Binance Square
#lazarusgroup

lazarusgroup

Počet zobrazení: 1.4M
Diskutuje: 326
Jim21
·
--
Alerta de Seguridad: El Grupo Lazarus golpea de nuevo con un robo de $290M ​El ecosistema cripto enfrenta su mayor desafío en lo que va de 2026. El reconocido grupo de hackers norcoreanos, Lazarus, es el principal sospechoso del masivo ataque sufrido este fin de semana contra la plataforma de inversión KelpDAO. ​Aquí los detalles clave de lo ocurrido: ​El Botín: Aproximadamente $290 millones de dólares en tokens vinculados a Ethereum. ​El Método: Fueron comprometidos dos servidores alojados a través de la aplicación LayerZero, permitiendo la extracción de los activos el pasado 18 de abril. ​El Impacto: Se consolida como el ciberataque de criptomonedas más grande registrado en 2026 hasta la fecha. ​🛡️ ¿Por qué es relevante? ​Expertos como Henri Arslanian (Nine Blocks Capital Management) señalan que la sofisticación del ataque apunta directamente a capacidades estatales. Según informes de la ONU, estos fondos sustraídos tienen un objetivo crítico y alarmante: financiar el programa de desarrollo de armas nucleares de Corea del Norte. ​Desde 2017, se estima que este grupo ha sustraído más de $3,000 millones de dólares en activos digitales. ​Afortunadamente, LayerZero ha comunicado que no hay contagio hacia otros activos o aplicaciones de su red, pero el incidente reabre el debate sobre la seguridad en protocolos de interoperabilidad y almacenamiento. ​Mantén tus activos seguros y siempre verifica los protocolos donde operas. 🔒 ​#LazarusGroup #CryptoSecurity2025 #KelpDAO #Ethereum #SeguridadCripto $ETH $BTC $BNB {future}(ETHUSDT) {future}(BTCUSDT) {future}(BNBUSDT)
Alerta de Seguridad: El Grupo Lazarus golpea de nuevo con un robo de $290M

​El ecosistema cripto enfrenta su mayor desafío en lo que va de 2026. El reconocido grupo de hackers norcoreanos, Lazarus, es el principal sospechoso del masivo ataque sufrido este fin de semana contra la plataforma de inversión KelpDAO.

​Aquí los detalles clave de lo ocurrido:

​El Botín: Aproximadamente $290 millones de dólares en tokens vinculados a Ethereum.

​El Método: Fueron comprometidos dos servidores alojados a través de la aplicación LayerZero, permitiendo la extracción de los activos el pasado 18 de abril.

​El Impacto: Se consolida como el ciberataque de criptomonedas más grande registrado en 2026 hasta la fecha.

​🛡️ ¿Por qué es relevante?

​Expertos como Henri Arslanian (Nine Blocks Capital Management) señalan que la sofisticación del ataque apunta directamente a capacidades estatales. Según informes de la ONU, estos fondos sustraídos tienen un objetivo crítico y alarmante: financiar el programa de desarrollo de armas nucleares de Corea del Norte.

​Desde 2017, se estima que este grupo ha sustraído más de $3,000 millones de dólares en activos digitales.

​Afortunadamente, LayerZero ha comunicado que no hay contagio hacia otros activos o aplicaciones de su red, pero el incidente reabre el debate sobre la seguridad en protocolos de interoperabilidad y almacenamiento.

