Look up anything

Look up anything

Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

back to top

Lazarus Group Launders 400 ETH Via Twister Money, Deploys Malware Focusing on Builders

Related Article

BONK price is testing the 200-day Easy Transferring Common (SMA) close to $0.0000238. This...
Solana price surged by 61.37% over the previous month, rising from round $109.46 in...
Bitcoin miner Hut 8 elevated its hashrate by 79% within the first quarter of...
As of Might 7, 2025, three fiat currencies—the Swiss franc (CHF), Japanese yen (JPY),...
Bitcoin price began a gradual improve and cleared the $92,000 resistance. BTC is now...
21Shares filed a Type S-1 with the U.S. Securities and Change Fee (SEC) on...

YEREVAN (CoinChapter.com) — North Korean-affiliated hacking collective Lazarus Group continues laundering stolen cryptocurrency whereas increasing its malware operations. On March 13, blockchain safety agency CertiK recognized a 400 ETH ($750,000) deposit into Twister Money, a crypto mixer identified for obscuring transaction histories.

Lazarus Group Strikes 400 ETH to Twister Money, CertiK Traces Transactions to Bitcoin Community. Supply: CertiK

CertiK linked the funds to Lazarus Group’s actions on the Bitcoin community. The group has been behind a number of high-profile trade hacks, together with the $1.4 billion Bybit hack on Feb. 21 and the $29 million Phemex breach in January.

These newest transfers add to Lazarus’s historical past of laundering stolen belongings. In 2022, the group orchestrated the $600 million Ronin community hack, one of many largest DeFi exploits ever recorded. In line with Chainalysis, North Korean hackers stole $1.3 billion in 2024 throughout 47 incidents, greater than double the quantity stolen in 2023.

New Lazarus Malware Targets Crypto Builders

Cybersecurity researchers at Socket detected six new malicious packages deployed by Lazarus Group. These packages infiltrate developer environments, steal credentials, extract cryptocurrency knowledge, and set up backdoors.

The malware primarily targets the Node Package deal Supervisor (NPM) ecosystem, which hosts JavaScript libraries extensively utilized by builders. Researchers discovered a pressure known as “BeaverTail” embedded in packages that intently mimic professional software program libraries.

“Across these packages, Lazarus uses names that closely mimic legitimate and widely trusted libraries,”

Socket researchers famous. The group makes use of typosquatting ways to deceive builders into putting in malware.

Lazarus Group’s Malware Targets Crypto Wallets

The brand new malware particularly assaults cryptocurrency wallets, together with Solana and Exodus wallets. It additionally scans for delicate information saved in Google Chrome, Courageous, and Firefox browsers, aiming to extract non-public keys and credentials.

On macOS, the malware targets keychain knowledge, posing a big menace to builders who unknowingly set up these compromised packages. The malicious code grants attackers entry to encrypted credentials, permitting them to steal funds straight.

Lazarus Group Malware Targets Solana Wallets, Extracts Private Keys from Browser Data. Source: Socket
Lazarus Group Malware Targets Solana Wallets, Extracts Non-public Keys from Browser Information. Supply: Socket

Whereas researchers haven’t definitively attributed the assault to Lazarus Group, they famous that the strategies used on this NPM assault intently align with Lazarus’s identified operations.

Lazarus Group’s Historical past of Crypto Crimes

Lazarus Group stays a dominant participant in crypto-related cybercrime. The collective has been concerned in a number of the largest hacks in historical past, specializing in crypto exchanges, DeFi platforms, and developer environments.

The group’s newest exercise highlights an ongoing effort to each launder stolen belongings and increase malware campaigns. Above all, this places builders and crypto customers at continued danger.

Related Article

BONK price is testing the 200-day Easy Transferring Common (SMA) close to $0.0000238. This...
Solana price surged by 61.37% over the previous month, rising from round $109.46 in...
Bitcoin miner Hut 8 elevated its hashrate by 79% within the first quarter of...
As of Might 7, 2025, three fiat currencies—the Swiss franc (CHF), Japanese yen (JPY),...
Bitcoin price began a gradual improve and cleared the $92,000 resistance. BTC is now...
21Shares filed a Type S-1 with the U.S. Securities and Change Fee (SEC) on...