North Korean Hackers Exploit Atomic Wallet

According to MistTrack, a leading cybersecurity intelligence firm, North Korean hackers are reportedly engaging in a money-laundering scheme related to the recent Atomic Wallet attack. In the past two days, evidence has emerged suggesting that funds stolen during the attack are being actively laundered through various cryptocurrency transactions.

503.08 ETH Hack

MistTrack’s investigation has revealed that a hacker address beginning with 0xad3 transferred a substantial amount of 503.08 ETH (Ethereum) to THORChain, a decentralized liquidity protocol. From there, the hackers converted the ETH into BTC (Bitcoin) and bridged it to a Bitcoin address starting with bc1q. This series of transactions aims to obfuscate the origins of the funds and make it difficult to trace them back to their source.

Furthermore, the North Korean hackers have been exploiting the SWFT Blockchain platform to convert the stolen ETH into multiple BTC addresses. SWFT Blockchain is a cross-chain transfer platform that enables users to bridge different cryptocurrencies seamlessly. By using this platform, the hackers have attempted to further conceal their illicit activities and complicate the tracking process.

 

MistTrack Investigation

The investigation by MistTrack suggests that North Korean hackers are actively involved in laundering the funds obtained from the Atomic Wallet attack, a cyber incident that targeted the popular cryptocurrency wallet service. While the exact motive behind the attack remains unclear, it is believed that the hackers are seeking financial gain through these money-laundering efforts.

The emergence of these findings has raised concerns within the cryptocurrency community and intensified efforts to combat cybercrime. Security experts and law enforcement agencies are collaborating to track the flow of funds and identify the individuals behind these illicit activities. Measures are being taken to strengthen cybersecurity protocols and enhance the traceability of cryptocurrency transactions to prevent future attacks and disrupt money-laundering networks.

As investigations continue, the affected parties are urged to remain vigilant and exercise caution while engaging in cryptocurrency transactions. It is crucial to implement robust security measures, such as two-factor authentication and encryption, to protect digital assets and prevent unauthorized access to wallets and exchanges.