Lazarus, a notorious group of hackers having ties with the North Korean government, was responsible for the cyberattack on cryptocurrency exchange, KuCoin that siphoned off $281 million worth of digital currencies, according to a Chainalysis report.
The Blockchain
Blockchain
Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tamper with. The Evolution of BlockchainBlockchain was originally invented by an individual or group of people under the name of Satoshi Nakamoto in 2008. The purpose of blockchain was originally to serve as the public transaction ledger of Bitcoin, the world’s first cryptocurrency.In particular, bundles of transaction data, called “blocks”, are added to the ledger in a chronological fashion, forming a “chain.” These blocks include things like date, time, dollar amount, and (in some cases) the public addresses of the sender and the receiver.The computers responsible for upholding a blockchain network are called “nodes.” These nodes carry out the duties necessary to confirm the transactions and add them to the ledger. In exchange for their work, the nodes receive rewards in the form of crypto tokens.By storing data via a peer-to-peer network (P2P), blockchain controls for a wide range of risks that are traditionally inherent with data being held centrally.Of note, P2P blockchain networks lack centralized points of vulnerability. Consequently, hackers cannot exploit these networks via normalized means nor does the network possess a central failure point.In order to hack or alter a blockchain’s ledger, more than half of the nodes must be compromised. Looking ahead, blockchain technology is an area of extensive research across multiple industries, including financial services and payments, among others.
Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tamper with. The Evolution of BlockchainBlockchain was originally invented by an individual or group of people under the name of Satoshi Nakamoto in 2008. The purpose of blockchain was originally to serve as the public transaction ledger of Bitcoin, the world’s first cryptocurrency.In particular, bundles of transaction data, called “blocks”, are added to the ledger in a chronological fashion, forming a “chain.” These blocks include things like date, time, dollar amount, and (in some cases) the public addresses of the sender and the receiver.The computers responsible for upholding a blockchain network are called “nodes.” These nodes carry out the duties necessary to confirm the transactions and add them to the ledger. In exchange for their work, the nodes receive rewards in the form of crypto tokens.By storing data via a peer-to-peer network (P2P), blockchain controls for a wide range of risks that are traditionally inherent with data being held centrally.Of note, P2P blockchain networks lack centralized points of vulnerability. Consequently, hackers cannot exploit these networks via normalized means nor does the network possess a central failure point.In order to hack or alter a blockchain’s ledger, more than half of the nodes must be compromised. Looking ahead, blockchain technology is an area of extensive research across multiple industries, including financial services and payments, among others.
Read this Term analytics firm explained that the money laundering technique used by the hackers following the attack matched the methods generally used by the North Korean hacker group.
They have used a combination of mixers, exchange services, decentralized finance platforms and others to launder the stolen Cryptocurrencies
Cryptocurrencies
By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the networks which are used to authenticate blockchain technology. Cryptocurrencies can be thought of as systems that accept online payments which are denoted as “tokens.” Tokens are represented as internal ledger entries in blockchain technology while the term crypto is used to depict cryptographic methods and encryption algorithms such as public-private key pairs, various hashing functions, and an elliptical curve. Every cryptocurrency transaction that occurs is logged in a web-based ledger with blockchain technology.These then must be approved by a disparate network of individual nodes (computers that maintain a copy of the ledger). For every new block generated, the block must first be authenticated and confirmed ‘approved’ by each node, which makes forging the transactional history of cryptocurrencies nearly impossible. The World’s First CryptoBitcoin became the first blockchain-based cryptocurrency and to this day is still the most demanded cryptocurrency and the most valued. Bitcoin still contributes the majority of the overall cryptocurrency market volume, though several other cryptos have grown in popularity in recent years.Indeed, out of the wake of Bitcoin, iterations of Bitcoin became prevalent which resulted in a multitude of newly created or cloned cryptocurrencies. Contending cryptocurrencies that emerged after Bitcoin’s success is referred to as ‘altcoins’ and they refer to cryptocurrencies such as Bitcoin, Peercoin, Namecoin, Ethereum, Ripple, Stellar, and Dash. Cryptocurrencies promise a wide range of technological innovations that have yet to be structured into being. Simplified payments between two parties without the need for a middle man is one aspect while leveraging blockchain technology to minimize transaction and processing fees for banks is another. Of course, cryptocurrencies have their disadvantages too. This includes issues of tax evasion, money laundering, and other illicit online activities where anonymity is a dire ingredient in solicitous and fraudulent activities.
