Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»FBI, DC3, and NPA Track $308 Million Cryptocurrency Theft to North Korean Hackers

    FBI, DC3, and NPA Track $308 Million Cryptocurrency Theft to North Korean Hackers

    December 24, 2024

    North Korean Hackers

    In May 2024, a cryptocurrency theft involving $308 million was linked to North Korean Hackers by the Federal Bureau of Investigation (FBI), the Department of Defense Cyber Crime Center (DC3), and the National Police Agency (NPA) of Japan. The theft targeted DMM, a Japan-based cryptocurrency company, and was part of ongoing illicit activities by North Korean cyber actors, who have increasingly used cybercrime to generate revenue for the regime.

    The cybercriminal group behind the attack has been tracked under various aliases, including TraderTraitor, Jade Sleet, UNC4899, and Slow Pisces. These actors are known for their use of targeted social engineering techniques to gain access to critical systems. In this particular case, the attackers compromised the DMM cryptocurrency wallet through a series of carefully planned actions that ultimately resulted in the theft of 4,502.9 Bitcoin (BTC), worth approximately $308 million at the time.

    The Attack: Social Engineering and Malware Exploitation

    The series of events leading up to the cryptocurrency theft began in late March 2024 when a North Korean cyber actor, posing as a recruiter, contacted an employee at Ginco, a Japan-based cryptocurrency wallet software company. This individual, who had access to Ginco’s wallet management system, was targeted with a malicious link disguised as a pre-employment test. The link led to a Python script hosted on GitHub.

    Believing the communication to be legitimate, the employee copied the Python code to their personal GitHub page, unknowingly setting the stage for a security breach. The malware hidden within the Python script provided the attackers with a foothold into the employee’s system. Once the malware was activated, it compromised the employee’s account, allowing the attackers to harvest sensitive data.

     North Korean Hackers Gained Access to DMM’s Systems

    By mid-May 2024, the TraderTraitor cyber actors exploited the compromised employee’s session cookie information to impersonate the victim. This granted them access to Ginco’s unencrypted communications system, which contained critical information on transactions and company operations. The actors were able to use this access to manipulate an ongoing transaction request from DMM, ultimately redirecting the cryptocurrency funds into wallets controlled by the attackers.

    The fraudulent transaction involved the theft of a large sum of Bitcoin—4,502.9 BTC—at the time valued at $308 million. The stolen funds were subsequently moved to wallets under the control of TraderTraitor, and their movement has been tracked by authorities, although the attackers continue to attempt to cover their tracks.

    Ongoing Investigations and International Collaboration

    The FBI, DC3, and NPA have emphasized that this incident is part of a larger pattern of illicit activities carried out by North Korean cyber actors. These actors have been known to engage in cybercrime, including cryptocurrency theft, to generate revenue that supports North Korea’s regime. The investigation into this theft is ongoing, with law enforcement and cybersecurity experts working across borders to trace the stolen funds and expose the full extent of the cyber actors’ activities.

    The collaboration between U.S. and Japanese authorities, along with other international partners, plays a critical role in identifying and holding accountable those responsible for such large-scale thefts.

    Impact on the Cryptocurrency Industry

    While cryptocurrency transactions offer a degree of anonymity, the movement of large sums of money is still traceable, and authorities are able to track stolen funds across the blockchain. However, the challenge remains in recovering these funds and preventing further thefts.

    As cybercriminals continue to refine their techniques, the need for enhanced cybersecurity measures and vigilant monitoring in the cryptocurrency industry becomes even more critical.

    A Broader Campaign of Cybercrime

    North Korean cyber actors, often linked to the Lazarus Group, have a history of engaging in cybercrime to fund state operations. The group has been attributed with several high-profile cyberattacks, including cyberattacks on financial institutions, cryptocurrency exchanges, and critical infrastructure. These activities are often part of a broader strategy to circumvent international sanctions and generate illicit revenue for the regime.

    The attack on DMM is a prime example of how cybercriminals, backed by nation-states, can use advanced tactics like social engineering and malware to exploit vulnerabilities within organizations. In this case, the success of the attack was partly due to the ability of the cyber actors to manipulate an ongoing legitimate transaction, illustrating the risks posed to businesses operating in the financial and cryptocurrency sectors.

    Continued Efforts to Combat Cybercrime

    The FBI, DC3, NPA, and other international partners remain committed to investigating and exposing North Korea’s cyber activities. Their efforts focus on preventing future attacks, tracking stolen assets, and holding those responsible accountable. While this particular theft resulted in a significant financial loss, it also highlights the broader issue of cybercrime and the importance of continued international collaboration to combat these growing threats.

    As investigations continue, law enforcement agencies are urging cryptocurrency companies and other financial institutions to strengthen their cybersecurity defenses and implement more robust measures to protect against social engineering and other malicious tactics. The DMM attack serves as a stark reminder of the evolving nature of cyber threats and the need for proactive security strategies in the ever-changing digital landscape.

    The theft of $308 million from DMM by North Korean cyber actors is a significant reminder of the evolving threat landscape in the digital world. As investigations continue, authorities remain committed to exposing these illicit activities and preventing further attacks.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleAdobe ColdFusion Vulnerability: Critical Bug (CVE-2024-53961) with PoC Exploit Code Discovered
    Next Article North Korean Hackers Pull Off $308M Bitcoin Heist from Crypto Firm DMM Bitcoin

    Related Posts

    Machine Learning

    LLMs Struggle with Real Conversations: Microsoft and Salesforce Researchers Reveal a 39% Performance Drop in Multi-Turn Underspecified Tasks

    May 17, 2025
    Machine Learning

    This AI paper from DeepSeek-AI Explores How DeepSeek-V3 Delivers High-Performance Language Modeling by Minimizing Hardware Overhead and Maximizing Computational Efficiency

    May 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    A new White House report embraces open-source AI

    Development

    Enterprises are hitting a ‘speed limit’ in deploying Gen AI – here’s why

    News & Updates

    CVE-2025-1279 – “WordPress BM Content Builder Unauthenticated Privilege Escalation”

    Common Vulnerabilities and Exposures (CVEs)

    New ‘Act 33’ Pennsylvania Law Mandates Stricter Protection for Victims Of Data Breaches

    Development
    Hostinger

    Highlights

    Development

    Ivanti Rushes Patches for 4 New Flaw in Connect Secure and Policy Secure

    April 4, 2024

    Ivanti has released security updates to address four security flaws impacting Connect Secure and Policy…

    CVE-2025-47862 – Apache HTTP Web Server Information Disclosure

    May 13, 2025

    LG Gram 17, one of the best productivity laptops around, is $600 OFF

    June 12, 2024

    China-Linked Hackers Adopt Two-Stage Infection Tactic to Deploy Deuterbear RAT

    May 17, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.