{"id":24115,"date":"2022-04-14T16:53:10","date_gmt":"2022-04-14T20:53:10","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=24115"},"modified":"2022-04-14T16:53:19","modified_gmt":"2022-04-14T20:53:19","slug":"us-traces-axie-infinity-hack-to-lazarus-group","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/us-traces-axie-infinity-hack-to-lazarus-group\/","title":{"rendered":"US Treasury traces Axie Infinity&#8217;s Ronin network attack to North Korean &#8216;Lazarus Group&#8217;"},"content":{"rendered":"\n<h5 class=\"wp-block-heading\">The US Treasury Department claims that Lazarus, a North Korean hacker group, is responsible for a $600 million crypto theft through the <a href=\"https:\/\/coinscreed.com\/staging\/sky-mavis-launches-1m-bug-bounty.html\" target=\"_blank\" data-type=\"post\" data-id=\"23893\" rel=\"noreferrer noopener\">Axie Infinity-linked Ronin bridge<\/a>.<\/h5>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/04\/image-101.png\" alt=\"US Treasury traces Axie Infinity's Ronin network attack to North Korean 'Lazarus Group'\" class=\"wp-image-24135\" width=\"846\" height=\"443\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/04\/image-101.png 729w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/04\/image-101-300x157.png 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/04\/image-101-150x79.png 150w\" sizes=\"(max-width: 846px) 100vw, 846px\" \/><figcaption>US Treasury traces Axie Infinity's Ronin network attack to North Korean &#8216;Lazarus Group'<\/figcaption><\/figure><\/div>\n\n\n\n<p>On Thursday, the US Treasury Department added an Ethereum address to its list of sanctioned entities. The address &#8220;was implicated in the Ronin hack,&#8221; according to Chainalysis, a crypto analytics firm. Elliptic, a tracing agency, calculated that 14% of the stolen assets had been laundered by Thursday.<\/p>\n\n\n\n<p>The FBI had linked Lazarus to the validator breach, and the Treasury Department had sanctioned the transactions, according to <a href=\"https:\/\/www.google.com\/search?q=US+Treasury+traces+Axie+Infinity%27s+Ronin+network+attack+to+North+Korean+%27Lazarus+Group%27&rlz=1C1SQJL_enNG889NG889&oq=US+Treasury+traces+Axie+Infinity%27s+Ronin+network+attack+to+North+Korean+%27Lazarus+Group%27&aqs=chrome..69i57.800j0j9&sourceid=chrome&ie=UTF-8\" target=\"_blank\" data-type=\"URL\" data-id=\"https:\/\/www.google.com\/search?q=US+Treasury+traces+Axie+Infinity%27s+Ronin+network+attack+to+North+Korean+%27Lazarus+Group%27&rlz=1C1SQJL_enNG889NG889&oq=US+Treasury+traces+Axie+Infinity%27s+Ronin+network+attack+to+North+Korean+%27Lazarus+Group%27&aqs=chrome..69i57.800j0j9&sourceid=chrome&ie=UTF-8\" rel=\"noreferrer noopener\">Ronin Network<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a> in a blog post.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>&#8220;We are still in the process of installing additional security measures before redeploying the Ronin Bridge to prevent future risk,&#8221; the blog wrote, promising a comprehensive post-mortem before the end of the month.<\/p><\/blockquote>\n\n\n\n<p>Sky Mavis has since acknowledged the link in a follow-up to its original <a href=\"https:\/\/coinscreed.com\/staging\/axie-infinitys-ronin-network-suffers-625m-explo.html\" target=\"_blank\" data-type=\"post\" data-id=\"22407\" rel=\"noreferrer noopener\">Ronin exploit <\/a>piece. Chainalysis and Elliptic, two blockchain analytics companies, have also confirmed that the wallet address given by the US Treasury today is the same one used in the Ronin hack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About the Lazarus group<\/h2>\n\n\n\n<p>Lazarus is a &#8220;state-sponsored hacker outfit,&#8221; according to the FBI, with its first strikes dating back to 2009. Lazarus is suspected of being behind the WannaCry ransomware assault in 2017, the Sony Pictures breach in 2014, and a series of attacks on pharmaceutical businesses in 2020.<\/p>\n\n\n\n<p>In a blog post, Elliptic noted, &#8220;It is fairly unsurprising that this attack has been linked to<a href=\"https:\/\/coinscreed.com\/staging\/virgil-griffith-gets-over-63-months-100000.html\" target=\"_blank\" data-type=\"post\" data-id=\"23869\" rel=\"noreferrer noopener\"> North Korea<\/a>.&#8221; &#8220;Many aspects of the attack echoed the Lazarus Group's strategy in past high-profile attacks, including the victim's location, the attack method (believed to have employed social engineering), and the group's post-attack laundering routine.&#8221;<\/p>\n\n\n\n<p>According to a source in the tracing business, this is the first time the Treasury's sanctions office has blacklisted a purported Lazarus-held crypto wallet.<\/p>\n\n\n\n<p>When the Ronin Network was hacked last month, the attacker took 173,600 WETH (Wrapped Ethereum) and 25.5 million <a href=\"https:\/\/coinscreed.com\/staging\/bny-mellon-becomes-circles-usdc-reserve-custodian.html\" target=\"_blank\" data-type=\"post\" data-id=\"22714\" rel=\"noreferrer noopener\">USDC stablecoins<\/a>, totaling $622 million at the time of discovery and disclosure on March 29. Based on the worth ($552 million) of the assets at the time of the attack, it's the second-largest DeFi breach to date.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The US Treasury Department claims that Lazarus, a North Korean hacker group, is responsible for a $600 million crypto theft through the Axie Infinity-linked Ronin bridge. On Thursday, the US Treasury Department added an Ethereum address to its list of sanctioned entities. The address &#8220;was implicated in the Ronin hack,&#8221; according to Chainalysis, a crypto [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":24135,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[21],"tags":[9168,4337,4381],"class_list":["post-24115","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-lazarus-group","tag-north-korea","tag-us-treasury"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/04\/image-101.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/24115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=24115"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/24115\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/24135"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=24115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=24115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=24115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}