Report Interpretation Analysis of North Korean Hackers, Phishing Groups and Money Laundering Tools

This article introduces the dynamics of the North Korean hacker Lazarus Group over the past 23 years, summarizes and analyzes its dynamics and money laundering methods, outputs a portrait of the gang, and finally introduces the money laundering tools commonly used by hackers.

Written by: Slow MistSafetyteam

In the previous article, we mainly interpreted2023 Blockchain Security Situation, this article mainly focuses on the dynamics of North Korean hacker Lazarus Group, major phishing groups and some money laundering tools in 2023.

Lazarus Group

Updates 2023

According to public information in 2023, as of June, there are still no majorcryptocurrencystealsteal案被归因为朝鲜黑客 Lazarus Group。从链上活动来看,朝鲜黑客 Lazarus Group 主要在清洗 2022 年盗steal的加密货币资金,其中包括 2022 年 6 月 23 日 Harmony 跨链桥遭受攻击损失的约 1 亿美元的资金。

Subsequent facts show that in addition to cleaning the cryptocurrency funds stolen in 2022, the North Korean hacker Lazarus Group has not been idle at other times. This hacker group is dormant in the dark and secretly carries out APT-related attack activities. These activities directly led to the "Dark 101 Days" in the cryptocurrency industry starting on June 3.

During the "101 Days of Darkness", a total of 5 platforms were stolen, with the amount stolen exceeding US$300 million. Most of the stolen objects were centralized service platforms.

报告解读之朝鲜黑客、钓鱼团伙及洗钱工具分析

Around September 12, SlowMist and its partners discovered that the hacker group Lazarus Group conducted large-scale APT attacks targeting the cryptocurrency industry. The attack method is as follows: first, disguise the identity, deceive the auditor through real-person authentication and become a real customer, and then make a real deposit. Under the cover of this customer identity, Mac or Windows customized Trojans are accurately targeted at official personnel at multiple communication time points between official personnel and customers (attackers). After obtaining permission, they move laterally within the intranet and lurk for a long time to achieve the goal. Purpose of stealing funds.

报告解读之朝鲜黑客、钓鱼团伙及洗钱工具分析

The U.S. FBI is also paying attention to major thefts in the cryptocurrency ecosystem, and publicly stated in a press release that it was controlled by the North Korean hacker Lazarus Group. The following is the relevant press release issued by the FBI in 2023 about the North Korean hacker Lazarus Group:

  • On January 23, the FBI confirmed (https://www.fbi.gov/news/press-releases/fbi-confirms-lazarus-group-cyber-actors-responsible-for-harmonys-horizon-bridge-currency-theft) North Korean hackers Lazarus Group should be responsible for the Harmony Hack incident.

  • On August 22, the FBI issued a notice (https://www.fbi.gov/news/press-releases/fbi-identifies-cryptocurrency-funds-stolen-by-dprk) said that the North Korean hacker group involved hacking attacks on Atomic Wallet, Alphapo and CoinsPaid, stealing a total of $197 million in cryptocurrency.

  • On September 6, the FBI issued a press release (https://www.fbi.gov/news/press-releases/fbi-identifies-cryptocurrency-funds-stolen-by-dprk), confirmed that North Korean hackers Lazarus Group were responsible for the theft of $41 million from the Stake.com cryptocurrency gambling platform.

Analysis of money laundering methods

According to our analysis, the money laundering methods of the North Korean hacker Lazarus Group have also continued to evolve over time. New money laundering methods will appear every once in a while. The timetable for changes in money laundering methods is as follows:

报告解读之朝鲜黑客、钓鱼团伙及洗钱工具分析

Gang profiling analysis

Based on the strong intelligence-related support of InMist intelligence network partners, the SlowMist AML team followed up and analyzed the data related to these stolen incidents and the hacker group Lazarus Group, and then obtained a partial portrait of the hacker group Lazarus Group:

  • Often using European or Turkish identity as a disguise.

