Skip to main content

Hackers from North Korea are stealing NFTs using almost 500 different phishing domains.

 

Hackers from North Korea are stealing NFTs using almost 500 different phishing domains.

The cybercriminals established dummy websites that posed as legitimate NFT marketplaces, NFT projects, and even a DeFi platform.

There have been reports that hackers with ties to North Korea's Lazarus Group are behind a massive phishing campaign aimed at investors in nonfungible tokens (NFTs). This campaign is said to have used nearly 500 phishing domains to trick victims.

SlowMist, a blockchain security company, published a report on December 24 revealing the strategies that North Korean Advanced Persistent Threat (APT) groups have used to separate NFT investors from their NFTs. These strategies include the use of decoy websites that are disguised as a variety of different NFT-related platforms and projects.

Some examples of these fake websites include a website that pretends to be a project associated with the World Cup, as well as websites that impersonate well-known NFT marketplaces like OpenSea, X2Y2, and Rarible. Another example of one of these fake websites is a website that pretends to be a site that is related to the Olympics.

According to SlowMist, one of the strategies that was implemented was to have these decoy websites offer "malicious Mints." This strategy involves tricking victims into believing that they are minting a genuine NFT by connecting their wallet to the website in question.

However, the NFT is actually a fraudulent transaction, and the hacker, who now has access to the victim's wallet, is left with the ability to steal funds from it.

The report also found that many of the phishing websites shared the same Internet Protocol (IP), with 372 NFT phishing websites operating under a single IP and another 320 NFT phishing websites associated with another IP. This information was gleaned from the analysis of the phishing websites.

According to SlowMist, the phishing campaign has been going on for a number of months, and they noted that the earliest registered domain name was approximately seven months ago.

Phishing attempts also linked images to target projects and recorded visitor data, saving it on third-party websites. These are just two of the many methods that were used.

After the hacker was about to obtain the visitor's data, they would then proceed to run various attack scripts on the victim, which would allow the hacker access to the victim's access records, authorizations, and use of plug-in wallets, in addition to sensitive data such as the victim's approve record and sigData. After the hacker had obtained the visitor's data, they would then proceed to run various attack scripts on the victim..net/YwotbKdP4sVunJGfdhmgww/e8f260a6-84bf-4222-a093-e1ef14e44c00/

After obtaining all of this information, the hacker is able to gain access to the victim's wallet and view all of the victim's digital assets.

However, SlowMist emphasized that this is just "the tip of the iceberg," as the analysis only looked at a small portion of the materials and extracted "some" of the phishing characteristics of the North Korean hackers. This was due to the fact that the analysis only looked at a small portion of the materials.

For instance, SlowMist highlighted the fact that just one phishing address was able to gain 1,055 NFTs and profit 300 Ether, which is equivalent to a profit of $367,000 through the use of its phishing techniques.

It was also revealed that the same North Korean APT group was responsible for the phishing attack against Naver, which had been documented by Prevailion on March 15.

In the year 2022, North Korea was the target of a number of different theft crimes involving cryptocurrencies.

According to a report that was released by the National Intelligence Service (NIS) of South Korea on December 22, North Korea is responsible for the theft of cryptocurrencies worth a total of $620 million just this year.

In October, Japan's National Police Agency issued a cautionary message to the country's crypto-asset businesses, advising them to exercise extreme caution around the hacking group associated with North Korea.

Comments

Popular posts from this blog

Musk presents "Optimus" at Tesla's AI Day.

  Tesla CEO Elon Musk unveils "Optimus" at "AI Day" on Friday. A robot-based business would be worth more than a car-based business, the billionaire said. He wants to move beyond self-driving cars, which he has repeatedly promised. Onstage, a robot model waved to the audience. In the automaker's factory, a video showed the robot moving metal bars and watering plants. "Our goal is to make a useful humanoid robot as soon as possible," Musk said. "Optimus needs a lot of work to be effective." Musk said humanoid robots "lack a brain" because they can't travel the world independently. He also said they're expensive and rare. Optimus would be mass-produced in the millions and cost less than $20,000, he said. Musk expected to discuss Tesla's self-driving car technology. In May, the CEO said the world's most valuable car company would be "worthless" without self-driving cars. The company faces regulatory and techno...

By 2030, the GCC economies are expected to receive $15 billion annually from the metaverse.

According to the most recent report from Strategy& Middle East, a member of the PwC network, the potential contribution of the metaverse to the GCC economies may be roughly US$15 billion yearly by 2030, of which $7.6 billion would be in Saudi Arabia and $3.3 billion in the UAE. The metaverse is still in its early stages, yet change is happening quickly. Companies in the GCC should move right away to take advantage of this chance. According to Tony G. Karam, Partner at Strategy & Middle East, by 2030, the metaverse will contribute $15 billion yearly to the economies of the GCC. The forecasts evaluated new metaverse applications like content production, commerce, and other activities as well as growth in the underlying platforms, hardware, and software. The metaverse's charm lies in the fact that it is neither a location nor a tool. Instead, it represents the most recent development in human/computer interface technology, one that aims to produce a seamless, pervasive, immers...