Tuesday, January 13, 2026
No Result
View All Result
The Crypto HODL
  • Home
  • Bitcoin
  • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Updates
    • Crypto Mining
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Regulations
  • Scam Alert
  • Analysis
  • Videos
Marketcap
  • Home
  • Bitcoin
  • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Updates
    • Crypto Mining
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Regulations
  • Scam Alert
  • Analysis
  • Videos
No Result
View All Result
The Crypto HODL
No Result
View All Result

Kaspersky’s report reveals new tactics used by North Korean crypto hackers

May 16, 2024
in Scam Alert
Reading Time: 3 mins read
0 0
A A
0
Home Scam Alert
Share on FacebookShare on Twitter


North Korean hackers deploying “Durian” malware focusing on South Korean crypto corporations.
The resurgence of dormant hackers like Careto underscores the evolving cybersecurity panorama.
Hacktivist teams like SiegedSec escalate offensive operations amidst international socio-political occasions.

The primary quarter of 2024 has confirmed significantly eventful, with notable findings and traits rising from the frontline of cyber safety. From the deployment of refined malware variants to the resurgence of long-dormant menace actors, the panorama of cyber threats continues to shape-shift, presenting new challenges for safety consultants worldwide.

A current report by the World Analysis and Evaluation Group (GReAT) at Kaspersky made a putting revelation shedding gentle on the actions of assorted superior persistent menace (APT) teams.

The Durian malware focusing on South Korean crypto corporations

Among the many findings made by GReAT is the emergence of the “Durian” malware, attributed to the North Korean hacking group Kimsuky. It has been used to focus on South Korean cryptocurrency corporations and it has a excessive stage of sophistication, boasting complete backdoor performance.

The Durian malware’s deployment marks a notable escalation within the cyber capabilities of Kimsuky, showcasing their skill to use vulnerabilities inside the provide chain of focused organizations.

By infiltrating authentic safety software program unique to South Korean crypto corporations, Kimsuky demonstrates a calculated strategy to circumventing conventional safety mechanisms. This modus operandi highlights the necessity for enhanced vigilance and proactive safety methods inside the cryptocurrency sector, the place the stakes are exceptionally excessive.

The connection between Kimsuky and the Lazarus Group

The Kaspersky report additional unveils a nuanced connection between Kimsuky and one other North Korean hacking consortium, the Lazarus Group. Whereas traditionally distinct entities, the utilization of comparable instruments similar to LazyLoad suggests a possible collaboration or tactical alignment between these crypto-threat actors.

This discovery underscores the interconnected nature of cyber threats, the place alliances and partnerships can amplify the affect of malicious actions.

Resurgence of dormant crypto hacking teams

In parallel, the APT traits report reveals a resurgence of long-dormant menace actors, such because the Careto group, whose actions have been final noticed in 2013.

Regardless of years of dormancy, Careto resurfaced in 2024 with a collection of focused campaigns, using customized strategies and complicated implants to infiltrate high-profile organizations. This resurgence serves as a stark reminder that cyber threats by no means really disappear; they merely adapt and evolve.

Different crypto hacking teams terrorising the world

The Kaspersky report additionally highlights the emergence of latest malware campaigns focusing on authorities entities within the Center East, similar to “DuneQuixote”. Characterised by refined evasion strategies and sensible evasion strategies, these campaigns underscore the evolving ways of menace actors within the area.

There’s additionally the emergence of the “SKYCOOK” implant utilised by the Oilrig APT to focus on web service suppliers within the Center East.

In the meantime, in Southeast Asia and the Korean Peninsula, the actions of menace actors like DroppingElephant proceed to pose important challenges. Leveraging malicious RAT instruments and exploiting platforms like Discord for distribution, these actors display a multifaceted strategy to cyber espionage. The usage of authentic software program as preliminary an infection vectors additional complicates detection and mitigation efforts, highlighting the necessity for enhanced menace intelligence and collaboration amongst stakeholders.

On the hacktivism entrance, teams like SiegedSec have ramped up their offensive operations, focusing on corporations and authorities infrastructure in pursuit of social justice-related targets. With a concentrate on hack-and-leak operations, these teams leverage present socio-political occasions to amplify their message and affect.

Share this articleCategoriesTags



Source link

Tags: cryptoHackersKasperskysKoreanNorthReportRevealsTactics
Previous Post

DOGE Price Prediction – Can Dogecoin Bulls Overcome This Hurdle?

Next Post

Pudgy Penguins’ Toys Expand to Target Following 1M+ Sales

Related Posts

How global sanctions are reshaping illicit crypto activity
Scam Alert

How global sanctions are reshaping illicit crypto activity

January 12, 2026
Truebit protocol hack exposes DeFi security risks as TRU token collapses
Scam Alert

Truebit protocol hack exposes DeFi security risks as TRU token collapses

January 10, 2026
Fake MetaMask 2FA phishing scam uses polished design to steal wallet seed phrases
Scam Alert

Fake MetaMask 2FA phishing scam uses polished design to steal wallet seed phrases

January 6, 2026
SEC filings reveal the multi-million dollar trap hiding inside ‘exclusive’ WhatsApp crypto investment clubs
Scam Alert

SEC filings reveal the multi-million dollar trap hiding inside ‘exclusive’ WhatsApp crypto investment clubs

January 8, 2026
Fake Zoom malware scam tied to North Korean hackers targets crypto users
Scam Alert

Fake Zoom malware scam tied to North Korean hackers targets crypto users

December 15, 2025
Do Kwon faces sentencing in New York as TerraUSD collapse returns to spotlight
Scam Alert

Do Kwon faces sentencing in New York as TerraUSD collapse returns to spotlight

December 11, 2025
Next Post
Pudgy Penguins’ Toys Expand to Target Following 1M+ Sales

Pudgy Penguins' Toys Expand to Target Following 1M+ Sales

Whale Loses Over $8,430,000 After Capitulating on Ethereum and Two Additional Altcoins: On-Chain Data

Whale Loses Over $8,430,000 After Capitulating on Ethereum and Two Additional Altcoins: On-Chain Data

Philippines’ central bank greenlights pilot for Peso-backed stablecoin

Philippines’ central bank greenlights pilot for Peso-backed stablecoin

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Twitter Instagram LinkedIn Telegram RSS
The Crypto HODL

Find the latest Bitcoin, Ethereum, blockchain, crypto, Business, Fintech News, interviews, and price analysis at The Crypto HODL

CATEGORIES

  • Altcoin
  • Analysis
  • Bitcoin
  • Blockchain
  • Crypto Exchanges
  • Crypto Mining
  • Crypto Updates
  • DeFi
  • Ethereum
  • Metaverse
  • NFT
  • Regulations
  • Scam Alert
  • Uncategorized
  • Videos
  • Web3

SITE MAP

  • Disclaimer
  • Privacy Policy
  • DMCA
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact us

Copyright © 2023 The Crypto HODL.
The Crypto HODL is not responsible for the content of external sites.

No Result
View All Result
  • Home
  • Bitcoin
  • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Updates
    • Crypto Mining
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Regulations
  • Scam Alert
  • Analysis
  • Videos
Crypto Marketcap

Copyright © 2023 The Crypto HODL.
The Crypto HODL is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In