Share this article

North Korean Hacker Group Lazarus Targets Japanese Crypto Firms

Lazarus Group has been targeting Japanese firms with phishing links via email and social media.

Updated May 9, 2023, 3:59 a.m. Published Oct 17, 2022, 7:40 a.m.
jwp-player-placeholder

The infamous North Korean hacker group Lazarus has attacked several Japanese crypto funds through phishing and social engineering, according to a joint statement by local police and the Financial Services Agency of Japan.

A report by Japan News adds that some companies have had their internal systems hacked and some cryptocurrency has been stolen.

STORY CONTINUES BELOW
Don't miss another story.Subscribe to the Crypto Daybook Americas Newsletter today. See all newsletters

Phishing is a form of hack that involves a malware-infected link being sent to a victim, a virus will be installed on the targeted computer when the link is clicked. Lazarus is said to have been sharing these links via email and social media.

Lazarus Group is accused of behind the $625 million Ronin Bridge exploit, blockchain analytics firm Elliptic also traced the $100 million Horizon Bridge hack back to Lazarus in June.

The Japanese National Police Agency didn't reveal any of the companies involved or amounts stolen, but it did name the hacker group - something the agency rarely does before arrest, in order to prevent a potential hack from happening.

Plus pour vous

Specialized AI detects 92% of real-world DeFi exploits

hackers (Modified by CoinDesk)

New research claims specialized AI dramatically outperforms general-purpose models at detecting exploited DeFi vulnerabilities.

Ce qu'il:

  • A purpose-built AI security agent detected vulnerabilities in 92% of 90 exploited DeFi contracts ($96.8 million in exploit value), compared with 34% and $7.5 million for a baseline GPT-5.1-based coding agent running on the same underlying model.
  • The gap came from domain-specific security methodology layered on top of the model, not differences in core AI capability, according to the report.
  • The findings come as prior research from Anthropic and OpenAI shows AI agents can execute end-to-end smart contract exploits at low cost, accelerating concerns that offensive AI capabilities are scaling faster than defensive adoption.