1/ Today the FBI identified the North Korean hacker group Lazarus Group and APT38 as the Horizon Bridge attackers, with the hacker group using malware called 'TraderTraitor' to carry out the attack.
1/and laundered over $60 million in stolen Ether through a privacy protocol called Railgun. What are "TraderTraitor" and Railgun? @evilcos
2/ 'TraderTraitor' is Lazarus' malware that targets the cryptocurrency industry and blockchain technology primarily by luring employees of cryptocurrency-related platforms to download it.
2/Messages are sent to people working in IT operations, software creation and system administration in cryptocurrency organisations to offer well paid jobs using social engineering placements on various media social platforms, supporting macOS and Windows operating systems.
3/When employees are duped, 'TraderTraitor' will disguise itself as software for various cryptocurrency platforms and allow employees to download them, such as this platform.
4/ Regarding the technical details of TraderTraitor, CISA has a detailed analysis for those who are interested.
In it, CISA reveals that the domain name tokenais[.] com is the same as the domain name of the Lazarus sample we caught dropping the Trojan @SlowMist_Team
5/ In response to such incidents, SlowMist suggests:
6/Railgun What is it again?
7/Railgun is a privacy and anonymity system built directly on Ether, interacting directly with DEX, lending and smart contract applications.
7/Using zero-knowledge proof to keep users' finances, personal information and behaviour safe, hidden from the public and selectively providing proof of identity or funds to others, in other words your consent is required before anyone can view your information.
8/ It is clear that Railgun's use of zero-knowledge proof allows users to send or trade without revealing any assets, value or identity, facilitating money laundering while providing privacy.
8/The North Korean hacker group Lazarus Group laundered over $60 million in stolen Ether through Railgun's privacy protocol.
9/ Flow after coin wash, SlowMist's @MistTrack_io and @zachxbt Both have good analysis of:
2/「TraderTraitor」是Lazarus主要针对加密货币行业和区块链技术进行攻击的恶意软件,主要是诱导加密货币相关的平台员工下载,向加密货币组织中从事 IT 运营、软件创建和系统管理工作的人员发送消息,以提供高薪工作在各种媒体社交平台使用社会工程学投放,支持 macOS 和 Windows 操作系统。
1/Just like @vxunderground discovered, I followed his findings and went on to disclose this new cryptocurrency theft ring below.
我顺着他的发现继续披露下这个新的加密货币盗窃团伙。
Rhadamanthys is another group using Google Ad for phishing after Redline, also targeting the cryptocurrency user community.
Rhadamanthys是继Redline之后的另一个使用Google Ad进行钓鱼的团伙,目标也是加密货币用户群体。
Similar to Redline, the developers are active in tg, but differ in that they are English speakers, whereas the Redline development group is mainly Russian speakers.
和Redline类似,开发者活跃在tg,但是不一样的是他们是英语使用者,而Redline开发团伙主要是俄语使用者。
🔥最近RedLine黑客更新了产品视频,我们来看下他们的攻击手法、常用工具等:1/🧵
🔥The RedLine hackers have recently updated their product videos, so let's take a look at their attack techniques, common tools and more: 1/🧵 @SlowMist_Team@evilcos@wallet_guard
@SlowMist_Team@evilcos@wallet_guard 2/🧵首先他们是Saas服务,Bot恶意机器人的模式,通过下图这样的方式来传播、钓鱼虚拟货币用户:
Firstly they are Saas services, Bot malicious bots in the mode of spreading, phishing virtual currency users by means such as the following.
@SlowMist_Team@evilcos@wallet_guard 3/🧵 教使用者如何通过社交网络、邮件钓鱼,使用什么在线工具绕过杀毒软件查杀、做SEO、投放诱饵
3/🧵 Teach users how to phish through social networks, emails, and what online tools to use to bypass anti-virus software、Doing SEO, placing bait