{"id":42745,"date":"2022-12-26T05:36:53","date_gmt":"2022-12-26T09:36:53","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=42745"},"modified":"2022-12-26T05:36:56","modified_gmt":"2022-12-26T09:36:56","slug":"north-korean-hackers-use-500-phishing-domains-to-steal-nfts","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/north-korean-hackers-use-500-phishing-domains-to-steal-nfts\/","title":{"rendered":"North Korean hackers use 500 phishing domains to steal NFTs"},"content":{"rendered":"\n<h5 class=\"wp-block-heading\" id=\"h-north-korean-hackers-linked-to-the-lazarus-group-are-allegedly-behind-a-large-phishing-campaign-targeting-nfts-investors\">North Korean hackers <a href=\"https:\/\/coinscreed.com\/staging\/north-koreas-lazarus-group-behind-100-million-horizon-hack-as-harmony-begins-manhunt.html\" target=\"_blank\" rel=\"noreferrer noopener\">linked to the Lazarus Group<\/a> are allegedly behind a large phishing campaign targeting NFTs investors.<\/h5>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/12\/North-Korean-hackers-use-500-phishing-domains-to-steal-NFTs-1024x576.jpg\" alt=\"North Korean hackers use 500 phishing domains to steal NFTs\" class=\"wp-image-42755\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/12\/North-Korean-hackers-use-500-phishing-domains-to-steal-NFTs-1024x576.jpg 1024w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/12\/North-Korean-hackers-use-500-phishing-domains-to-steal-NFTs-300x169.jpg 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/12\/North-Korean-hackers-use-500-phishing-domains-to-steal-NFTs-768x432.jpg 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/12\/North-Korean-hackers-use-500-phishing-domains-to-steal-NFTs-150x84.jpg 150w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/12\/North-Korean-hackers-use-500-phishing-domains-to-steal-NFTs-750x422.jpg 750w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/12\/North-Korean-hackers-use-500-phishing-domains-to-steal-NFTs-1140x641.jpg 1140w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/12\/North-Korean-hackers-use-500-phishing-domains-to-steal-NFTs.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">North Korean hackers use 500 phishing domains to steal NFTs<\/figcaption><\/figure>\n\n\n\n<p>On December 24, the blockchain security company SlowMist published a study outlining the methods used by North Korean APT organizations to separate NFT investors from their NFTs, including bogus websites impersonating various NFT-related platforms and initiatives.<\/p>\n\n\n\n<p>These fraudulent websites include one that presents itself as a World Cup initiative and others that mimic popular <a href=\"https:\/\/coinscreed.com\/staging\/top-5-avalanche-nft-marketplaces.html\" target=\"_blank\" rel=\"noreferrer noopener\">NFT marketplaces like OpenSea, X2Y2, and Rarible.<\/a><\/p>\n\n\n\n<p>One of the strategies, according to SlowMist, is to have these fake websites provide &#8220;malicious Mints,&#8221; which trick the users into believing they are minting real NFTs by linking their wallets to the website.<\/p>\n\n\n\n<p>The NFT is essentially a scam, and as a result, the victim's wallet is open to attack by the hacker who now has access to it.<\/p>\n\n\n\n<p>The analysis also showed that a large number of<a href=\"https:\/\/www.google.com\/search?q=North+Korean+hackers+use+500+phishing+domains+to+steal+NFTs&sxsrf=ALiCzsamvQ78xghwfvEl4yvWCIsJP6XmSg:1672045940924&source=lnms&tbm=isch&sa=X&ved=2ahUKEwjphu3C-Jb8AhXQTaQEHag5Ch8Q_AUoA3oECAEQBQ&biw=1366&bih=560&dpr=1\" target=\"_blank\" rel=\"noreferrer noopener\"> phishing websites<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a> shared the same Internet Protocol (IP), with 372 NFT phishing websites sharing a single IP and another 320 NFT phishing websites using a different IP.<\/p>\n\n\n\n<p>The phishing campaign, according to SlowMist, has been going on for a while; the earliest registered domain name was roughly seven months ago.<\/p>\n\n\n\n<p>Along with attaching photographs to target projects, other phishing techniques utilized included gathering visitor information and saving it to external websites.<\/p>\n\n\n\n<p>The hacker would then <a href=\"https:\/\/coinscreed.com\/staging\/how-to-spot-common-nft-scams-and-avoid-nft-hack-attacks.html\" target=\"_blank\" rel=\"noreferrer noopener\">employ different attack scripts<\/a> on the victim after obtaining the visitor's data, giving them access to the victim's access records, authorizations, use of plug-in wallets, and sensitive data such the victim's approve record and sigData.<\/p>\n\n\n\n<p>The hacker can then access the victim's wallet using all this information, exposing all of their digital assets.<\/p>\n\n\n\n<p>SlowMist stressed that this is simply the &#8220;tip of the iceberg,&#8221; as the research only considered a small percentage of the materials and only &#8220;some&#8221; of the North Korean hackers' phishing traits.<\/p>\n\n\n\n<p>For instance, SlowMist pointed out that one phishing address alone was able to benefit 300 ETH ($367,000) and 1,055 NFTs ($367,000) using its phishing techniques.<\/p>\n\n\n\n<p>It also stated that the Naver phishing effort, which was originally reported by Prevailion on March 15, was carried out by the same North Korean APT outfit.<\/p>\n\n\n\n<p>In 2022, North Korea was the target of<a href=\"https:\/\/coinscreed.com\/staging\/north-korean-hacking-activity-ends-after-kyc-is-implemented.html\" target=\"_blank\" rel=\"noreferrer noopener\"> numerous thefts of cryptocurrencies.<\/a><\/p>\n\n\n\n<p>The National Intelligence Service (NIS) of South Korea reported on December 22 that North Korea had stolen cryptocurrencies worth $620 million just this year.<\/p>\n\n\n\n<p>The National Police Agency of Japan issued a warning to the nation's crypto-asset enterprises in October, cautioning them to be wary of the North Korean hacking outfit.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>North Korean hackers linked to the Lazarus Group are allegedly behind a large phishing campaign targeting NFTs investors. On December 24, the blockchain security company SlowMist published a study outlining the methods used by North Korean APT organizations to separate NFT investors from their NFTs, including bogus websites impersonating various NFT-related platforms and initiatives. These [&hellip;]<\/p>\n","protected":false},"author":38,"featured_media":42755,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[11476],"tags":[937,470,9894],"class_list":["post-42745","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacks-and-scams","tag-hackers","tag-nfts","tag-phishing-scam"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/12\/North-Korean-hackers-use-500-phishing-domains-to-steal-NFTs.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/42745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=42745"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/42745\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/42755"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=42745"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=42745"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=42745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}