By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the networks which are used to authenticate blockchain technology. Cryptocurrencies can be thought of as systems that accept online payments which are denoted as “tokens.” Tokens are represented as internal ledger entries in blockchain technology while the term crypto is used to depict cryptographic methods and encryption algorithms such as public-private key pairs, various hashing functions, and an elliptical curve. Every cryptocurrency transaction that occurs is logged in a web-based ledger with blockchain technology.These then must be approved by a disparate network of individual nodes (computers that maintain a copy of the ledger). For every new block generated, the block must first be authenticated and confirmed ‘approved’ by each node, which makes forging the transactional history of cryptocurrencies nearly impossible. The World’s First CryptoBitcoin became the first blockchain-based cryptocurrency and to this day is still the most demanded cryptocurrency and the most valued. Bitcoin still contributes the majority of the overall cryptocurrency market volume, though several other cryptos have grown in popularity in recent years.Indeed, out of the wake of Bitcoin, iterations of Bitcoin became prevalent which resulted in a multitude of newly created or cloned cryptocurrencies. Contending cryptocurrencies that emerged after Bitcoin’s success is referred to as ‘altcoins’ and they refer to cryptocurrencies such as Bitcoin, Peercoin, Namecoin, Ethereum, Ripple, Stellar, and Dash. Cryptocurrencies promise a wide range of technological innovations that have yet to be structured into being. Simplified payments between two parties without the need for a middle man is one aspect while leveraging blockchain technology to minimize transaction and processing fees for banks is another. Of course, cryptocurrencies have their disadvantages too. This includes issues of tax evasion, money laundering, and other illicit online activities where anonymity is a dire ingredient in solicitous and fraudulent activities.
Read this Term.
The most concerning thing is that these stolen funds are suspected to be used in developing the nuclear program of the North Korean government.
Additionally, a separate report by the United Nations pointed out the role of the infamous North Korean hacker group in a $281 million crypto exchange attack. However, that did not specify if it was KuCoin.
The findings of both the Chainalysis and UN reports are very similar, meaning the international body might have used the services of the New York-based analytics firm.
“Preliminary analysis, based on the attack vectors and subsequent efforts to launder the illicit proceeds, strongly suggests links to the DPRK,” the UN sanction monitors wrote.
More Sanctions Ahead?
Lazarus’ name came out on several occasions for its role in attacking digital currency exchanges. The group has been active for years, and their ties can be found in attacks puled out even in 2017.
The group was very successful in 2018 and 2019 and, according to Chainalysis estimations, stole more than $1.75 billion worth of cryptocurrency. Moreover, it was accused of the attack on South Korean crypto exchange, Upbit in 2019, which resulted in the loss of more than $49 million.
Furthermore, the UN pointed out earlier on North Korea’s role in breeding such hacker groups and using the stolen gains for its weapons program. An earlier report found that over $2 billion was stolen by these groups from crypto exchanges and also banks.
Lazarus, a notorious group of hackers having ties with the North Korean government, was responsible for the cyberattack on cryptocurrency exchange, KuCoin that siphoned off $281 million worth of digital currencies, according to a Chainalysis report.
The Blockchain
Blockchain
Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tamper with. The Evolution of BlockchainBlockchain was originally invented by an individual or group of people under the name of Satoshi Nakamoto in 2008. The purpose of blockchain was originally to serve as the public transaction ledger of Bitcoin, the world’s first cryptocurrency.In particular, bundles of transaction data, called “blocks”, are added to the ledger in a chronological fashion, forming a “chain.” These blocks include things like date, time, dollar amount, and (in some cases) the public addresses of the sender and the receiver.The computers responsible for upholding a blockchain network are called “nodes.” These nodes carry out the duties necessary to confirm the transactions and add them to the ledger. In exchange for their work, the nodes receive rewards in the form of crypto tokens.By storing data via a peer-to-peer network (P2P), blockchain controls for a wide range of risks that are traditionally inherent with data being held centrally.Of note, P2P blockchain networks lack centralized points of vulnerability. Consequently, hackers cannot exploit these networks via normalized means nor does the network possess a central failure point.In order to hack or alter a blockchain’s ledger, more than half of the nodes must be compromised. Looking ahead, blockchain technology is an area of extensive research across multiple industries, including financial services and payments, among others.
Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tamper with. The Evolution of BlockchainBlockchain was originally invented by an individual or group of people under the name of Satoshi Nakamoto in 2008. The purpose of blockchain was originally to serve as the public transaction ledger of Bitcoin, the world’s first cryptocurrency.In particular, bundles of transaction data, called “blocks”, are added to the ledger in a chronological fashion, forming a “chain.” These blocks include things like date, time, dollar amount, and (in some cases) the public addresses of the sender and the receiver.The computers responsible for upholding a blockchain network are called “nodes.” These nodes carry out the duties necessary to confirm the transactions and add them to the ledger. In exchange for their work, the nodes receive rewards in the form of crypto tokens.By storing data via a peer-to-peer network (P2P), blockchain controls for a wide range of risks that are traditionally inherent with data being held centrally.Of note, P2P blockchain networks lack centralized points of vulnerability. Consequently, hackers cannot exploit these networks via normalized means nor does the network possess a central failure point.In order to hack or alter a blockchain’s ledger, more than half of the nodes must be compromised. Looking ahead, blockchain technology is an area of extensive research across multiple industries, including financial services and payments, among others.
