CyberWire Daily - Bybit’s $1.4B breach. [Research Saturday]

Episode Date: April 5, 2025

Zach Edwards from Silent Push is discussing their work on "New Lazarus Group Infrastructure, Acquires Sensitive Intel Related to $1.4B ByBit Hack and Past Attacks." Silent Push analysts uncovered sign...ificant infrastructure used by the Lazarus APT Group, linking them to the $1.4 billion Bybit crypto heist through the domain bybit-assessment[.]com registered just hours before the attack. The investigation revealed a pattern of test entries, VPN usage, and fake job interview scams targeting crypto users, with malware deployment tied to North Korean threat actor groups like TraderTraitor and Contagious Interview. The team also identified numerous companies being impersonated in these scams, including major crypto platforms like Coinbase, Binance, and Kraken, to alert potential victims. The research can be found here: Silent Push Pivots into New Lazarus Group Infrastructure, Acquires Sensitive Intel Related to $1.4B ByBit Hack and Past Attacks Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the CyberWire Network, powered by N2K. Is your AppSec program actually reducing risk? Developers and AppSec teams drown in critical alerts, yet 95% of fixes don't reduce real risk. Why? Traditional tools use generic prioritization and lack the ability to filter real threats from noise. High impact threats slip through and surface in production, costing 10 times more to fix. Ox Security helps you focus on the 5% of issues that truly matter before they reach the cloud.
Starting point is 00:00:46 Find out what risks deserve your attention in 2025. Download the Application Security Benchmark from OxSecurity. Thank you. Thank you. Thank you. Thank you. Thank you. Thank you. Thank you.
Starting point is 00:01:14 Thank you. Thank you. Thank you. Thank you. Thank you. Thank you. Thank you. some of the hard problems and protecting ourselves in a rapidly evolving cyberspace. Thanks for joining us. This report that we did really came on the heels of the $1.4 billion buy-bit hack.
Starting point is 00:01:38 And our team, of course, when we saw this news, along with every other researcher in the industry, we immediately said, my goodness, that's the largest heist that's ever existed in crypto. Is there anything that we can see within this hack to figure out additional details or pivot into other parts of their infrastructure? That's Zach Edwards, a researcher at Silent Push. The research we're discussing today is titled New Lazarus Group Infrastructure Acquires Sensitive Intel Related to $1.4 billion
Starting point is 00:02:10 Bybit hack and past attacks. And so we essentially started to immediately just look for any domains that mentioned Bybit that were registered recently. And so our process was rather elementary at the start of it, but almost immediately we had a hit that there was a domain, Bybit-Assessment.com, that was registered just hours before the attack supposedly occurred. And so our team started looking into this domain and immediately in the WhoIs records, there was an email address exposed which actually had been used in other Lazarus North Korean hacker attacks in the past. And so our team immediately started to wonder, is this domain, which is registered by a threat
Starting point is 00:03:10 actor associated to this North Korean group, was this actually the domain that was used in the heist? And what was quite interesting about our early findings was that this domain was actually being used by a different North Korean threat actor, not the North Korean threat actor who did the heist against Bybit. Just to simplify this a little bit, North Korea has a number of hacking groups. They're all classified under this Lazarus name. And then under Lazarus, there are subgroups.
Starting point is 00:03:52 And the group that did the billion dollar heist is an organization known as Trader, Trader, which is a mouthful. But essentially, this group is going after large crypto organizations. They're doing these complicated hacks, supply chain breaches, and they've been behind similar crypto heists in the past. But this domain that we had found that was registered just hours before the Bybit hack was actually a separate group called contagious interview. And so what's particularly interesting about this is that across these different North
Starting point is 00:04:31 Korean hacker groups, they're targeting the same companies. And so as we started to get into more details about what contagious interview infrastructure we were looking at, we realized that this was actually going to create an opportunity for us to understand other North Korean threat actors as well. So not just the contagious interview subgroup, but potentially the other attackers and campaigns that they may be launching. And so in short, our team was looking into this new domain that was registered by a contagious interview Lazarus subgroup.
