Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

How a hardware wallet protects your private key: Security and safety instructions

Cartoonist Paul Pope is more worried about killer robots than AI plagiarism

Review Week: Meta reveals Oakley Smart Glasses

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » DPRK hacker steals $137 million from tron ​​users in a one-day phishing attack
Identity

DPRK hacker steals $137 million from tron ​​users in a one-day phishing attack

userBy userApril 23, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 23, 2025Ravi LakshmananMalware/Cryptocurrency

Tron phishing attack

Multiple threat activity clusters with ties to North Korea (also known as the Democratic People’s Republic or DPRK) are associated with attacks targeting organizations and individuals in the Web3 and cryptocurrency sectors.

“The focus on Web3 and cryptocurrency appears to be primarily financially motivated by the heavy sanctions imposed on North Korea,” Google-owned Mandiant said in a M-Trends report shared with 2025 Hacker News.

“These activities aim to generate financial benefits reportedly funding North Korea’s Weapons of Mass Destruction (WMD) programmes and other strategic assets.”

The cybersecurity company said that DPRK-Nexus threat actors have developed custom tools written in various languages ​​such as Golang, C++, Rust, and other, and can infect windows, Linux, and MacOS operating systems.

It was found that at least three threat activity clusters tracked as UNC1069, UNC4899 and UNC5342 target members of the cryptocurrency and blockchain development community.

A brief explanation of each threat actor is below:

UNC1069 (active since at least April 2018) is known for sending fake meeting invitations, accessing victims’ digital assets and cryptocurrencies from reputable companies on Telegram, and providing job hunting campaigns known for sending out fake meeting invitations, accessing victims’ digital assets and cryptocurrencies by pretending to be investors, and providing previously hired campaigns. Compromising economic benefits (duplicate with Jade Sleit, Pukchong, Slow Pisces, Traderator, and UNC4899) UNC5342 (active since January 2024). It is known for employing job-related lures by recruiting developers to run malware-related projects (infectious disease interviews, and development #Popper, and famous cholima overlap, and famous

Another North Korean threat actor is UNC4736. This was attributed to the 3CX cascade supply chain attack in early 2023, picking up the blockchain industry by troilizing trading software applications.

Cybersecurity

Mandiant also said it has identified another cluster of North Korean activities that was tracked as UNC3782, which runs a massive phishing campaign targeting the cryptocurrency sector.

“In 2023, UNC3782 carried out phishing operations to Tron users, transferring assets worth 137 million US$ per day,” the company said. “UNC3782 launched a campaign in 2024 targeting Solana users and a page containing cryptocurrency drains.”

Cryptocurrency theft is one of several measures DPRK pursued to avoid international sanctions. Since at least 2022, an active threat cluster called UNC5267 has dispatched thousands of citizens to secure remote employment jobs in businesses in the US, Europe and Asia, while residing primarily in China and Russia.

The majority of IT workers are said to be affiliated with the 313 Ammunition Industry Bureau, which is responsible for North Korea’s nuclear program.

In addition to exploiting stolen identities, North Korean IT workers use fully manufactured personas to support their activities. This is also complemented by using real-time deepfark technology to create a compelling synthetic identity during job interviews.

“This offers two important operational benefits. First, a single operator can interview multiple times for the same position using different synthetic personas.”

“Secondly, it helps avoid it being identified and added to security bulletins and asking for notifications. In combination, it helps DPRK IT workers enjoy enhanced operational security and reduced detectability.”

The DPRK IT Worker Scheme takes insider threats to a whole new level, is designed to focus pay in Pyongyang to advance strategic goals, maintain long-term access to victim networks, and even force employers.

Cybersecurity

“They’ve also stepped up their fearful tor campaigns against employers, moving to run their operations on corporate desktops, networks and servers,” said Jamie Collier and Michael Barnhart of Google Threat Intelligence Group (GTIG) in a report last month.

“In addition to generating revenue for North Korea, they are now using privileged access to steal data and enable cyberattacks.”

In 2024, Mandiant identified suspects of DPRK IT workers using at least 12 personas while seeking employment in the US and Europe, and said they emphasized the effectiveness of relying on such unconventional methods to imbue falsely and infiltrating organizations.

“In at least one example, two false identity of work in a US company was considered, and one DPRK IT worker won better than the others,” the threat intelligence company noted. Another example is “four DPRK IT workers were employed within 12 months in one organization.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWhat we know about Pope Francis’ funeral | Religious News
Next Article The rebellion protest is now an official risk to Tesla’s business
user
  • Website

Related Posts

Spiders scattered behind M&S and cooperative cyberattacks, with up to $592 million in damages

June 21, 2025

Qilin ransomware adds “Cole Lawyer” feature that puts pressure on victims for larger ransoms

June 20, 2025

Television in Iranian states hijacked mid-distance broadcasts amid geopolitical tensions. $90 million stolen from Crypto Heist

June 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

How a hardware wallet protects your private key: Security and safety instructions

Cartoonist Paul Pope is more worried about killer robots than AI plagiarism

Review Week: Meta reveals Oakley Smart Glasses

Spiders scattered behind M&S and cooperative cyberattacks, with up to $592 million in damages

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

How a hardware wallet protects your private key: Security and safety instructions

Top Startups and High-Tech Funding News for the Weekly Ends June 20, 2025

Apple is talking to you to win AI startup confusion

Mira Murati’s AI Startup Thinking Machine Lab emerges from stealth at $20 billion seed and $1 billion valuation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.