​Mantén tus activos seguros y siempre verifica los protocolos donde operas. 🔒

#LazarusGroup #CryptoSecurity2025 #KelpDAO #Ethereum #SeguridadCripto

$ETH $BTC $BNB
Článok
🚨 BREAKING: NORTH KOREA JUST STOLE $577M FROM DEFI IN 18 DAYS — AND NOBODY IS TALKING ABOUT......April 23, 2026 The numbers are in. They are catastrophic. Crypto protocols have lost over $606 million to hacks and exploits in just the first 18 days of April 2026 making it the single worst month for theft in the industry since the $1.4 billion Bybit breach in February 2025. Two attacks. Two names. Both point to the same culprit. 🔴 WHAT HAPPENED The $285 million Drift Protocol attack on April 1st, and the $292 million KelpDAO breach on April 18th both later attributed to North Korea’s Lazarus Group together represent roughly 95% of April’s losses. This wasn’t random. This was surgical. Following the KelpDAO exploit alone, DeFi’s total value locked fell over 7% in 24 hours. Aave dropped from $26.4 billion to near $17.9 billion. Billions. Gone. Overnight. 🔥 WHY IT MATTERS This isn’t just a bad month. The entire first quarter of 2026 saw just $165.5 million in losses. April’s total arrived in under three weeks making the month 3.7× larger than all of Q1 combined. The pace is accelerating dangerously. DeFi recorded 47 separate incidents in the first 4.5 months of 2026, compared with 28 over the same period in 2025 a 68% year-over-year increase in attack frequency. 📉 MARKET REACTION Panic. Institutional players are not waiting around. Institutional players responded with emergency rate limits and frozen bridge flows, while Jefferies warned the string of hacks could temporarily slow Wall Street’s appetite for DeFi tokenization projects. $BTC is holding. Alts are bleeding. Risk-off mode is fully activated. ⚠️ MOST PEOPLE ARE MISSING THIS DETAIL… Everyone is focused on the dollar amounts. But the real story is HOW they’re getting in. April’s exploits cut across smart contract vulnerabilities, infrastructure attacks, AND social engineering campaigns including AI-driven attacks on wallets. The old playbook of “just get your code audited” is dead. Lazarus Group is now deploying AI to target individuals. Your wallet. Your team. Your infra. As one analyst put it bluntly: “DeFi remains a niche market until risk can be properly priced and right now, we’re far from it.” 🔮 WHAT HAPPENS NEXT If even one more mid-size exploit hits before April 30th, the month’s total could approach $700 million. The Clarity Act which could bring regulatory structure to protect DeFi looks like a lost cause for April, with a potential Senate committee hearing pushed into May at the earliest. Meanwhile, the attackers are not slowing down. The question isn’t whether your protocol will be targeted. It’s whether you’ll still be solvent when it is. 🔒 #defi #KelpDAO #LazarusGroup #CryptoSecurity #BinanceSquare

🚨 BREAKING: NORTH KOREA JUST STOLE $577M FROM DEFI IN 18 DAYS — AND NOBODY IS TALKING ABOUT......

April 23, 2026
The numbers are in. They are catastrophic.
Crypto protocols have lost over $606 million to hacks and exploits in just the first 18 days of April 2026 making it the single worst month for theft in the industry since the $1.4 billion Bybit breach in February 2025.
Two attacks. Two names. Both point to the same culprit.

🔴 WHAT HAPPENED
The $285 million Drift Protocol attack on April 1st, and the $292 million KelpDAO breach on April 18th both later attributed to North Korea’s Lazarus Group together represent roughly 95% of April’s losses.
This wasn’t random. This was surgical.
Following the KelpDAO exploit alone, DeFi’s total value locked fell over 7% in 24 hours. Aave dropped from $26.4 billion to near $17.9 billion. Billions. Gone. Overnight.

🔥 WHY IT MATTERS
This isn’t just a bad month. The entire first quarter of 2026 saw just $165.5 million in losses. April’s total arrived in under three weeks making the month 3.7× larger than all of Q1 combined.
The pace is accelerating dangerously. DeFi recorded 47 separate incidents in the first 4.5 months of 2026, compared with 28 over the same period in 2025 a 68% year-over-year increase in attack frequency.

📉 MARKET REACTION
Panic. Institutional players are not waiting around. Institutional players responded with emergency rate limits and frozen bridge flows, while Jefferies warned the string of hacks could temporarily slow Wall Street’s appetite for DeFi tokenization projects.
$BTC is holding. Alts are bleeding. Risk-off mode is fully activated.

⚠️ MOST PEOPLE ARE MISSING THIS DETAIL…
Everyone is focused on the dollar amounts. But the real story is HOW they’re getting in.
April’s exploits cut across smart contract vulnerabilities, infrastructure attacks, AND social engineering campaigns including AI-driven attacks on wallets. The old playbook of “just get your code audited” is dead.
Lazarus Group is now deploying AI to target individuals. Your wallet. Your team. Your infra.
As one analyst put it bluntly: “DeFi remains a niche market until risk can be properly priced and right now, we’re far from it.”

