North Korea’s Lazarus Group Uses Crypto Payments to Infiltrate Firms

North Korea’s Lazarus Group has devised a new way to infiltrate cryptocurrency firms—by sending digital assets to their targets in an elaborate social engineering scheme designed to build trust before launching an attack.
A security researcher known as 23pds, the Chief Information Security Officer (CISO) at Web3 security firm SlowMist, explained that this method involves sending cryptocurrency to potential victims to appear credible. In one known case, an individual received $400 in USDT, though some payments reportedly reach thousands of dollars.
The hackers use these financial transactions to establish legitimacy, increasing the chances that their targets will unknowingly cooperate. By engaging with employees at crypto companies, they create a sense of trust before introducing harmful code through private GitHub repositories or live chat platforms. Once victims execute the compromised software, the attackers gain unauthorized access to internal systems.
READ MORE: SEC Set to Dismiss Coinbase Lawsuit, Marking a Major Shift in Crypto Regulation
Unlike traditional cyberattacks that exploit software vulnerabilities, this strategy preys on human psychology, making employees the weakest link in security defenses. 23pds urged firms to strengthen internal protocols and train their staff to recognize these deceptive tactics, emphasizing the need for heightened awareness.
The resurgence of Lazarus Group’s operations signals a growing security threat for the crypto industry. North Korean-backed cybercriminals were responsible for stealing $1.34 billion in 2024—more than double the amount attributed to them the previous year. However, their activity declined following a high-profile summit between Russian President Vladimir Putin and North Korean leader Kim Jong Un in mid-2024, raising questions about their future operations.









