North Korean Fake IT Workers Get Counter-Hacked

A small team of North Korean IT workers — linked to a $680,000 crypto hack in June — have been using Google products and even renting computers to infiltrate crypto projects, according to newly leaked screenshots coming from one of the workers’ devices.  In an X post from ZachXBT on Wednesday, the crypto sleuth shared … Read more

North Korean Fake IT Workers Get Counter-Hacked

A small team of North Korean IT workers — linked to a $680,000 crypto hack in June — have been using Google products and even renting computers to infiltrate crypto projects, according to newly leaked screenshots coming from one of the workers’ devices.  In an X post from ZachXBT on Wednesday, the crypto sleuth shared … Read more

Samsung Galaxy Z Fold 7 Review: The North Star of Foldables

With the Galaxy Z Fold 7, Samsung has once again demonstrated its ability to reinvent the foldable segment. The Galaxy Z Fold 6 was a great device, but it followed a design language that didn’t feel like an upgrade over its predecessor. Samsung, during closed-door briefings for the Fold 7, claimed that it almost made … Read more

WazirX Hack Aftermath: North Korean Hackers Suspected of Stealing Funds From Indian Crypto Exchange

WazirX was impacted in a data breach on Thursday, as the company lost funds worth $230 million (roughly Rs. 1,924 crore) to hackers. Over the past 24 hours, analysts and crypto industry executives have identified reasons to believe that this sophisticated breach could have been initiated by North Korean hackers, possibly linked to the infamous … Read more

North Korean Hackers Intensifying Attacks on Crypto Sector, FBI Warns

The US Federal Bureau of Investigation (FBI) has warned crypto investors about the increasing danger posed by sophisticated North Korean hackers. The aim of these cybercriminals, according to the US investigative agency, is to steal hefty crypto reserves from firms that are operating services related to digital assets. These hack attacks have been described as … Read more

North Korea’s BlueNoroff Group Reportedly Targeting Crypto Community Members on MacOS

Cybersecurity firm SentinelLabs has raised an alert over a significant threat targeting crypto community members using macOS. According to their findings, the North Korean group BlueNoroff is distributing fake crypto news to entice users into downloading a multi-storage malware infection onto their MacBook. Dubbed the “Hidden Risk” campaign, this attack has been circulating since early … Read more

Greece Makes First Crypto Seizure Tied to North Korea’s $1.5B Bybit Hack

Greek authorities have carried out the country’s first cryptocurrency seizure, blocking access to funds lifted from February’s record $1.5 billion Bybit hack linked to North Korea’s Lazarus Group. The Hellenic Anti‑Money Laundering Authority traced a suspicious transaction to a wallet that on‑chain data tied to the initial theft. That wallet, according to Greece’s Minister of Economy … Read more

FBI Accuses North Korean Hackers of Bybit Attack, Urges Crypto Firms to Block Linked Transactions

The FBI has attributed the recent attack on Dubai-based Bybit crypto exchange to North Korean hackers. The agency has called on crypto firms to help block the stolen funds. According to Bybit CEO Ben Zhou, a hacker gained control of one of the exchange’s offline Ethereum wallets, resulting in a loss of nearly $1.5 billion … Read more

North Korean Hackers Use NimDoor macOS Malware to Target Web3, Crypto Platforms

North Korean hackers are using a special type of malware known as NimDoor to target macOS computers used at Web3 and crypto firms, according to details shared by a cybersecurity research firm. The threat actors are reportedly using bash scripts to collect and transfer sensitive information, such as browser data, iCloud Keychain credentials, and Telegram … Read more

North Korean Hackers Use NimDoor macOS Malware to Target Web3, Crypto Platforms

North Korean hackers are using a special type of malware known as NimDoor to target macOS computers used at Web3 and crypto firms, according to details shared by a cybersecurity research firm. The threat actors are reportedly using bash scripts to collect and transfer sensitive information, such as browser data, iCloud Keychain credentials, and Telegram … Read more