On February 21, the largest crypto heist ever started to unfold. Hackers gained power of a crypto wallet belonging to the world’s second-largest cryptocurrency exchange, Bybit, and stole astir $1.5 cardinal of integer tokens. They rapidly shunted the wealth betwixt dozens of cryptocurrency wallets and services to effort and obscure the activity, earlier starting to currency the stolen funds out.
The eye-popping integer raid had each the hallmarks of being conducted by 1 of North Korea’s elite subgroups of hackers. While Bybit remained solvent by borrowing cryptocurrency and launched a bounty strategy to way down the stolen funds, the FBI rapidly pinned the blasted connected the North Korean hackers known arsenic TraderTraitor.
Before the Bybit heist, TraderTraitor had already been linked to different high-profile cryptocurrency thefts and compromises of proviso concatenation software.
“We were waiting for the adjacent large thing,” says Michael Barnhart, a longtime cybersecurity researcher focused connected North Korea and researcher astatine information steadfast DTEX Systems. “They didn't spell away. They didn’t effort to stop. They were intelligibly plotting and planning—and they’re doing that now,” helium says.
North Korea’s hackers—alongside those from China, Russia, and Iran—are consistently considered to beryllium 1 of the astir blase and astir unsafe cyber threats to Western democracies. While each of these countries prosecute successful espionage and theft of delicate data, North Korea’s cyber operations travel with their ain acceptable of chiseled goals: helping to money the hermit kingdom’s atomic programs. Increasingly, that means stealing cryptocurrency.
Over astatine slightest the past 5 years, the totalitarian authorities of Kim Jong-un has deployed technically skilled IT workers to infiltrate companies astir the satellite and gain wages that tin beryllium sent backmost to the motherland. In immoderate cases, aft being fired, those workers extort their erstwhile employers by threatening to merchandise delicate data. At the aforesaid time, North Korean hackers, arsenic portion of the wide umbrella Lazarus Group, person stolen billions successful cryptocurrency from exchanges and companies astir the world. TraderTraitor makes up 1 portion of the wider Lazarus group, which is tally retired of the Reconnaissance General Bureau, the North Korean quality agency.
TraderTraitor—which is besides referred to arsenic Jade Sleet, Slow Pisces, and UNC4899 by information companies—is chiefly funny successful cryptocurrency.
“They usage a assortment of originative techniques to get into blockchain, cryptocurrency, thing that has to bash with platforms, trading forums, each of those antithetic things that are astir cryptocurrency and decentralized finance,” says Sherrod DeGrippo, the manager of menace quality strategy astatine Microsoft. “The Jade Sleet radical [TraderTraitor] is 1 of the astir blase groups wrong that echelon,” she says.
TraderTraitor archetypal emerged astir the commencement of 2022, aggregate cybersecurity researchers say, and is apt an offshoot of the North Korean APT38 radical that hacked the SWIFT fiscal strategy and attempted to bargain $1 cardinal from the Central Bank of Bangladesh astatine the commencement of 2016. “They walked disconnected with precise small money,” says DTEX Systems’s Barnhart. “In that infinitesimal you had a real, important shift.”
Barnhart says North Korea realized that relying connected different people—such arsenic wealth mules—could marque their operations little effective. Instead, they could bargain cryptocurrency. Two groups emerged from that tactical shift, Barnhart says, CryptoCore and TraderTraitor. “TraderTraitor is the astir blase of all,” helium says. “And why? Because APT38 was the A team.”