Starting point is 00:05:15 And we found a few pivots where this domain was connected into a couple of others through server and who is commonalities. And one of the domains that we pivoted into was wide open. They'd left all of their code, all their infrastructure, just waiting for anyone to download it. And so our team immediately grabbed those resources and we were essentially able to get logs of these North Korean threat actors testing their own infrastructure and not only exposing email addresses that they use for this testing but IP addresses
Starting point is 00:05:51 that they're using to communicate to basically communicate with this infrastructure. And so this from one tiny pivot or one little investigation into can we find anything on the Bybit hack eventually led us into can we find anything on the Bybit hack, eventually led us into what we have now is the actual code from one of these North Korean threat actor groups and their infrastructure logs.
Starting point is 00:06:15 Wow. Well, I do want to dig into that, but before we do, can we just break down the attack itself? I mean, how did Lazarus go about infiltrating Bybit? Yeah, that's a great question. So what we sort of know about this attack right now is that an organization called SafeWallet was targeted. And essentially the threat actors at Lazarus and this subgroup, TraderTrader, set up some honeypots that they were targeting
Starting point is 00:06:47 safe wallet developers. And through a somewhat murky process, we don't exactly know how that developer was targeted. It's possible that there's maybe some sensitive details. We don't exactly know why that developer interacted with that phishing experience. We don't exactly know what type of malware they were given, but we do know that that developer was compromised. And as soon as they had sort of compromised that developer's device, they went out and they essentially created a honey pod or a change to this code so that when a very
Starting point is 00:07:27 specific wallet ID was going to interact with the safe wallet, it would switch out the wallet IDs from the known trusted Bybit wallet into an attacker's wallet. And so Bybit was essentially just doing their normal course of business. They were doing some process that they probably do every other day or every week. But in this instance, the code was essentially poisoned. And so when they went to make their transfer, instead of the money going into an internal wallet, it went external. And the threat actors suddenly had basically bybit transferred them all the money and within minutes to hours they were laundering that money through numerous different laundering services, sort of different exchanges.
Starting point is 00:08:19 A small portion of it has been seized, millions of dollars, but there's still hundreds of millions that are unaccounted for, slash successfully laundered. So right now, there's a lot of crypto investigators that are continuing to try and track that money and whenever that money is transferred into a specific exchange that maybe has KYC policies, complies with abuse complaints, they're attempting to freeze those funds. So it's essentially a race to see how fast Lazarus can launder the money and if researchers and exchanges can freeze that money before it's spread out into so many wallets that it's essentially a fool's errand to try and track this.
Starting point is 00:09:15 The long and short of it is Lazarus has been extremely successful at laundering crypto money and there's many researchers that have been successful at stopping some of it, but the reason why we continue to have these ongoing campaigns where they're trying to basically rob crypto banks, and then they also have these other schemes where they're trying to infect crypto developers. The reason why they're doing all of that is because this crypto is money, spends like money in all the ways that North Korean laundering care about. They're able to acquire this crypto, launder it through complex technical means, and then
Starting point is 00:09:59 on the back end, use various cash for crypto laundering networks that exist all over Asia and essentially turn that crypto into currency. What we know about North Korea, they're taking this currency and they're using it to fund their nuclear program and their ballistic missile program. Essentially, everyone out there that cares about a safer world, a world where North Korea doesn't have the weapons to basically threaten allies and neighbors, needs to be thinking about these types of crypto heists. Because even if you're not in the crypto game yourself, not an investor, this is serious
Starting point is 00:10:41 money. And then the other reality is that the United States now has a sovereign crypto fund. So all us taxpayers in the US, we technically have skin in the crypto game. And so it's a very complicated situation. Well, Zach, help me understand here. When Lazarus Group decided to turn the knob and start siphoning off all of this crypto from Bybit, how much infrastructure would they have needed behind the scenes to intake all of that?
