🧵
@SlowMist_Team @evilcos @wallet_guard
@SlowMist_Team @evilcos @wallet_guard 2/🧵首先他们是Saas服务,Bot恶意机器人的模式,通过下图这样的方式来传播、钓鱼虚拟货币用户:
Firstly they are Saas services, Bot malicious bots in the mode of spreading, phishing virtual currency users by means such as the following.
@SlowMist_Team @evilcos @wallet_guard 3/🧵 教使用者如何通过社交网络、邮件钓鱼,使用什么在线工具绕过杀毒软件查杀、做SEO、投放诱饵
3/🧵 Teach users how to phish through social networks, emails, and what online tools to use to bypass anti-virus software、Doing SEO, placing bait
Read 10 tweets
Sep 10, 2022
前两天我们团队 @SlowMist_Team 刚刚曝光Redline Stealer 木马会扫描你的电脑私钥等文件,盗取数字货币的分析,今天发现它的升级版 META Stealer /BlackGuard 木马也来了,攻击手法类似,小伙伴们小心了 ⚠️
就像 @evilcos 调侃的:目前为止,Web2 到 Web3 最成功的转型是黑客。🤣
Read 4 tweets
Sep 8, 2022
众多的丢币事件让很多人误以为硬件钱包用上了就不会丢币?这是一个误区,别迷信,丢不丢币跟你用啥关系不大。核心是人的安全意识,我们遇到很多丢币事件,用硬件钱包的事件往往丢币金额更大 🐶 尴尬不?
在区块链黑暗世界,时刻保持警惕,切勿贪婪捡便宜,个人安全意识永远是安全的第一道防线。
欢迎留言探讨,有疑问我会第一时间答复。
硬件钱包理论上可以提高攻击的门槛,但是不等于用了就不会丢币,这是两码事,搞清楚。
Read 7 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(