🔮 WHAT HAPPENS NEXT
If even one more mid-size exploit hits before April 30th, the month’s total could approach $700 million.
The Clarity Act which could bring regulatory structure to protect DeFi looks like a lost cause for April, with a potential Senate committee hearing pushed into May at the earliest.
Meanwhile, the attackers are not slowing down.

The question isn’t whether your protocol will be targeted.
It’s whether you’ll still be solvent when it is. 🔒

#defi #KelpDAO #LazarusGroup #CryptoSecurity #BinanceSquare
$292M GONE: THE DEFI CONTAGION 🚨 The KelpDAO exploit is officially the largest DeFi theft of 2026. Hackers are using THORChain to swap stolen $ETH for $BTC , leaving a massive trail of chaos. Arbitrum froze $75M, but the rest is disappearing into the void. This isn't just one protocol—it’s a systemic failure. Are we witnessing the "Death of Interoperability"? Be careful where you deposit your assets! #KelpDAO #DeFiHack #Security #Alert #LazarusGroup
$292M GONE: THE DEFI CONTAGION 🚨

The KelpDAO exploit is officially the largest DeFi theft of 2026. Hackers are using THORChain to swap stolen $ETH for $BTC , leaving a massive trail of chaos. Arbitrum froze $75M, but the rest is disappearing into the void.

This isn't just one protocol—it’s a systemic failure. Are we witnessing the "Death of Interoperability"? Be careful where you deposit your assets!