Starting point is 00:11:16 Would they be able to handle that in an automated way to start the distribution for the laundering, or do you suppose they had to have a team of folks standing by? That's a really good question. I think that it's clear that there was a team of money launderers likely standing by and while we don't have all the details about how North Korea and hackers structure their own internal operations. It's clear that they have operators, they have social engineers, they have developers,
Starting point is 00:11:52 and they have experts at crypto money laundering. There's basically tornado cash, maybe a phrase that people are familiar with. There have been other crypto laundering services that have gone under the ire of the US government. Some have been deemed sort of illegal products and there's various litigation going on around those. But there's essentially a large number of quote crypto laundering services available. And so it would appear that these North Korean threat actors have their finger on the pulse of a large number of these. And this is basically one of those problems that's only going to get more complicated
Starting point is 00:12:38 over time. And essentially, when they have hundreds of millions of dollars, they can just hand that over to another team and then start using these tornado cash like laundering services. And the way that this essentially works, let's say you transfer in $5 million in Bitcoin or Ethereum into one of these mixers. The mixers then will generate thousands of other wallets, and they're doing this for all of their clients. And so essentially the output from these mixers is they may take $5 million and split it up
Starting point is 00:13:17 into $10,000 chunks and then transmit those $10,000 chunks to each of the wallets that are being spun up. And so when you have hundreds of clients using the same service, all putting money into it, the money starts to get blended and hidden away. You can see the new wallets that are being created and the money that are being transferred from that service into them, but you don't know who controls that wallet. You don't know which pool of money was actually behind it. Now fortunately for researchers, when you have hundreds of millions of dollars in crypto
Starting point is 00:13:54 and you're putting it into these mixing services, I think that the noise from that volume ends up making it a little easier or at least somewhat possible to track some of this money even when it does go into a thousand other wallets. And so that's part of what these crypto investigators are really spending a lot of their time on is investigating where the money was sent to and then when they see that money sort of disappear into a thousand other wallets, they need to further track those thousand wallets and start to determine does that money then transfer even further. And this is the way that these chains work. It's essentially passing money from one wallet to the next. And it does take serious technical resources to track that in the crypto ecosystem.
Starting point is 00:14:53 We'll be right back. Looking for a career where innovation meets impact? Vanguard's technology team is shaping the future of financial services by solving complex challenges with cutting-edge solutions. Whether you're passionate about AI, cybersecurity, or cloud computing, Vanguard offers a dynamic and collaborative environment where your ideas drive change. With career growth opportunities and a focus on work-life balance,
Starting point is 00:15:24 you'll have the flexibility to thrive both professionally and personally. Explore open cybersecurity and technology roles today at VanguardJobs.com. Cyber threats are evolving every second, and staying ahead is more than just a challenge, it's a necessity. That's why we're thrilled to partner with ThreatLocker, a cybersecurity solution trusted by businesses worldwide. ThreatLocker is a full suite of solutions designed to give you total control, stopping unauthorized applications, securing sensitive data, and ensuring your organization runs smoothly and securely.
Starting point is 00:16:08 Visit threatlocker.com today to see how a default deny approach can keep your company safe and compliant. Can you share some insights? I know for example, you and your colleagues at Silent Push, you have your own threat monitoring tools, but there's also open source intelligence. How do each of those play into detecting this sort of attack? Yeah, that's a great point.
Starting point is 00:16:42 So Silent Push, we have our own proprietary data. We have a community tool where anyone can sort of search our data for free, but we like to think about it as it's all our own first-party data. This is both good and bad. Good in that we can easily share it, make it available to other folks, but we may not have the visibility into certain niche threats. And so it's essential for any researchers who use a specific tool set or use a specific platform, you absolutely have to combine that with external research methodologies. And so this type of threat, it would be impossible to track this type of threat if there weren't hundreds of people at a diverse range of research and cybersecurity companies
Starting point is 00:17:34 looking into this and making their findings public about what they saw. And we basically made our report public even though it was essentially an effort where we were trying to investigate TraderTrader, and we pivoted into contagious interview, two separate Lazarus subgroups. But it's essential for everyone out there to know that these North Korean hackers are targeting the same brands. And so if you're a researcher investigating one Lazarus subgroup, you really need to try and make that research public because what you found may actually impact other Lazarus
Starting point is 00:18:13 subgroups and may be a lead that someone tracking a totally separate actor or a totally separate subgroup could use to find their next target. And so when we think about sort of these Lazarus subgroups, Contagious Interview is a group that is essentially targeting people who are looking to work in the crypto industry. And this subgroup basically has created honeypots where they may have job websites, they may have totally fake corporate LinkedIn's, they're creating fake employees, and they're reaching out to people who want to work in the crypto industry and saying, hey, we think you're
