Shanghai VC impersonated by Lazarus Group for cryptocurrency phishing scam.

Editor

Cybersecurity firm SlowMist discovered a sophisticated phishing operation by the Lazarus Group, a hacking collective based in North Korea, targeting employees through impersonating a partner of Fenbushi Capital on LinkedIn. The scheme aimed to steal valuable crypto assets from the victims, exploiting employee access. SlowMist’s Chief Information Security Officer, 23pds, warned about the attack and urged caution towards the fake Fenbushi Capital profiles on LinkedIn. This incident is a part of the escalating trend of crypto phishing attacks, with Lazarus Group using deceptive tactics to target individuals.

Fenbushi Capital, a blockchain venture capitalist firm based in Shanghai, has been a prominent supporter of innovative projects globally since 2015. The firm’s reputable name and involvement in reshaping industries like finance and healthcare made it an attractive front for cybercriminals like Lazarus Group. The hackers created false identities on LinkedIn, posing as Fenbushi Capital partners to initiate contact with potential targets under the guise of investment opportunities or networking at conferences. Their method of operation involved deceiving high-level executives or HR personnel by posing as job seekers with expertise in React or blockchain development and persuading them to execute malicious code to compromise system security.

SlowMist had previously alerted about Lazarus Group targeting individuals through LinkedIn to steal assets or privileges using malware. The group’s tactics involved posing as job seekers to gain access to victims’ systems and execute malicious code that facilitated unauthorized access. In a previous incident in 2023, a programmer at CoinsPaid in Estonia was duped into downloading a malicious file during what seemed like a job interview over a video link, leading to a $37 million theft. Lazarus Group has adapted its methods for laundering stolen funds in response to crackdowns on popular mixers like Sinbad and Tornado Cash, now utilizing technologies like the Bitcoin-based mixer YoMix to obfuscate their transactions.

Chainalysis analysis highlighted that Lazarus Group has refined its laundering techniques, using advanced methods such as chain hopping and cross-chain bridges to avoid detection and maximize the value extracted from illicit activities. The hackers have continued to enhance their strategies to evade scrutiny and increase their profits from criminal activities. The constant evolution of cybercriminal tactics poses a challenge for cybersecurity firms and organizations, requiring heightened vigilance and security measures to detect and prevent such attacks. The incidents involving Lazarus Group illustrate the ongoing threat posed by sophisticated hacking groups and the need for proactive measures to protect sensitive data and assets.

In conclusion, the Lazarus Group’s phishing operation targeting employees through LinkedIn under the guise of partners of Fenbushi Capital highlights the increasing sophistication of cybercriminal tactics in the cryptocurrency industry. The use of deceptive techniques to gain access to valuable assets underscores the importance of stringent cybersecurity measures and awareness among individuals and organizations. By adapting their methods and utilizing advanced laundering techniques, groups like Lazarus Group continue to pose a significant threat to the security of digital assets and data. It is essential for individuals to remain vigilant and verify the authenticity of online interactions to mitigate the risk of falling victim to such sophisticated attacks.

Share This Article
Leave a comment