Behind the $1.4 Billion Theft: The North Korean Hackers' Operation Computer Has Been "Unboxed"

[Chain News] Cybersecurity company Hudson Rock recently uncovered a major scoop—while analyzing logs from the LummaC2 trojan, they unexpectedly caught a “special” device.

The owner of this machine is suspected to be a technical backbone of a North Korean state-sponsored hacker team. Even more explosively, it was used to set up the attack infrastructure for a $1.4 billion theft at a leading exchange in February this year.

The credentials found on the device directly point to phishing domains registered before the attack, specifically designed to impersonate the target platform. The setup was hardcore: development tools like Visual Studio and Enigma Protector were all present, along with communication software such as Astrill VPN, Slack, and Telegram.

What’s even more impressive, investigators found evidence of the attacker’s preparations in the browsing history—purchasing domains, packaging fake Zoom installers, and meticulously preparing the entire phishing process.

This exposure is a rare glimpse into the internal operations of North Korean hacker organizations: they reuse infrastructure across different missions, with clear division of labor and high-level coordination. For the crypto industry, the exposure of such state-level APT attack details is, in a way, a valuable “reverse case study.”

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 5
  • Repost
  • Share
Comment
0/400
GhostInTheChainvip
· 1h ago
Damn, did they really uncover the North Korean hackers' computers? How careless do you have to be to get caught like that? $1.4 billion just gone like that—exchange security is really... I don't even know what to say. Enigma Protector with Astrill, this guy is seriously professional, but no matter how good your skills are, you can't escape getting exposed. By the way, Hudson Rock really did a great job this time. Feels like they broke down the entire attack chain in detail. Someone should have "unboxed" these hacker teams' work computers a long time ago—this is textbook-level negative example.
View OriginalReply0
MEVHuntervip
· 12-05 15:22
Wait a minute, a $1.4 billion theft is still using such a primitive phishing scheme? I thought I’d see some advanced flash loan combo attack or something. These state-sponsored hackers aren’t even thinking about optimizing gas fees or sandwich attacks, but are still playing the domain spoofing game... what a waste of talent. Visual Studio with Enigma Protector—it’s like they’ve got the whole development environment fully set up, but their attack strategies feel a bit outdated and lacking in creativity. But being able to dig up so much from the LummaC2 trojan logs, Hudson Rock really went hard this time, basically exposing the entire infrastructure’s underbelly.
View OriginalReply0
CrashHotlinevip
· 12-05 15:21
Oh my god, the North Korean hackers have really been exposed this time. $1.4 billion just vanished like that, that’s ruthless. --- So this guy just blatantly used his own computer to do this? And left so much evidence behind? Hard to believe. --- Visual Studio plus Enigma Protector, that’s a hardcore setup, way stronger than my newbie skills. --- Phishing domain tactics like this are definitely skilled, but still got caught. What does that say? --- $1.4 billion, all for this one big score—was it worth it? --- Hudson Rock really made a name for themselves this time, but I’m more interested in whether there are still similar teams out there that haven’t been uncovered. --- Even installed Astrill, going for an international vibe—really thorough thinking. --- Feels like there’s no way to guard against stuff like this in the hacker world, it’s just wild. --- So, are exchange security defenses really that fragile? Seems way weaker than I thought. --- $1.4 billion—if it were me, I’d have lost my mind. How is the national hacking team making so much off this?
View OriginalReply0
BoredWatchervip
· 12-05 15:20
Oh damn, the North Korean hackers' computers got exposed? $1.4 billion gone just like that? Phishing domains are such an old trick, and people still fall for it... By the way, the infrastructure these guys built must be rock solid, their tools are insanely complete. The exchange's security awareness this time is just absurd. Directly targeting key tech personnel? This is going to be interesting.
View OriginalReply0
ETHmaxi_NoFiltervip
· 12-05 15:16
North Korean hackers really pulled off a crazy move—$1.4 billion just gone like that. Exchanges seriously need to rethink their security. Wait, Visual Studio combined with Enigma... this guy is seriously professional. No wonder he could pull off something like this against a top exchange. It's the same old phishing domains again. Why do these big platforms always fall for such outdated tricks? Hudson Rock just exposed the hackers’ whole operation with this one—pretty ruthless, but I guess we need security companies like this. $1.4 billion... If even a penny of that gets recovered, I'll livestream myself washing my hair while doing a handstand. By the way, if this machine could be sold, how much would it be worth just for the collectible value? Astrill... Even VPNs are exposed now. North Korean hackers' operational security is only at this level, huh?
View OriginalReply0
  • Pin
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)