#KelpDAO #DeFiHack #Security #Alert #LazarusGroup
The **Kelp DAO exploit** is currently the largest DeFi hack of 2026, totaling nearly **$293 million**. Here is a professional post draft for Binance Square that breaks down the situation and the recent "freeze" actions. ## 🚨 Market Alert: The Kelp DAO Exploit & The "Freeze" Response The DeFi community is reeling from a sophisticated **$293 million** exploit targeting **Kelp DAO (@KelpDAO)**. This incident, attributed to the Lazarus Group, has triggered a massive contagion event across the ecosystem. ### 🔍 What Happened? The attack targeted a vulnerability in the verification process between Kelp DAO and the **LayerZero** protocol. By exploiting a "1-of-1 verifier" setup and using a DDoS attack to isolate RPC nodes, the hackers successfully minted **116,500 rsETH** without backing. ### ❄️ The Strategic Freeze To prevent further damage and bad debt, major protocols have taken emergency measures: * **Arbitrum Security Council:** In a historic move, they successfully **froze 30,766 ETH (~$71M)** held in an address linked to the exploit. These funds are now moved to a locked wallet pending a governance vote. * **Lending Protocols:** Platforms like **Aave, SparkLend, and Fluid** have frozen their rsETH markets. This was crucial as the attacker had already deposited stolen tokens as collateral to borrow nearly $190M in real assets. * **Contract Pause:** Kelp DAO successfully paused their contracts in time to block a second attempt to drain an additional **40,000 rsETH**. ### 📉 Ecosystem Impact * **Aave** saw a nearly **$8 Billion drop in TVL** as users reassessed risk. * **$PIXEL** and other Web3 assets are being closely watched for side-effect volatility. * This event highlights the critical need for **decentralized verification** over 1-of-1 configurations. Stay vigilant and monitor your positions in restaking protocols. 🛡️ #KelpDAOExploitFreeze #DeFiSecurity #LazarusGroup #rsETH $ETH {spot}(ETHUSDT) $ARB
The **Kelp DAO exploit** is currently the largest DeFi hack of 2026, totaling nearly **$293 million**. Here is a professional post draft for Binance Square that breaks down the situation and the recent "freeze" actions.
## 🚨 Market Alert: The Kelp DAO Exploit & The "Freeze" Response
The DeFi community is reeling from a sophisticated **$293 million** exploit targeting **Kelp DAO (@KelpDAO)**. This incident, attributed to the Lazarus Group, has triggered a massive contagion event across the ecosystem.
### 🔍 What Happened?
The attack targeted a vulnerability in the verification process between Kelp DAO and the **LayerZero** protocol. By exploiting a "1-of-1 verifier" setup and using a DDoS attack to isolate RPC nodes, the hackers successfully minted **116,500 rsETH** without backing.
### ❄️ The Strategic Freeze
To prevent further damage and bad debt, major protocols have taken emergency measures:
* **Arbitrum Security Council:** In a historic move, they successfully **froze 30,766 ETH (~$71M)** held in an address linked to the exploit. These funds are now moved to a locked wallet pending a governance vote.
* **Lending Protocols:** Platforms like **Aave, SparkLend, and Fluid** have frozen their rsETH markets. This was crucial as the attacker had already deposited stolen tokens as collateral to borrow nearly $190M in real assets.
* **Contract Pause:** Kelp DAO successfully paused their contracts in time to block a second attempt to drain an additional **40,000 rsETH**.
### 📉 Ecosystem Impact
* **Aave** saw a nearly **$8 Billion drop in TVL** as users reassessed risk.
* **$PIXEL** and other Web3 assets are being closely watched for side-effect volatility.
* This event highlights the critical need for **decentralized verification** over 1-of-1 configurations.
Stay vigilant and monitor your positions in restaking protocols. 🛡️
#KelpDAOExploitFreeze #DeFiSecurity #LazarusGroup #rsETH $ETH
$ARB
North Korea’s $500M DeFi Blitz: Is Your Protocol Next? The "isolated incident" era is over. In a span of just two weeks, the DeFi landscape has been rocked by a pair of sophisticated exploits targeting Drift Protocol and Kelp DAO, resulting in a staggering loss of over $500 million. What we are witnessing is a strategic, state-sponsored playbook evolving in real-time. Security analysts are increasingly pointing the finger at North Korean-aligned threat actors, suggesting these aren’t just random hacks, but a sustained campaign to bypass global sanctions. The Anatomy of the Attack The precision of these hits is what should worry every $SOL and $ETH holder: {future}(SOLUSDT) {future}(ETHUSDT) Drift Protocol ($285M): A masterclass in social engineering. Hackers spent months building fake identities to compromise admin keys, eventually manipulating oracle prices with a "worthless" token to drain the vaults. Kelp DAO ($290M+): A cross-chain nightmare. By targeting a $LAYERZERO bridge, attackers siphoned $rsETH, triggering a massive contagion that saw billions in liquidity exit protocols like $AAVE in under 48 hours. Why DeFi? For a sanctioned state, DeFi represents the path of least resistance. The interconnectedness of protocols—where one asset is used as collateral for another—means a single "zero-timelock" vulnerability can collapse an entire ecosystem like a house of cards. How to Protect Your Assets Check Your Permissions: Revoke any unnecessary smart contract approvals. Monitor "Circuit Breakers": Favor protocols with active safety delays and multi-sig transparency. Diversify Your Risk: Don't keep all your $USDC or SOL in a single "restaking" basket. {future}(USDCUSDT) The barrier to entry for these attackers is getting lower thanks to AI-generated personas, while their speed is increasing. It’s no longer about if a protocol will be targeted, but when. #writetoearn #defi #LazarusGroup #CyberSecurity #CryptoNews
North Korea’s $500M DeFi Blitz: Is Your Protocol Next?

The "isolated incident" era is over. In a span of just two weeks, the DeFi landscape has been rocked by a pair of sophisticated exploits targeting Drift Protocol and Kelp DAO, resulting in a staggering loss of over $500 million.

What we are witnessing is a strategic, state-sponsored playbook evolving in real-time. Security analysts are increasingly pointing the finger at North Korean-aligned threat actors, suggesting these aren’t just random hacks, but a sustained campaign to bypass global sanctions.

The Anatomy of the Attack
The precision of these hits is what should worry every $SOL and $ETH holder:
Drift Protocol ($285M): A masterclass in social engineering. Hackers spent months building fake identities to compromise admin keys, eventually manipulating oracle prices with a "worthless" token to drain the vaults.

