There have been reports that hackers with ties to North Korea's Lazarus Group are behind a massive phishing campaign aimed at investors in nonfungible tokens (NFTs). This campaign is said to have used nearly 500 phishing domains to trick victims.
SlowMist, a blockchain security company, published a report on December 24 revealing the strategies that North Korean Advanced Persistent Threat (APT) groups have used to separate NFT investors from their NFTs. These strategies include the use of decoy websites that are disguised as a variety of different NFT-related platforms and projects.
Some examples of these fake websites include a website that pretends to be a project associated with the World Cup, as well as websites that impersonate well-known NFT marketplaces like OpenSea, X2Y2, and Rarible. Another example of one of these fake websites is a website that pretends to be a site that is related to the Olympics.
According to SlowMist, one of the strategies that was implemented was to have these decoy websites offer "malicious Mints." This strategy involves tricking victims into believing that they are minting a genuine NFT by connecting their wallet to the website in question.
However, the NFT is actually a fraudulent transaction, and the hacker, who now has access to the victim's wallet, is left with the ability to steal funds from it.
The report also found that many of the phishing websites shared the same Internet Protocol (IP), with 372 NFT phishing websites operating under a single IP and another 320 NFT phishing websites associated with another IP. This information was gleaned from the analysis of the phishing websites.
According to SlowMist, the phishing campaign has been going on for a number of months, and they noted that the earliest registered domain name was approximately seven months ago.
Phishing attempts also linked images to target projects and recorded visitor data, saving it on third-party websites. These are just two of the many methods that were used.
After the hacker was about to obtain the visitor's data, they would then proceed to run various attack scripts on the victim, which would allow the hacker access to the victim's access records, authorizations, and use of plug-in wallets, in addition to sensitive data such as the victim's approve record and sigData. After the hacker had obtained the visitor's data, they would then proceed to run various attack scripts on the victim.
However, SlowMist emphasized that this is just "the tip of the iceberg," as the analysis only looked at a small portion of the materials and extracted "some" of the phishing characteristics of the North Korean hackers. This was due to the fact that the analysis only looked at a small portion of the materials.
For instance, SlowMist highlighted the fact that just one phishing address was able to gain 1,055 NFTs and profit 300 Ether, which is equivalent to a profit of $367,000 through the use of its phishing techniques.
It was also revealed that the same North Korean APT group was responsible for the phishing attack against Naver, which had been documented by Prevailion on March 15.
In the year 2022, North Korea was the target of a number of different theft crimes involving cryptocurrencies.
According to a report that was released by the National Intelligence Service (NIS) of South Korea on December 22, North Korea is responsible for the theft of cryptocurrencies worth a total of $620 million just this year.
In October, Japan's National Police Agency issued a cautionary message to the country's crypto-asset businesses, advising them to exercise extreme caution around the hacking group associated with North Korea.
Comments
Post a Comment