{"id":56146,"date":"2022-01-18T18:02:43","date_gmt":"2022-01-18T16:02:43","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=56146"},"modified":"2025-09-04T04:59:47","modified_gmt":"2025-09-04T01:59:47","slug":"lazarus-division-targets-bitcoin-startups","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/lazarus-division-targets-bitcoin-startups\/","title":{"rendered":"Lazarus Division Targets Bitcoin Startups"},"content":{"rendered":"<p>Cryptocurrency startups worldwide are falling prey to the cybercriminal group BlueNoroff, which siphons off their digital assets, according to experts from Kaspersky Lab.<\/p>\n<p>According to them, BlueNoroff sends emails purportedly from existing venture-capital firms as bait to persuade the victim to open an attachment to the email\u2014a macro-enabled document.<\/p>\n<p>Researchers have found that the attackers misused trademarks and the names of employees from more than 15 venture organisations. Experts say that the real companies have nothing to do with either the attacks or the emails.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cIf the device is not connected to the internet, a macro-enabled document does not pose a danger. Otherwise, it will download onto the victim&#8217;s device another document that deploys malware,\u201d explained Kaspersky Lab.<\/p>\n<\/blockquote>\n<p>In addition to infected Word documents, the attackers spread malware in archive files containing Windows shortcuts. These enable the later creation of a fully functional backdoor. To surveil the victim, BlueNoroff uses keyloggers and screenshot-capture programs.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cUpon identifying a suitable potential victim who uses a popular browser extension to manage crypto wallets\u2014such as MetaMask\u2014the attackers replace it with a fraudulent version,\u201d the researchers noted.<\/p>\n<\/blockquote>\n<p>The attackers also receive notices of large transfers and, at the moment of the transaction, intercept them, altering the recipient address and inflating the transfer amount to the maximum.<\/p>\n<p>BlueNoroff is part of the North Korean Lazarus group and uses its diversified structure and advanced technologies to attack users in different countries.<\/p>\n<p>To defend against hackers, Kaspersky Lab experts recommend regular network audits, using up-to-date protections against sophisticated attacks, and training staff in cybersecurity basics.<\/p>\n<p>According to Chainalysis, in 2021 North Korean hackers stole <a href=\"https:\/\/forklog.com\/en\/news\/u-s-army-about-6000-hackers-are-targeting-north-korea\">$400 mln in cryptocurrencies<\/a>.<\/p>\n<p>Read ForkLog&#8217;s Bitcoin news on our <a href=\"https:\/\/telegram.me\/forklog\" target=\"_blank\" rel=\"nofollow noopener\">Telegram<\/a> \u2014 cryptocurrency news, prices and analytics.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptocurrency startups worldwide are falling victim to the cybercriminal group BlueNoroff, which siphons off their digital assets.<\/p>\n","protected":false},"author":1,"featured_media":56147,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1154,1553,1125,1223],"class_list":["post-56146","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-crimes","tag-kaspersky-lab","tag-lazarus","tag-startups"],"aioseo_notices":[],"amp_enabled":true,"views":"14","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/56146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=56146"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/56146\/revisions"}],"predecessor-version":[{"id":56148,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/56146\/revisions\/56148"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/56147"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=56146"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=56146"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=56146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}