PANews reported on December 5th that, according to Hackread.com, cybersecurity firm Hudson Rock discovered an infected device while analyzing logs from the LummaC2 information-stealing malware. The operator is suspected to be a malware developer within a North Korean state-sponsored hacking group. This device was previously used to build the infrastructure that supported the $1.4 billion theft from the cryptocurrency exchange Bybit in February 2025. Analysis revealed that the credentials found on the device were linked to domains registered before the attack and used to impersonate Bybit. The device itself was high-end, equipped with development tools such as Visual Studio and Enigma Protector, as well as communication and data storage applications like Astrill VPN, Slack, and Telegram. Its activity also indicated that the attackers purchased the domains and prepared fake Zoom installers to carry out phishing attacks. This discovery provides rare insights into the internal workings of asset sharing within North Korean-backed hacking operations.PANews reported on December 5th that, according to Hackread.com, cybersecurity firm Hudson Rock discovered an infected device while analyzing logs from the LummaC2 information-stealing malware. The operator is suspected to be a malware developer within a North Korean state-sponsored hacking group. This device was previously used to build the infrastructure that supported the $1.4 billion theft from the cryptocurrency exchange Bybit in February 2025. Analysis revealed that the credentials found on the device were linked to domains registered before the attack and used to impersonate Bybit. The device itself was high-end, equipped with development tools such as Visual Studio and Enigma Protector, as well as communication and data storage applications like Astrill VPN, Slack, and Telegram. Its activity also indicated that the attackers purchased the domains and prepared fake Zoom installers to carry out phishing attacks. This discovery provides rare insights into the internal workings of asset sharing within North Korean-backed hacking operations.

Security firm: LummaC2 virus infected North Korean hacking devices linked to the Bybit theft.

2025/12/05 22:50

PANews reported on December 5th that, according to Hackread.com, cybersecurity firm Hudson Rock discovered an infected device while analyzing logs from the LummaC2 information-stealing malware. The operator is suspected to be a malware developer within a North Korean state-sponsored hacking group. This device was previously used to build the infrastructure that supported the $1.4 billion theft from the cryptocurrency exchange Bybit in February 2025.

Analysis revealed that the credentials found on the device were linked to domains registered before the attack and used to impersonate Bybit. The device itself was high-end, equipped with development tools such as Visual Studio and Enigma Protector, as well as communication and data storage applications like Astrill VPN, Slack, and Telegram. Its activity also indicated that the attackers purchased the domains and prepared fake Zoom installers to carry out phishing attacks. This discovery provides rare insights into the internal workings of asset sharing within North Korean-backed hacking operations.

Sorumluluk Reddi: Bu sitede yeniden yayınlanan makaleler, halka açık platformlardan alınmıştır ve yalnızca bilgilendirme amaçlıdır. MEXC'nin görüşlerini yansıtmayabilir. Tüm hakları telif sahiplerine aittir. Herhangi bir içeriğin üçüncü taraf haklarını ihlal ettiğini düşünüyorsanız, kaldırılması için lütfen service@support.mexc.com ile iletişime geçin. MEXC, içeriğin doğruluğu, eksiksizliği veya güncelliği konusunda hiçbir garanti vermez ve sağlanan bilgilere dayalı olarak alınan herhangi bir eylemden sorumlu değildir. İçerik, finansal, yasal veya diğer profesyonel tavsiye niteliğinde değildir ve MEXC tarafından bir tavsiye veya onay olarak değerlendirilmemelidir.

Ayrıca Şunları da Beğenebilirsiniz

U.S. Court Finds Pastor Found Guilty in $3M Crypto Scam

U.S. Court Finds Pastor Found Guilty in $3M Crypto Scam

The post U.S. Court Finds Pastor Found Guilty in $3M Crypto Scam appeared on BitcoinEthereumNews.com. Crime 18 September 2025 | 04:05 A Colorado judge has brought closure to one of the state’s most unusual cryptocurrency scandals, declaring INDXcoin to be a fraudulent operation and ordering its founders, Denver pastor Eli Regalado and his wife Kaitlyn, to repay $3.34 million. The ruling, issued by District Court Judge Heidi L. Kutcher, came nearly two years after the couple persuaded hundreds of people to invest in their token, promising safety and abundance through a Christian-branded platform called the Kingdom Wealth Exchange. The scheme ran between June 2022 and April 2023 and drew in more than 300 participants, many of them members of local church networks. Marketing materials portrayed INDXcoin as a low-risk gateway to prosperity, yet the project unraveled almost immediately. The exchange itself collapsed within 24 hours of launch, wiping out investors’ money. Despite this failure—and despite an auditor’s damning review that gave the system a “0 out of 10” for security—the Regalados kept presenting it as a solid opportunity. Colorado regulators argued that the couple’s faith-based appeal was central to the fraud. Securities Commissioner Tung Chan said the Regalados “dressed an old scam in new technology” and used their standing within the Christian community to convince people who had little knowledge of crypto. For him, the case illustrates how modern digital assets can be exploited to replicate classic Ponzi-style tactics under a different name. Court filings revealed where much of the money ended up: luxury goods, vacations, jewelry, a Range Rover, high-end clothing, and even dental procedures. In a video that drew worldwide attention earlier this year, Eli Regalado admitted the funds had been spent, explaining that a portion went to taxes while the remainder was used for a home renovation he claimed was divinely inspired. The judgment not only confirms that INDXcoin qualifies as a…
Paylaş
BitcoinEthereumNews2025/09/18 09:14