Kelp DAO ($290M+): A cross-chain nightmare. By targeting a $LAYERZERO bridge, attackers siphoned $rsETH, triggering a massive contagion that saw billions in liquidity exit protocols like $AAVE in under 48 hours.

Why DeFi?
For a sanctioned state, DeFi represents the path of least resistance. The interconnectedness of protocols—where one asset is used as collateral for another—means a single "zero-timelock" vulnerability can collapse an entire ecosystem like a house of cards.

How to Protect Your Assets
Check Your Permissions: Revoke any unnecessary smart contract approvals.

Monitor "Circuit Breakers": Favor protocols with active safety delays and multi-sig transparency.

Diversify Your Risk: Don't keep all your $USDC or SOL in a single "restaking" basket.
The barrier to entry for these attackers is getting lower thanks to AI-generated personas, while their speed is increasing. It’s no longer about if a protocol will be targeted, but when.

#writetoearn #defi #LazarusGroup #CyberSecurity #CryptoNews
​🚨 Security Alert: Record increase in cyber attacks on DeFi platforms ​A big shock for the crypto world! According to reports, operators linked to North Korea have stolen more than $500 million from DeFi platforms in less than three weeks. Their total crypto hacking has now reached an estimated $6.75 billion. ⚠️💸 ​Recent major hacks (Exploits): ​KelpDAO (April 18): Loss of about $290 million. According to forensic analysis, the Lazarus Group's 'TraderTraitor' group is behind it. ​Drift Protocol (April 1): Loss of about $286 million. According to Elliptic reports, the patterns of this hack are exactly the same as previous attacks by the DPRK (North Korea). ​Horrifying revelation: The 'Ketman Project' has revealed that nearly 100 North Korean operators are working inside various blockchain companies to carry out secret hacking. ​Important advice for investors: ​Keep your wallets safe: Use only reputable and audited DeFi protocols. ​Unusual activity: If you are investing in a project, be sure to check its security team and recent audit reports. ​Large holdings: Don't keep all your digital wealth on a single DeFi platform. ​This news is a reminder that security should be the top priority in the blockchain world. What do you think about these attacks? Should DeFi platforms adopt more stringent security protocols? Let us know your thoughts in the comments! 👇 ​Follow me for more market alerts and security updates! $BSB $ON $UAI ​#DeFi #CryptoSecurity #LazarusGroup BlockchainNews CryptoMarket DigitalAssets #cyberattack
​🚨 Security Alert: Record increase in cyber attacks on DeFi platforms

​A big shock for the crypto world! According to reports, operators linked to North Korea have stolen more than $500 million from DeFi platforms in less than three weeks. Their total crypto hacking has now reached an estimated $6.75 billion. ⚠️💸

​Recent major hacks (Exploits):

​KelpDAO (April 18): Loss of about $290 million. According to forensic analysis, the Lazarus Group's 'TraderTraitor' group is behind it.

​Drift Protocol (April 1): Loss of about $286 million. According to Elliptic reports, the patterns of this hack are exactly the same as previous attacks by the DPRK (North Korea).

​Horrifying revelation:

The 'Ketman Project' has revealed that nearly 100 North Korean operators are working inside various blockchain companies to carry out secret hacking.

​Important advice for investors:

​Keep your wallets safe: Use only reputable and audited DeFi protocols.

​Unusual activity: If you are investing in a project, be sure to check its security team and recent audit reports.

​Large holdings: Don't keep all your digital wealth on a single DeFi platform.

​This news is a reminder that security should be the top priority in the blockchain world. What do you think about these attacks? Should DeFi platforms adopt more stringent security protocols? Let us know your thoughts in the comments! 👇

​Follow me for more market alerts and security updates!

