Tag Archive for: Chemical

Lazarus Group Behind $540 Million Axie Infinity Crypto Hack and Attacks on Chemical Sector


North Korean Lazarus Hackers

The U.S. Treasury Department has implicated the North Korea-backed Lazarus Group (aka Hidden Cobra) in the theft of $540 million from video game Axie Infinity’s Ronin Network last month.

On Thursday, the Treasury tied the Ethereum wallet address that received the stolen digital currency to the threat actor and sanctioned the funds by adding the address to the Office of Foreign Assets Control’s (OFAC) Specially Designated Nationals (SDN) List.

“The FBI, in coordination with Treasury and other U.S. government partners, will continue to expose and combat the DPRK’s use of illicit activities – including cybercrime and cryptocurrency theft – to generate revenue for the regime,” the intelligence and law enforcement agency said in a statement.

The cryptocurrency heist, the second-largest cyber-enabled theft to date, involved the siphoning of 173,600 Ether (ETH) and 25.5 million USD Coins from the Ronin cross-chain bridge, which allows users to transfer their digital assets from one crypto network to another, on March 23, 2022.

“The attacker used hacked private keys in order to forge fake withdrawals,” the Ronin Network explained in its disclosure report a week later after the incident came to light.

CyberSecurity

By sanctioning the wallet address, the move prohibits U.S. individuals and entities from transacting with it to ensure that the state-sponsored group can’t cash out any further funds. An analysis by Elliptic has found that the actor has already managed to launder 18% of the siphoned digital funds (about $97 million) as of April 14.

“First, the stolen USDC was swapped for ETH through decentralized exchanges (DEXs) to prevent it from being seized,” Elliptic noted. “By converting the tokens at DEXs, the hacker avoided the anti-money laundering (AML) and ‘know your customer’ (KYC) checks performed at centralized exchanges.”

Nearly $80.3 million of the laundered funds have involved the use of Tornado Cash, a mixing service on the Ethereum blockchain designed to obscure the trail of funds, with another $9.7 million worth of ETH likely to be laundered in the same manner.

Lazarus Group, an umbrella name assigned to prolific state-sponsored actors operating on behalf of North Korean strategic…

Source…

Hacker changed chemical level at Oldsmar water treatment facility


Thanks to a vigilant operator and several redundancies, officials say the heightened level of sodium hydroxide never caused a public threat.

OLDSMAR, Fla. — A hacker gained access to Oldsmar’s water treatment plant, bumping the sodium hydroxide in the water to a “dangerous” level, Pinellas County Sheriff Bob Gualtieri said.

In a press conference Monday, Gualtieri said his deputies, along with the FBI and U.S. Secret Service, are investigating the breach as it is unclear if it came from within the U.S. or from a foreign actor.

The incident first occurred on Feb. 5 at the city’s water treatment plant when, around 8 a.m., an operator noticed someone had remotely entered the computer system that he was monitoring. It’s a system responsible for controlling the chemicals and other operations of the water treatment plant, Gualtieri said.

At first, the operator did not think much of the action due to the common use of the remote access software by supervisors to troubleshoot from different locations. That’s until it happened again. 

And this time, Gualtieri says, the hacker did more than just remote in. According to the sheriff, the hacker spent up to five minutes in the system and adjusted the amount of sodium hydroxide in the water from 100 parts per million to 11,100.

“This is obviously a significant and potentially dangerous increase. Sodium hydroxide, also known as lye, is the main ingredient in liquid drain cleaners,” Gualtieri added.

RELATED: Oldsmar water treatment plant hack: 5 things to know about water safety, other cyberattacks


Source…

Hackers Hit 29 Chemical Makers in ‘Nitro’ , Symantec Says

The allowed the hackers to get a ‘s Internet Protocol address, the names of other computers on the network and passwords stored by Microsoft Corp.’s Windows program, according to the report. The goal of the was to gain …
Read more

DHS plans to beef up its forensic capabilities for chemical threat agents

Jacob Goodwin

Top Priority Sector: 
cbrne_detection

The Science and Technology Directorate at DHS wants to dig deeper into the chemical warfare field and develop stronger “forensic” capabilities that would enable the department’s investigators and the FBI to better determine the nature and source of any chemical agent attack.

Homepage position: 
10

read more

Read more