Starting point is 00:18:57 a great fit for this job, can you apply in this website? And then people are going to these websites and this is impacting a large number of crypto employees and people who want to work in the industry. And as they go through this job hiring website, it looks legitimate, it looks real, they're asking the right questions. They always have this video interview portion or something to basically record your own thoughts on a specific question that they're asking. And in this process, when you click to initiate the video, a subtle error message pops up and says,
Starting point is 00:19:33 whoops, you're almost done with the job application, but unfortunately this video, we're having an error. You just need to download this one thing real quick and it will fix it and you'll be done with this job interview and on your way. And so they have these really convincing lures in this job application process, which eventually deploys malware onto one of these crypto developers' computers. And it's really important for everyone to appreciate that this type of threat actor that is able to convince an individual to basically compromise their own computer and that individual may currently work at a crypto company. And so they're applying to work at another crypto company, but herein lies the rub. If a crypto threat actor gets access to a developer's
Starting point is 00:20:27 machine who already works at a crypto company, they could immediately get access to sensitive credentials and sensitive details, which they could pass on to another one of the Lazarus subgroups to essentially conduct a bank heist against that crypto company. And so I think it's really important for people to appreciate that Lazarus and this North Korean threat actor group, they have different schemes. Some of these high-level bank heist type schemes, others are this kind of a little less sophisticated
Starting point is 00:21:00 targeting of individual developers. But it all wraps up into this larger threat matrix where if they get one thing from the contagious interview process, they could pass it on to the other group and suddenly someone who was applying for a job could have their own company ransomware that they currently work at. And so there's a lot of complexity between researching these Lazarus groups, understanding
Starting point is 00:21:28 their shared targeting, and appreciating that we need to make details public whenever we figure out that for one of these subgroups, because it could apply broadly to Lazarus. So given this group's resources, their sophistication, their cleverness, their persistence, what do companies do to protect their supply chains, to protect their employees against these sorts of things? Yeah, and really there's no silver bullet for stopping these types of threats. Education and training people that these threats are out there is really the first step.
Starting point is 00:22:15 Everyone who is in the crypto industry should hopefully be aware that this is occurring. They should be very cautious when applying for jobs or when someone proactively reaches out to them offering them a job. The other thing that defenders should really keep in mind is that North Korean threat actors have some consistent decisions they're making. And one of them that we actually uncovered in our research was aligned to other past research that's been put out, North Korean threat actors for whatever reason love a VPN called Astral VPN. Now most people here probably aren't familiar with Astral VPN. It's certainly not sponsoring podcasts and out there kind of with as much notoriety as some of the others, but it's still a legitimate, relatively large VPN. But in the logs
Starting point is 00:23:12 that we acquired from this contagious interview, operational failure that they had, we were seeing all of their test logs as they were testing their own infrastructure. And shockingly, we had the IP addresses in these logs. And so, our team was able to look at all the IP addresses that they were using in this test submission process, and 100% of them were Astral VPNs. And so, I think it's very important for the vendors to know that. And our team has spoken with quite a few other organizations
Starting point is 00:23:47 that have been directly targeted either with this contagious interview scheme or other variations. There's a fake IT worker scheme that North Korea is also deploying where they essentially have hundreds if not thousands of people spread out across Asia and they're applying for jobs at Western companies and not just crypto companies. And these people, once they get these jobs, they're essentially, many of them have multiple jobs at the same time. So they're sort of juggling multiple employments at the same time and they're taking that money and they're funneling it to the same nuclear and ballistic
Starting point is 00:24:31 missile programs that these other crypto schemes are funneling money into. And so there's a lot of major corporations. Know Before is a popular security company. They help with phishing tests. They hired one of these fake North Korean workers, and they put out a really good blog post explaining how they were tricked, how they caught it, what the threat actors were trying to do. It's really important for everyone to appreciate that these fake IT workers also use astral
Starting point is 00:25:06 VPN. And so when we catch something like a contagious interview using an astral VPN and it aligns with the fake IT workers using astral VPN and we see shared targeting across these groups, these are the details which are really important to share and to make public whenever possible. And so every defender out there, if you're trying to stop all of these different types of North Korean threats from the crypto heists to the various fake worker schemes and fake hiring schemes, it's really important to track the IPs that are being used
Starting point is 00:25:50 in those connections into your infrastructure. And ideally you would have a pool of astral VPNs so that you could basically compare that against those connections. And if you see astral VPN connections in your infrastructure and those are connected with suspicious behaviors, you should strongly consider classifying that as a potential North Korean threat actor and try and make those details public. Well, Zach, before we run out of time, I do want to dig into this unique view that you
Starting point is 00:26:27 and your colleagues had with this exposed server, I suppose we could call it, and everything that was in it. I'm trying to imagine the look on your face or your colleagues' faces, the wide eyes you must have had when you realized what you had in front of you there. That's exactly right. And it's down now. So it was only exposed for a very short period of time. And our researchers at Silent Push, we always are looking for threat actors' mistakes.