$BSB $ON $UAI

#DeFi #CryptoSecurity #LazarusGroup BlockchainNews CryptoMarket DigitalAssets #cyberattack
微策终究还是超越了贝莱德,坐稳了全球持仓量的头把交椅;同时KelpDAO那1.75亿美金的被盗资金也开始异动,背后直指北边邻居。 塞勒这波是真硬,凭一己之力在规模上盖过了全球最大的资管巨头,这说明企业储备资产的叙事已经跑赢了ETF通道。宏观上看,筹码进一步向顶级意志集中,长线逻辑依然稳健。但这1.75亿美金的黑钱动向就像个情绪苍蝇,虽然实际抛压对大盘冲击有限,但“北边黑客”这四个字一出,总能让短线流动性紧一紧。一边是顶级合规明牌增持,一边是顶级黑产暗戳戳变现,这味儿太正了,妥妥的币圈魔幻现实主义。你们觉得塞勒这波能领跑多久? #MicroStrategy #BlackRock #KelpDAO #LazarusGroup $BTC $MSTR {future}(MSTRUSDT) {future}(BTCUSDT)
微策终究还是超越了贝莱德,坐稳了全球持仓量的头把交椅;同时KelpDAO那1.75亿美金的被盗资金也开始异动,背后直指北边邻居。
塞勒这波是真硬,凭一己之力在规模上盖过了全球最大的资管巨头,这说明企业储备资产的叙事已经跑赢了ETF通道。宏观上看,筹码进一步向顶级意志集中,长线逻辑依然稳健。但这1.75亿美金的黑钱动向就像个情绪苍蝇,虽然实际抛压对大盘冲击有限,但“北边黑客”这四个字一出,总能让短线流动性紧一紧。一边是顶级合规明牌增持,一边是顶级黑产暗戳戳变现,这味儿太正了,妥妥的币圈魔幻现实主义。你们觉得塞勒这波能领跑多久? #MicroStrategy #BlackRock #KelpDAO #LazarusGroup $BTC $MSTR
A million-dollar capitulation. 📉 Trader 0x720 just locked in a -$374,000 loss, dumping all their $ZRO on Binance. For three weeks, they DCA'd, betting on the Zero blockchain launch, but the Lazarus Group hack killed the strategy. Dumping $982k into the market is a cry of despair. When whales exit at a loss, it means they know the bottom isn't in yet. Stay sharp the market is hunting for your liquidity! {future}(ZROUSDT) ​#ZRO #LayerZero #LazarusGroup #CryptoHack
A million-dollar capitulation. 📉
Trader 0x720 just locked in a -$374,000 loss, dumping all their $ZRO on Binance.

For three weeks, they DCA'd, betting on the Zero blockchain launch, but the Lazarus Group hack killed the strategy.

Dumping $982k into the market is a cry of despair. When whales exit at a loss, it means they know the bottom isn't in yet.
Stay sharp the market is hunting for your liquidity!

#ZRO #LayerZero #LazarusGroup #CryptoHack
Evgenia Crypto
·
--
Numbers that terrify shorters MicroStrategy now controls over 3.8% of the total Bitcoin supply. 🦾 Buying 34,164 $BTC at an average of $74,395 proves Saylor is ready to buy any high. Despite a $317M unrealized loss, the strategy is unshakable. While you wonder if it's "too expensive," institutions are securing your future. 🎯💎
{future}(BTCUSDT)

​#BTC #Strategy #WhaleActivity
🚨 DEFI EMERGENCY: The $292M Kelp DAO Exploit Explained! The Attack: A massive breach allowed hackers to mint 116,500 rsETH out of thin air. The Culprit: Initial reports link the attack to the Lazarus Group (North Korea). Contagion: Over 15 protocols (including Ethena and TRON DAO) have frozen their bridges to stop the bleeding. Stay Safe: If you hold rsETH, check your wallet immediately. Aave has already frozen these markets to protect users. 👉 Do follow for the latest DeFi security patches and safety tips! #KelpDAOFacesAttack #DeFiExploit #Web3Security #ETH #LazarusGroup $
🚨 DEFI EMERGENCY: The $292M Kelp DAO Exploit Explained!

The Attack: A massive breach allowed hackers to mint 116,500 rsETH out of thin air.

The Culprit: Initial reports link the attack to the Lazarus Group (North Korea).

Contagion: Over 15 protocols (including Ethena and TRON DAO) have frozen their bridges to stop the bleeding.