  • Dozens of IP information, dozens of email information and some desensitized identity information have been obtained:

  • 111.*.*.49

  • 103.*.*.162

  • 103.*.*.205

  • 210.*.*.9

  • 103.*.*.29

  • 103.*.*.163

  • 154.*.*.10

  • 185.*.*.217

Wallet Drainers

Note: This section was written by Scam Sniffer, for which I would like to express my gratitude.

Overview

Wallet Drainers, a type of cryptocurrency-related malware, has achieved significant success over the past year. These software are deployed on phishing websites to trick users into signing malicious transactions and then steal their cryptocurrency.walletassets in. These phishing campaigns continue to attack ordinary users in many forms, resulting in many people suffering significant property losses after unknowingly signing malicious transactions.

stolen statistics

报告解读之朝鲜黑客、钓鱼团伙及洗钱工具分析

In the past year, Scam Sniffer has monitored Wallet Drainers stealing nearly $295 million from approximately 320,000 victims.

stolen trends

报告解读之朝鲜黑客、钓鱼团伙及洗钱工具分析

It is worth mentioning that nearly $7 million was stolen on March 11. Mostly due to the fluctuation of the USDC exchange rate, I encountered a phishing website pretending to be Circle. There has also been a large number of hacks approaching Arbitrum’s Discord on March 24 and subsequent airdrops.

Each peak is accompanied by associated mass events. It might be an airdrop, or it might be a hacking incident.

Notable Wallet Drainers

报告解读之朝鲜黑客、钓鱼团伙及洗钱工具分析

Following ZachXBT's revelations about Monkey Drainer, they announced their exit after being active for 6 months, and then Venom took over most of their clients. Then MS, Inferno, Angel, and Pink also appeared around March. As Venom ceased service around April, most of the phishing gangs turned to other services. According to 20%'s Drainer fee, they made at least $47 million in profit from selling services.

Wallet Drainers Trends

报告解读之朝鲜黑客、钓鱼团伙及洗钱工具分析

By analyzing trends, we can see that phishing activity has been growing relatively continuously. And after every Drainer withdraws, a new Drainer will replace them. For example, after Inferno recently announced its withdrawal, Angel seems to have become the new replacement.

How did they initiate the fishing campaign?

报告解读之朝鲜黑客、钓鱼团伙及洗钱工具分析

The ways in which phishing websites obtain traffic can be roughly divided into several categories:

  • hacker attack

  • Official projects Discord and Twitter were hacked

  • The official project front end or libraries used were attacked

  • organic traffic

  • Airdrop NFT or Token

  • Discord link is invalid and occupied

  • Twitter spam alerts and comments

  • Paid traffic

  • Google search ads

  • Twitter Ads

Although hacker attacks have a large impact, the response is often timely enough, usually within 10-50 minutes.CommunityAll took action. However, airdrops, organic traffic, paid advertising, and invalid Discord links are occupied, and these methods are even more difficult to detect. In addition, there are also more targeted private message phishing of individuals.

Common phishing signatures

报告解读之朝鲜黑客、钓鱼团伙及洗钱工具分析

针对不同的资产类型也有着不同的方式来发起恶意钓鱼签名,以上是一些对不同类资产常见的钓鱼签名方式。Drainers 会根据受害者钱包所拥有的资产类型来决定发起什么样的恶意钓鱼签名。

From the case of using GMX's signalTransfer to steal Reward LP tokens, we can find that they have conducted very detailed research on the phishing methods of specific assets.

Use more intelligencecontract

1) Multicall

报告解读之朝鲜黑客、钓鱼团伙及洗钱工具分析

Starting from Inferno, they also began to use more resourcescontractTechnically. For example, the Split fee needs to be divided into two transactions, and this may not be fast enough, causing the victim to revoke the authorization in advance during the second transfer. Therefore, in order to improve efficiency, they use multilcall for more efficient asset transfer.

2) CREATE2 & CREATE

报告解读之朝鲜黑客、钓鱼团伙及洗钱工具分析

同样为了绕过一些钱包的SafetyTo verify, they also started trying to use create2 or create to dynamically generate temporary addresses. This will render the blacklist on the wallet side ineffective and increase the difficulty of phishing research. Because you don’t know what address the assets will be transferred to without signing, and the temporary address has no analytical significance. This is a big change from last year.