Starting point is 00:26:55 And usually that's just maybe a consistency decision they're making, some type of hosting or registrar or domain pattern that they keep on using. But occasionally you do get lucky where a threat actor, they're spinning up many different servers, maybe they forget to lock one down, and suddenly they have an open directory and all of their directory files are available,
Starting point is 00:27:20 immediately can download. And this is the type of accident or mistake that really can shine the light on these types of operations. Because not only do we have all the code that they're using to orchestrate on any one of these domains, we can see all these test logs. And quite honestly, we can see the victims they're targeting to. And so part of what we didn't make public is we obviously didn't list any of the victims that we saw. It's been shared with law enforcement and we wish everyone the best in those mitigation processes.
Starting point is 00:27:58 But we do know the companies that they were targeting, where they were trying to pull these victims out of. And so I could share you the list of 34 different brands that are being featured, but really the simplest way to think about it is they're targeting the top 20 major crypto companies and then there's a small grouping of smaller crypto companies that even our researchers weren't familiar with immediately. And we've made that public on our website. So anyone who's in the crypto industry, who is in threat sharing circles in the crypto industry, we've made the entire corporate victim list public.
Starting point is 00:28:40 So while you don't know individual names, we're not certainly exposing email addresses that were targeted. This will give you that high level view of this is who Lazarus is targeting and likely multiple subgroups are targeting these crypto brands. It ranges from Coinbase and Binance and Kraken to more sort of classic finance brands like Stripe and I think Stripe and Robinhood and there's a few other sort of classic finance companies that also deal in crypto. And so I think it's important to highlight that Lazarus is not just going after crypto
Starting point is 00:29:21 companies, they're going after companies that deal in crypto. So you may be a classic finance brand, but as soon as you dip your toes into crypto and have some potential crypto tokens to be stolen, you will be added to their potential targeting list. And it is something to keep in mind. And it seems as though there's there are no signs that they're slowing down. I mean, they're very successful. Yeah. When you successfully steal $1.4 billion, you're not going to be slowing down unless it's just to go to a vacation.
Starting point is 00:29:56 And these North Korean threat actors, they work for North Korea. It is not like your classic cybercr crime group where these people are just going to stop doing their business, move to a resort on the Black Sea and just retire at 25 years old. These are basically soldiers in North Korea's army and so they've been extremely successful in their recent attacks. They've been able to gather huge amounts of resources, almost unimaginable. We should expect that North Korean leadership will continue to fund these efforts, will probably double down on the resources that are sent to them. This is really the start of this type of problem. The crypto industry is very young compared to how we're going to be
Starting point is 00:30:47 able to stop these. And we should expect for some significant period of time, North Korea will remain the premier threat actor targeting crypto. Our thanks to Zach Edwards from Silent Push for joining us. The research is titled New Lazarus Group Infrastructure Acquires Sensitive Intel Related to $1.4 Billion Bybit Hack and Past Attacks. We'll have a link in the show notes. And that's Research Saturday brought to you by N2K CyberWire. We'd love to know what you think of this podcast. Your feedback ensures we deliver the insights that keep you a step ahead in the rapidly
Starting point is 00:31:34 changing world of cybersecurity. If you like our show, please share a rating and review in your favorite podcast app. Please also fill out the survey in the show notes or send an email to cyberwire at n2k.com. This episode was produced by Liz Stokes, we're mixed by Elliot Peltsman and Trey Hester. Our executive producer is Jennifer Ibane, Peter Kilpey is our publisher, and I'm Dave Bittner. Thanks for listening. We'll see you back here next time.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.