Stay Safe: If you hold rsETH, check your wallet immediately. Aave has already frozen these markets to protect users.

👉 Do follow for the latest DeFi security patches and safety tips!

#KelpDAOFacesAttack #DeFiExploit #Web3Security #ETH #LazarusGroup $
Kelp DAO Exploit: The Lazarus Shadow Reappears Security alert for the DeFi community. Recent findings from security firms have linked the Kelp DAO exploit directly to the Lazarus Group, the notorious North Korean state-sponsored unit. This breach has reignited a fierce debate over DeFi security protocols and the vulnerability of "single-point" setups. $MSFT This isn't just a hack; it’s a reminder that state-sponsored threats are evolving alongside our tech. For the "Alpha" hunter, this means looking for protocols implementing "Quantum-Safe" or multi-layered security. Stay safe out there—security is your best ROI.$GUN $AVGO References: LayerZero Security Report (April 20, 2026) Chainalysis – DPRK Threat Update (April 20, 2026) Follow Me for critical security updates! #DeFiSecurity #LazarusGroup #CryptoSafety #WhatNextForUSIranConflict #Write2Earn
Kelp DAO Exploit: The Lazarus Shadow Reappears

Security alert for the DeFi community. Recent findings from security firms have linked the Kelp DAO exploit directly to the Lazarus Group, the notorious North Korean state-sponsored unit. This breach has reignited a fierce debate over DeFi security protocols and the vulnerability of "single-point" setups.
$MSFT
This isn't just a hack; it’s a reminder that state-sponsored threats are evolving alongside our tech. For the "Alpha" hunter, this means looking for protocols implementing "Quantum-Safe" or multi-layered security. Stay safe out there—security is your best ROI.$GUN
$AVGO
References:
LayerZero Security Report (April 20, 2026)

Chainalysis – DPRK Threat Update (April 20, 2026)

Follow Me for critical security updates!

#DeFiSecurity #LazarusGroup #CryptoSafety #WhatNextForUSIranConflict #Write2Earn
以太坊基金会资助了一个叫 Ketman 的硬核项目,专门清理潜伏在各项目里的朝鲜“远程民工”。这帮黑客拿着假证件伪装成日本开发者,Ketman 顺藤摸瓜在 53 个项目里揪出了 100 个内鬼,这渗透率听着都后脑勺冒凉气。 这操作比直接攻击协议更让人后怕,以前是明抢,现在是带薪潜伏。想想你家项目的核心开发可能正一边领着高薪,一边盯着多签钱包的私钥,简直是币圈版《潜伏》。从老韭菜视角看,这些内鬼一旦得手,资金流向会瞬间归集到特定洗钱地址,根本不给防守机会。这波资助确实救了不少项目方的命,不然哪天 TVL 瞬间清零都不知道是谁干的。 大家的项目组里,有那种从没见过面、但技术贼牛的神秘大拿吗? #Ketman #CyberSecurity #LazarusGroup $ETH {future}(ETHUSDT)
以太坊基金会资助了一个叫 Ketman 的硬核项目,专门清理潜伏在各项目里的朝鲜“远程民工”。这帮黑客拿着假证件伪装成日本开发者,Ketman 顺藤摸瓜在 53 个项目里揪出了 100 个内鬼,这渗透率听着都后脑勺冒凉气。
这操作比直接攻击协议更让人后怕,以前是明抢,现在是带薪潜伏。想想你家项目的核心开发可能正一边领着高薪,一边盯着多签钱包的私钥,简直是币圈版《潜伏》。从老韭菜视角看,这些内鬼一旦得手,资金流向会瞬间归集到特定洗钱地址,根本不给防守机会。这波资助确实救了不少项目方的命,不然哪天 TVL 瞬间清零都不知道是谁干的。
大家的项目组里,有那种从没见过面、但技术贼牛的神秘大拿吗? #Ketman #CyberSecurity #LazarusGroup $ETH
callmesae187:
check my pinned post and claim your free red package and quiz in USTD🎁🎁
美联储深夜放鸽!但背后藏着一个矛盾信号… 来了!美联储核心人物沃勒刚刚投下一颗惊雷:首次公开支持降息! 全球市场瞬间沸腾,但狂欢之下,老司机却嗅到了一丝不寻常。为什么态度转变如此之快?这场预期的宽松,究竟是盛宴还是陷阱? 多头这边早已狂喜不已,认为降息大门已正式打开,流动性宽松在即,美股、加密市场有望迎来新一轮上涨行情,入场时机已到。 但空头的警告同样不容忽视,沃勒的表态中,“谨慎”二字重如千钧,这背后暗藏玄机——通胀的幽灵并未彻底散去,美伊冲突带来的能源冲击、核心通胀的粘性,都可能让降息剧本随时反转,一个关键数据就足以改写市场走向。 千万别被表面的利好冲昏头脑,这根本不是单纯的政策红利,而是一颗“糖里藏刀”的烟雾弹。当下盲目冲进场,看似抢占先机,实则可能沦为接盘侠。 狂欢之下更要保持清醒:你以为自己是预判行情的聪明先知,还是即将被套牢的接盘勇士?#Futures_Signals #doge⚡ #LazarusGroup 我只做实盘不玩虚的,想踏实避坑、稳步盈利的朋友,别在币圈独自摸黑。跟上节奏,@Square-Creator-deefd6579c218 带你们用稳赢逻辑赚稳钱!🔥 [币安聊天裙,点击即可加入](https://app.binance.com/uni-qr/group-chat-landing?channelToken=PdfJmZdC3KlQN-gvrbm4HA&type=1&entrySource=sharing_link)
美联储深夜放鸽!但背后藏着一个矛盾信号…

