Heimdal Security Blog

North Korean Hackers Most Likely to Have Been Behind the CryptoCore Heists

CryptoCore is a hacking group that has pulled off cryptocurrency heists that may worth more than $200 million.

Security researchers are putting together pieces of information from multiple attacks on cryptocurrency exchanges, as the attacks started in 2018 and used spear-phishing as their principal MO in order to gain an initial foothold.

Last year alone, CryptoCore became responsible for at least five attacks and caused an estimated loss of more than $200 million.

The researchers at ClearSky are thinking that the threat actor was connected to hackers in Eastern European countries like Ukraine, Russia, and Romania and, following the report by ClearSky, multiple cybersecurity organizations have published the results of their investigations on similar attacks and technical details that aligned with the CryptoCore’s tactics, techniques, and procedures:

ClearSky released a new document in which they are comparing the details found in the abovementioned research and noticed a large number of similarities, therefore confidently being able to attribute the attacks to only one threat actor.

ClearSky accepted F-Secure’s attribution of the attacks to the Lazarus group soon after checking if the company’s YARA rules for identifying and classifying malware applied to remote access trojans (RATs) in reports about Lazarus from ESET and Kaspersky, as the sources matched with an old RAT that Kaspersky reported in 2016 (bbd703f0d6b1cad4ff8f3d2ee3cc073c).

It’s worth noting that in the old variant, the malware had accessed a file named “scaeve.dat,” and the newer one looked for “perflog.dat.”

A total of 40 common indicators of compromise (IoCs) were found, along with a VBS script almost identical when not obfuscated and matching RATs and stealers.

If all the similarities are taken into consideration, the researchers can attribute with medium to high confidence all the CryptoCore campaigns to the North Korean hacking group Lazarus.

Your perimeter network is vulnerable to sophisticated attacks.

Heimdal® Network DNS Security

Is the next-generation network protection and response solution that will keep your systems safe.
  • No need to deploy it on your endpoints;
  • Protects any entry point into the organization, including BYODs;
  • Stops even hidden threats using AI and your network traffic log;
  • Complete DNS, HTTP and HTTPs protection, HIPS and HIDS;
Try it for FREE today 30-day Free Trial. Offer valid only for companies.

The researchers also pointed out the fact that the hackers have expanded their activity as they started to focus on Israeli targets, this showing that the choice of victims might be indiscriminate and the hackers only criteria in selecting a target are for it to fit a financial profile.