Phishing website

报告解读之朝鲜黑客、钓鱼团伙及洗钱工具分析

By analyzing the number trend of phishing websites, it can be clearly seen that phishing activities are gradually increasing every month, which has a lot to do with the stable wallet drainer service.

报告解读之朝鲜黑客、钓鱼团伙及洗钱工具分析

The above are the domain name registrars mainly used by these phishing websites. By analyzing the server address, we can find that most of them use Cloudflare to hide the real server address.

money laundering tools

Sinbad

Sinbad is a Bitcoin mixer founded on October 5, 2022, which obfuscates transaction details to hide the flow of funds on the chain.

The U.S. Treasury Department describes Sinbad as a "virtual currency mixer that serves as the primary money laundering vehicle for the Lazarus Group, a North Korean hacking group designated by OFAC." Sinbad processed funds from the Horizon Bridge and Axie Infinity hacks and also moved funds related to "sanctions evasion, drug trafficking, purchase of child sexual abuse material, and other illicit sales on darknet markets."

报告解读之朝鲜黑客、钓鱼团伙及洗钱工具分析

Alphapo hackers (Lazarus Group) have used Sinbad in money laundering processes such as transactions:

报告解读之朝鲜黑客、钓鱼团伙及洗钱工具分析

(https://oxt.me/transaction/2929e9d0055a431e1879b996d0d6f70aa607bb123d12bfad42e1f507d1d200a5)

Tornado Cash

报告解读之朝鲜黑客、钓鱼团伙及洗钱工具分析

(https://dune.com/misttrack/mixer-2023)

Tornado Cash is a fully decentralized, non-custodial protocol that improves transaction privacy by breaking the on-chain link between source and destination addresses. To protect privacy, Tornado Cash uses a smart contract that accepts ETH from one address and otherTokendeposit and allow them to withdraw to a different address, i.e. ETH and others in a way that hides the sending addressTokenSend to any address.

In 2023, users deposited a total of 342,042 ETH (approximately $614 million) to Tornado Cash, and withdrew a total of 314,740 ETH (approximately $567 million) from Tornado Cash.

eXch

报告解读之朝鲜黑客、钓鱼团伙及洗钱工具分析

(https://dune.com/misttrack/mixer-2023)

In 2023, users deposited a total of 47,235 ETH (approximately $90.14 million) to eXch, and a total of 25,508,148 ERC20 stablecoins (approximately $25.5 million) to eXch.

Railgun

Railgun 利用 zk-SNARKs 密码学技术使交易完全不可见。Railgun 通过在其隐私系统内「shielding」用户的代币,使得每笔交易在BlockchainBoth are shown as being sent from the Railgun contract address.

In early 2023, the FBI said the North Korean hacker group Lazarus Group used Railgun to launder more than $60 million stolen from Harmony's Horizon Bridge.

Summarize

本篇文章介绍了朝鲜黑客 Lazarus Group 23 年的动态,慢雾安全团队持续关注该黑客团伙,并对Xiaobai NavigationIts dynamics and money laundering methods were summarized and analyzed, and a gang portrait was output. In 2023, fishing gangs were rampant, givingBlockchain行业造成了巨额资金损失,且这类团伙的行动呈现「接力」的特征,其持续、大规模的攻击使得行业的安全面临较大的挑战,在此感谢 Web3 反诈骗平台 Scam Sniffer 贡献了关于钓鱼团伙 Wallet Drainers 的披露,我们相信这部分内容对于了解其工作方式和获利情况具有重要的参考意义。最后,我们还对黑客常用的洗钱工具进行了介绍。

The article comes from the Internet:Report Interpretation Analysis of North Korean Hackers, Phishing Groups and Money Laundering Tools

Related recommendations: The price rose by more than 190% in a week. What potential projects in the Metis ecosystem are worth paying attention to?

METIS, the 100x coin, is back? Written by: Kaori Recently, the ecological popularity of Metis, a Layer 2 project born in the last cycle, continues to rise, attracting market attention. Metis is an Ethereum layer 2 scaling solution based on Optimistic Rollup, developed by Elena Sinel…

share to
© 版权声明

相关文章