Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert
Zero fees, no slippage
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
ZachXBT Exposes Lazarus Group’s Latest $3.1M Heist Draining a Tron User’s Wallet

ZachXBT Exposes Lazarus Group’s Latest $3.1M Heist Draining a Tron User’s Wallet

Bitcoin.comBitcoin.com2025/03/01 20:22
By:Bitcoin.com

The Feb. 28, 2025, attack targeted an unnamed victim, with stolen funds bridged from Tron to Ethereum and laundered through privacy mixing tool Tornado Cash. ZachXBT noted that blockchain records show the hacker moved 96 batches of 10 ETH, four batches of 100 ETH, 78 batches of 1 ETH, and five smaller increments totaling over $3.1 million.

ZachXBT traced the theft to two addresses: “TYQ34” on Tron and “0xcce” on Ethereum. The onchain sleuth said the latter wallet had been flagged in a 2023 Fantom Foundation executive phishing attack attributed to Lazarus Group by a March 2024 United Nations (UN) report.

The reuse of the ether address provided a critical link to Lazarus, which the UN tied to crypto thefts reportedly funding North Korea’s weapons programs. The group is accused of stealing billions, including last week’s massive Bybit $1.4 billion breach.

The latest heist’s operational parallels to past Lazarus campaigns, including rapid fund fragmentation and reliance on cross-chain bridges to obscure trails. Mixers and decentralized exchange (DEX) platforms remain the preferred laundering tool for the group despite some freezes and roadblocks.

The victim’s identity and method of infiltration remain unclear. Cybersecurity firms and onchain observers urge heightened vigilance against spearphishing, a hallmark of the group’s tactics. Moreover, after tracing swathes of transactions, ZachXBT explained this week that North Korea’s hacking collective is connected to four different major centralized exchange (CEX) hacks, including Bybit, Poloniex, Phemex, and Bingx.

免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Locked for new tokens.
APR up to 10%. Always on, always get airdrop.
Lock now!