Read this Term analytics firm explained that the money laundering technique used by the hackers following the attack matched the methods generally used by the North Korean hacker group.
They have used a combination of mixers, exchange services, decentralized finance platforms and others to launder the stolen Cryptocurrencies
Cryptocurrencies
By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the networks which are used to authenticate blockchain technology. Cryptocurrencies can be thought of as systems that accept online payments which are denoted as “tokens.” Tokens are represented as internal ledger entries in blockchain technology while the term crypto is used to depict cryptographic methods and encryption algorithms such as public-private key pairs, various hashing functions, and an elliptical curve. Every cryptocurrency transaction that occurs is logged in a web-based ledger with blockchain technology.These then must be approved by a disparate network of individual nodes (computers that maintain a copy of the ledger). For every new block generated, the block must first be authenticated and confirmed ‘approved’ by each node, which makes forging the transactional history of cryptocurrencies nearly impossible. The World’s First CryptoBitcoin became the first blockchain-based cryptocurrency and to this day is still the most demanded cryptocurrency and the most valued. Bitcoin still contributes the majority of the overall cryptocurrency market volume, though several other cryptos have grown in popularity in recent years.Indeed, out of the wake of Bitcoin, iterations of Bitcoin became prevalent which resulted in a multitude of newly created or cloned cryptocurrencies. Contending cryptocurrencies that emerged after Bitcoin’s success is referred to as ‘altcoins’ and they refer to cryptocurrencies such as Bitcoin, Peercoin, Namecoin, Ethereum, Ripple, Stellar, and Dash. Cryptocurrencies promise a wide range of technological innovations that have yet to be structured into being. Simplified payments between two parties without the need for a middle man is one aspect while leveraging blockchain technology to minimize transaction and processing fees for banks is another. Of course, cryptocurrencies have their disadvantages too. This includes issues of tax evasion, money laundering, and other illicit online activities where anonymity is a dire ingredient in solicitous and fraudulent activities.
By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the networks which are used to authenticate blockchain technology. Cryptocurrencies can be thought of as systems that accept online payments which are denoted as “tokens.” Tokens are represented as internal ledger entries in blockchain technology while the term crypto is used to depict cryptographic methods and encryption algorithms such as public-private key pairs, various hashing functions, and an elliptical curve. Every cryptocurrency transaction that occurs is logged in a web-based ledger with blockchain technology.These then must be approved by a disparate network of individual nodes (computers that maintain a copy of the ledger). For every new block generated, the block must first be authenticated and confirmed ‘approved’ by each node, which makes forging the transactional history of cryptocurrencies nearly impossible. The World’s First CryptoBitcoin became the first blockchain-based cryptocurrency and to this day is still the most demanded cryptocurrency and the most valued. Bitcoin still contributes the majority of the overall cryptocurrency market volume, though several other cryptos have grown in popularity in recent years.Indeed, out of the wake of Bitcoin, iterations of Bitcoin became prevalent which resulted in a multitude of newly created or cloned cryptocurrencies. Contending cryptocurrencies that emerged after Bitcoin’s success is referred to as ‘altcoins’ and they refer to cryptocurrencies such as Bitcoin, Peercoin, Namecoin, Ethereum, Ripple, Stellar, and Dash. Cryptocurrencies promise a wide range of technological innovations that have yet to be structured into being. Simplified payments between two parties without the need for a middle man is one aspect while leveraging blockchain technology to minimize transaction and processing fees for banks is another. Of course, cryptocurrencies have their disadvantages too. This includes issues of tax evasion, money laundering, and other illicit online activities where anonymity is a dire ingredient in solicitous and fraudulent activities.
Read this Term.
The most concerning thing is that these stolen funds are suspected to be used in developing the nuclear program of the North Korean government.
Additionally, a separate report by the United Nations pointed out the role of the infamous North Korean hacker group in a $281 million crypto exchange attack. However, that did not specify if it was KuCoin.
The findings of both the Chainalysis and UN reports are very similar, meaning the international body might have used the services of the New York-based analytics firm.
“Preliminary analysis, based on the attack vectors and subsequent efforts to launder the illicit proceeds, strongly suggests links to the DPRK,” the UN sanction monitors wrote.
More Sanctions Ahead?
Lazarus’ name came out on several occasions for its role in attacking digital currency exchanges. The group has been active for years, and their ties can be found in attacks puled out even in 2017.
The group was very successful in 2018 and 2019 and, according to Chainalysis estimations, stole more than $1.75 billion worth of cryptocurrency. Moreover, it was accused of the attack on South Korean crypto exchange, Upbit in 2019, which resulted in the loss of more than $49 million.
Furthermore, the UN pointed out earlier on North Korea’s role in breeding such hacker groups and using the stolen gains for its weapons program. An earlier report found that over $2 billion was stolen by these groups from crypto exchanges and also banks.