{"id":32250,"date":"2022-10-17T03:41:35","date_gmt":"2022-10-17T03:41:35","guid":{"rendered":"http:\/\/egrowonline.com\/?p=32250"},"modified":"2022-10-17T03:41:35","modified_gmt":"2022-10-17T03:41:35","slug":"north-koreas-lazarus-behind-years-of-crypto-hacks-in-japan-police","status":"publish","type":"post","link":"http:\/\/egrowonline.com\/?p=32250","title":{"rendered":"North Korea\u2019s Lazarus behind years of crypto hacks in Japan: Police"},"content":{"rendered":"<p> <br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/images.cointelegraph.com\/images\/840_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMTAvMWMwMjJlMGQtNWIwYS00M2M2LTg3MTMtY2YyNjc0YmM3YmIzLmpwZw==.jpg\" \/><\/p>\n<div data-v-4b69a2fe=\"\">\n<p>Japan\u2019s national police have pinned North Korean hacking group, Lazarus, as the organization behind several years of crypto-related cyber attacks.\u00a0<\/p>\n<p>In the public advisory <a target=\"_blank\" href=\"https:\/\/www.npa.go.jp\/cyber\/pdf\/R041014_cyber_alert.pdf\" rel=\"noopener nofollow\">statement<\/a> sent out on Oct. 14,\u00a0 Japan\u2019s National Police Agency (NPA) and Financial Services Agency (FSA) sent a warning to the country&#8217;s crypto-asset businesses, asking them to stay vigilant of \u201cphishing\u201d attacks by the hacking groupaimed at stealing crypto assets. <\/p>\n<p>The advisory statement is known as \u201cpublic attribution,\u201d and <a target=\"_blank\" href=\"https:\/\/japannews.yomiuri.co.jp\/politics\/defense-security\/20221015-64792\/\" rel=\"noopener nofollow\">according<\/a> to local reports, is the fifth time in history that the government has issued such a warning. <\/p>\n<p>The statement warns that the hacking group uses social engineering to orchestrate phishing attacks \u2014 impersonating executives of a target company to try and bait employees into clicking malicious links or attachments:<\/p>\n<blockquote><p>\u201cThis cyber attack group sends phishing emails to employees impersonating executives of the target company [&#8230;] through social networking sites with false accounts, pretending to conduct business transactions [&#8230;] The cyber-attack group [then] uses the malware as a foothold to gain access to the victim&#8217;s network.\u201d<\/p><\/blockquote>\n<p>According to the statement, phishing has been a common mode of attack used by North Korean hackers, with the NPA and FSA urging targeted companies to keep their \u201cprivate keys in an offline environment\u201d and to \u201cnot open email attachments or hyperlinks carelessly.\u201d<\/p>\n<p>The statement added that individuals and businesses should \u201cnot download files from sources other than those whose authenticity can be verified, especially for applications related to cryptographic assets.\u201d<\/p>\n<p>The NPA also suggested that digital asset holders \u201cinstall security software,\u201d strengthen identity authentication mechanisms by \u201cimplementing multi-factor authentication\u201d and not use the same password for multiple devices or services.<\/p>\n<p>The NPA confirmed that several of these attacks have been successfully carried out against Japanese-based digital asset firms, but didn\u2019t disclose any specific details.<\/p>\n<p><strong><em>Related: <\/em><\/strong><a target=\"_blank\" href=\"https:\/\/cointelegraph.com\/news\/nobody-is-holding-them-back-north-korean-cyber-attack-threat-rises\" rel=\"noopener\"><strong><em>\u2018Nobody is holding them back\u2019 \u2014 North Korean cyber-attack threat rises<\/em><\/strong><\/a><\/p>\n<p>Lazarus Group is allegedly affiliated with North Korea\u2019s Reconnaissance General Bureau, a government-run foreign intelligence group.<\/p>\n<p>Katsuyuki Okamoto of multinational IT firm Trend Micro <a target=\"_blank\" href=\"https:\/\/japannews.yomiuri.co.jp\/politics\/defense-security\/20221015-64792\/\" rel=\"noopener nofollow\">told<\/a>\u00a0The Yomiuri Shimbun that \u201cLazarus initially targeted banks in various countries, but recently it has been aiming at crypto assets that are managed more loosely.\u201d<\/p>\n<p>They have been accused of being the hackers behind the <a target=\"_blank\" href=\"https:\/\/cointelegraph.com\/news\/north-korean-lazarus-group-allegedly-behind-ronin-bridge-hack\" rel=\"noopener\">$650 million Ronin Bridge exploit in March,<\/a> and were identified as suspects in the <a target=\"_blank\" href=\"https:\/\/cointelegraph.com\/news\/infamous-north-korean-hacker-group-identified-as-suspect-for-100m-harmony-attack\" rel=\"noopener\">$100 million attack from layer-1 blockchain Harmony.<\/a><\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/cointelegraph.com\/news\/north-korea-s-lazarus-behind-years-of-crypto-hacks-in-japan-police\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Japan\u2019s national police have pinned North Korean hacking group, Lazarus, as the organization behind several years of crypto-related cyber attacks.\u00a0 In the public advisory statement sent out on Oct. 14,\u00a0 Japan\u2019s National Police Agency (NPA) and Financial Services Agency (FSA) sent a warning to the country&#8217;s crypto-asset businesses, asking them to stay vigilant of \u201cphishing\u201d [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":32251,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[38],"tags":[62,5184,1875,6184,7376,1008,2535,1507],"class_list":["post-32250","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blockchain","tag-crypto","tag-hacks","tag-japan","tag-koreas","tag-lazarus","tag-north","tag-police","tag-years"],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"http:\/\/egrowonline.com\/wp-content\/uploads\/2022\/10\/1200_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMTAvMWMwMjJlMGQtNWIwYS00M2M2LTg3MTMtY2YyNjc0YmM3YmIzLmpwZw.jpg","_links":{"self":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/32250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=32250"}],"version-history":[{"count":1,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/32250\/revisions"}],"predecessor-version":[{"id":32252,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/32250\/revisions\/32252"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/media\/32251"}],"wp:attachment":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=32250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=32250"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=32250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}