Research Shows - North Korea Hackers Likely Exploit Cloud Mining to Launder Stolen Crypto

Research Shows - North Korea Hackers Likely Exploit Cloud Mining to Launder Stolen Crypto

Research Shows - North Korea Hackers Likely Exploit Cloud Mining to Launder Stolen Crypto

image credit -

North Korean hacking group APT43 is using cloud mining services to launder stolen cryptocurrencies, according to a study by Google-owned cybersecurity firm Montiant.

Cloud mining services have their own infrastructure and lease hash rate to users. A hash rate is a measure of the total computing power of a computer required to secure a cryptocurrency. According to a report published on Tuesday, APT43 uses the stolen cryptocurrency to pay for these services and receives non-criminal cryptocurrency.

According to Mandiant, the group is "moderately advanced" and supports the North Korean regime's strategic and nuclear ambitions. According to the report, it uses proceeds from cybercrime to finance its activities against South Korean and US government agencies, scientists and think tanks involved in the geopolitics of the Korean Peninsula.

To obtain encryption, APT43 steals credentials, often through phishing attacks. This means creating legitimate-looking websites, such as those disguised as cryptocurrency exchanges, to convince unsuspecting users to give up their personal information.

In high-profile digital heists like the $100 million Horizon Bridge heist, North Korean hackers are increasingly incorporating digital currencies into their operations, according to the FBI. Authorities around the world, particularly in the United States and South Korea, are scrambling to combat the threat.

Mandiant was acquired by Google and integrated into its cloud services in September 2022.

Getting Info...

1 comment

  1. According to a recent report, North Korean hackers are suspected of using cloud mining to launder stolen cryptocurrencies. By using third-party services to mine cryptocurrency, the hackers can potentially convert their ill-gotten gains into legitimate funds, making it harder to track and trace their activities. The report highlights the need for increased security measures to prevent such criminal activities.
Cookie Consent
We serve cookies on this site to analyze traffic, remember your preferences, and optimize your experience.
It seems there is something wrong with your internet connection. Please connect to the internet and start browsing again.
AdBlock Detected!
We have detected that you are using adblocking plugin in your browser.
The revenue we earn by the advertisements is used to manage this website, we request you to whitelist our website in your adblocking plugin.
Site is Blocked
Sorry! This site is not available in your country.