“Illicitly Downloaded Programs Can Steal Data, Provide Remote Access to Infected Systems, And Serve As Entry Points for Addrational Spyware or Ransomware.”, – WRITE: www.coindesk.com


- North Korean Hackers Established Fake Companies in the US to Target Crypto Developers, Accounting To Security Firm Silent Push.
- The Operation Involved Creating Fictitious Businesses, Blocknovas and Softglide, Linked to the Lazarus Group.
- The FBI Seized The Blocknovas Domain, Citing Its Use in Distributing Malware Through Fake Job Postings.
Two Businesses, Blocknovas and Softglide, Were Created Using Fictitious Identities and Addresses. The operation is tied to a subgroup with the Lazarus Group.
The North Korean-Backed Hasting Unit Has Stolen Billions of Crypto in the Past Years Using Sophisticated Techniques and Strategies that Target Unsuspecting Individuals or Companies.
“This is A Rare Example of North Korean Hackers Actual Managing to Set Up Legal Corporate Entities in the Us in the Order To Create Corporate Fronts USED TO ATECKTING OBIDING SABTING SABTING. Intelligence at Silent Push, SAID.
The Hackers’ PlayBook Is As Manipulatory As It Is Effective: Use Fake LinkedIn-Style Profiles and Job Postings to Lure Crypto Developers Into Interviews. THEN, Durying The Recruitment Process, They Tricked Into Downloading Malware Disguised As Job Application Tools.
Silent Push Identified Multiple Victims of the Operation, Especially Those Contacted Through Blocknovas, Which Researchers Say Was The MOST ACTIVE OF THE THERE FRONT COMPANIES. The FIRM LISTED ADDRESS IN South Carolina Appears to be an empty Lot, While Softglide Was Registered Through A Tax Office in Buffalo, New York.
The FIRM ADDED THAT THE MALWARE USED IN THE CAMPAGN INCLUDES AT LEAST THREE VIRUS STRAINS PREVIUSLY Tied to North Korean Cyber Units. These Programs Can Steal Data, Provide Remote Access to Infected Systems, and Serve As Entry Points for Additional Spyware or Ransomware.
The FBI has seized the Blocknovas Domain, per Reuters. A notice posted to the Site States It Was Taken Down “As Part of A law Enforcement Against North Korean Cyber Actors Malware. ”
Shaurya Holds Over $ 1,000 in Btc, Eth, Sol, Avax, Sushi, Crv, Near, YFI, YFI, SHIB, DOGE, USDT, USDC, BNB, MANA, MLN, LINK, XMR, ALGO, CAKE, Vet, Vet, Vet RUNE, FTM, ZIL, KSM, ENJ, CKB, JOE, GHST, PERP, BTRFLY, OHM, Banana, Rome, Burger, Spirit, and ORCA.
He Provides Over $ 1,000 to Liquidity Pools on Compound, Curve, Sushiswap, Pancakeswap, Burgerswap, Orca, AnaSwap, Spiritswap, Roki Protocol, Yearn Finance Olympusdao, Rome, Trader Joe, and Sun.
X Icon