radiant blames lazarus heist

North Korean hackers have struck again, siphoning $50 million from Radiant Capital in a sophisticated cyber heist that bears all the hallmarks of state-sponsored theft.

The attack has been attributed to a group known as Citrine Sleet (also tracked as UNC4736 or AppleJeus), following investigations conducted by Radiant Capital in partnership with cybersecurity firm Mandiant.

The breach began innocuously enough—with a Telegram message.

The breach began innocuously enough—with a Telegram message that would ultimately unleash digital chaos across the entire system.

Attackers impersonated a former contractor and sent Radiant developers a ZIP file containing a PDF in September.

This wasn’t just any PDF; it was laced with INLETDRIFT malware targeting macOS devices.

Think of it as a digital Trojan horse—looks harmless on the outside, but inside lurks a battalion of code ready to take over the digital kingdom.

Once inside developer systems, the attackers gained the ability to sign and approve fraudulent transactions during routine protocol adjustments. The hackers carefully removed all traces of their activity after completing the attack.

It’s like having someone steal your house keys, make copies, and then wait patiently for you to go on vacation before emptying your home.

The cyber thieves stole funds from both Arbitrum and BSC markets by bypassing hardware wallet security and multiple verification layers.

This heist is just one piece of a much larger puzzle.

North Korean hackers have allegedly stolen approximately $659 million in cryptocurrency in 2024 alone, targeting platforms like DMM Bitcoin ($308M), WazirX ($235M), and Upbit ($50M).

These funds reportedly help North Korea evade international sanctions and finance weapons programs.

The attackers are linked to North Korea’s Reconnaissance General Bureau—the country’s primary intelligence agency—and operate as part of the infamous Lazarus Group collective.

Their toolkit includes fake job recruitment offers, malicious files disguised as employment assessments, and custom malware that installs backdoors for remote surveillance. Investors should remain especially vigilant when receiving unsolicited communications containing attachments or links, as these are common entry points for sophisticated scams.

In a joint statement, the US, Japan, and South Korea officially confirmed North Korea’s responsibility for several major cryptocurrency thefts this year.

As crypto platforms continue to strengthen security measures, North Korean hackers appear equally determined to evolve their tactics, creating a digital cat-and-mouse game with extremely high stakes.

Leave a Reply
You May Also Like

Kanye West Says Instagram Hacked to Promote Fake YZY Token

Can fake tokens drain millions overnight? Kanye West’s Instagram hack sparked a $7M pump-and-dump scheme that left investors with worthless digital assets. Celebrity accounts face growing security threats.

Iranian Exchange Nobitex Suffers Massive $90M Hack as Pro-Israel Hackers Strike

Pro-Israel hackers didn’t just steal $90M from Iran’s Nobitex—they weaponized blockchain to permanently destroy assets. The digital funds are now locked in anti-regime slogans forever.

55M DeFi Saver Phish Highlights Clipboard Hijacker, New Windows Bug

A crypto whale lost $55M to clipboard hijackers using a clever ownership transfer trick. Could your DeFi protocols be the next target? Hackers are evolving beyond stealing keys.

Crypto Hack Tsunami Reaches $2.2B Across 303 Devastating 2024 Incidents

Crypto bandits seized $2.2 billion across 303 hacks in 2024, with North Korean hackers alone draining $1.34 billion. Your keys might be next on their target list.