<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>lazarus group program Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/lazarus-group-program/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/lazarus-group-program/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Thu, 13 Mar 2025 12:56:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>lazarus group program Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/lazarus-group-program/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Lazarus Group Sends 400 ETH to Tornado Cash</title>
		<link>https://coinengineer.net/blog/lazarus-group-sends-400-eth-to-tornado-cash/</link>
					<comments>https://coinengineer.net/blog/lazarus-group-sends-400-eth-to-tornado-cash/#respond</comments>
		
		<dc:creator><![CDATA[Emre Yumlu]]></dc:creator>
		<pubDate>Thu, 13 Mar 2025 14:00:33 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[Crypto-laundering]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[lazarus group program]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=38376</guid>

					<description><![CDATA[<p>Lazarus Group laundering ETH while distributing new types of crypto theft software targeting developers. Lazarus Group Laundering Crypto Assets via Mixers Following High-Profile Hacks On March 13, blockchain security firm CertiK alerted its X followers that it had detected a deposit of 400 ETH worth around $750,000 to the Tornado Cash mixing service. &#8220;The fund</p>
<p>The post <a href="https://coinengineer.net/blog/lazarus-group-sends-400-eth-to-tornado-cash/">Lazarus Group Sends 400 ETH to Tornado Cash</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://coinengineer.net/blog/robinhood-lists-three-new-coins/"><strong>Lazarus Group laundering ETH</strong> </a>while distributing new types of crypto theft software targeting developers.</p>
<h2 data-start="0" data-end="82">Lazarus Group Laundering Crypto Assets via Mixers Following High-Profile Hacks</h2>
<p data-start="84" data-end="268">On March 13, blockchain security firm <strong data-start="122" data-end="132">CertiK</strong> alerted its X followers that it had detected a deposit of <strong data-start="191" data-end="202">400 ETH</strong> worth around <strong data-start="216" data-end="228">$750,000</strong> to the <strong data-start="236" data-end="252">Tornado Cash</strong> mixing service.</p>
<p data-start="270" data-end="353">&#8220;The fund traces to the Lazarus group&#8217;s activity on the Bitcoin network,&#8221; it noted.</p>
<p data-start="355" data-end="533">The North Korean hacking group is known to be responsible for the massive <strong data-start="429" data-end="452">Bybit exchange hack</strong> on <strong data-start="456" data-end="471">February 21</strong>, which led to the theft of <strong data-start="499" data-end="515">$1.4 billion</strong> in crypto assets.</p>
<p data-start="535" data-end="664">Additionally, it is linked to the <strong data-start="569" data-end="584">$29 million</strong> <strong data-start="585" data-end="609">Phemex exchange hack</strong> in January, and has continued laundering assets since.</p>
<p data-start="666" data-end="807">Lazarus has also been tied to some of the most notorious crypto hacking incidents, including the <strong data-start="763" data-end="798">$600 million Ronin network hack</strong> in 2022.</p>
<p data-start="809" data-end="990">According to <strong data-start="822" data-end="837">Chainalysis</strong> data, North Korean hackers stole over <strong data-start="876" data-end="892">$1.3 billion</strong> in crypto assets in <strong data-start="913" data-end="929">47 incidents</strong> in <strong data-start="933" data-end="941">2024</strong>, more than doubling thefts compared to <strong data-start="981" data-end="989">2023</strong>.</p>
<h2 data-start="992" data-end="1064">Lazarus Group Deploying New Malware Targeting Developer Environments</h2>
<p data-start="1066" data-end="1307">According to researchers at cybersecurity firm <strong data-start="1113" data-end="1123">Socket</strong>, the Lazarus Group has distributed <strong data-start="1159" data-end="1189">six new malicious packages</strong> designed to infiltrate developer environments, steal credentials, extract cryptocurrency data, and install backdoors.</p>
<p data-start="1309" data-end="1443">The group targeted the <strong data-start="1332" data-end="1362">Node Package Manager (NPM)</strong> ecosystem, which is a large collection of <strong data-start="1405" data-end="1428">JavaScript packages</strong> and libraries.</p>
<p data-start="1445" data-end="1626">Researchers discovered malware called <strong data-start="1483" data-end="1499">&#8220;BeaverTail&#8221;</strong> embedded in packages that mimic legitimate libraries using <strong data-start="1559" data-end="1576">typosquatting</strong> tactics or deceptive methods to trick developers.</p>
<p data-start="1628" data-end="1743">&#8220;Across these packages, Lazarus uses names that closely mimic legitimate and widely trusted libraries,&#8221; they added.</p>
<p data-start="1745" data-end="1812">The malware specifically targets <strong data-start="1778" data-end="1788">Solana</strong> and <strong data-start="1793" data-end="1803">Exodus</strong> wallets.</p>
<p data-start="1814" data-end="2022">The attack targets files in <strong data-start="1842" data-end="1859">Google Chrome</strong>, <strong data-start="1861" data-end="1870">Brave</strong>, and <strong data-start="1876" data-end="1887">Firefox</strong> browsers, as well as keychain data on <strong data-start="1926" data-end="1935">macOS</strong>, particularly targeting developers who may unknowingly install the malicious packages.</p>
<p data-start="2024" data-end="2234" data-is-last-node="" data-is-only-node="">The researchers noted that while attributing the attack definitively to Lazarus is difficult, &#8220;the tactics, techniques, and procedures observed in this npm attack closely align with Lazarus’s known operations.&#8221;</p>
<hr />
<p data-start="2024" data-end="2234" data-is-last-node="" data-is-only-node=""><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/lazarus-group-sends-400-eth-to-tornado-cash/">Lazarus Group Sends 400 ETH to Tornado Cash</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/lazarus-group-sends-400-eth-to-tornado-cash/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/03/lazarus_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/03/lazarus_ce.jpg' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