来了!美联储核心人物沃勒刚刚投下一颗惊雷:首次公开支持降息!
全球市场瞬间沸腾,但狂欢之下,老司机却嗅到了一丝不寻常。为什么态度转变如此之快?这场预期的宽松,究竟是盛宴还是陷阱?
多头这边早已狂喜不已,认为降息大门已正式打开,流动性宽松在即,美股、加密市场有望迎来新一轮上涨行情,入场时机已到。
但空头的警告同样不容忽视,沃勒的表态中,“谨慎”二字重如千钧,这背后暗藏玄机——通胀的幽灵并未彻底散去,美伊冲突带来的能源冲击、核心通胀的粘性,都可能让降息剧本随时反转,一个关键数据就足以改写市场走向。
千万别被表面的利好冲昏头脑,这根本不是单纯的政策红利,而是一颗“糖里藏刀”的烟雾弹。当下盲目冲进场,看似抢占先机,实则可能沦为接盘侠。
狂欢之下更要保持清醒:你以为自己是预判行情的聪明先知,还是即将被套牢的接盘勇士?#Futures_Signals #doge⚡ #LazarusGroup
我只做实盘不玩虚的,想踏实避坑、稳步盈利的朋友,别在币圈独自摸黑。跟上节奏,@宝哥的带单日记 带你们用稳赢逻辑赚稳钱!🔥
币安聊天裙,点击即可加入
说真的,太多人进币圈的第一天,就想着梭个10倍、20倍一夜暴富。 但你去问问那些从小钱做到大钱的,有几个是靠梭哈翻身的? 不是没可能,是概率太低。 我呢?一个月,从1万做到100万,靠的是滚仓。不是玄学,不是运气,而是三套清晰狠准的战术。 第一招,只做“启动波”,不猜底、不碰震荡。趋势没明确走出来,宁可空仓等待,绝不盲目入场;一旦出现突破前高+MACD金叉+EMA21确认的信号,我才敢重仓出手,止损一旦超过5%,果断砍仓,绝不犹豫拖泥带水。 第二招,守住本金,让利润滚动起来,复利才是王道。试仓只动用30%资金,盈利达到20%,立刻抽出全部本金,后续全用利润滚仓操作。真正的滚仓,从不是豪赌,而是赢了吃肉,输了也不伤根本,心态才能稳如泰山。 第三招,看懂情绪周期,不被市场带偏节奏。行情涨跌的背后,本质是市场情绪的起伏,别人踩低看空时果断进场,众人追捧跪舔时果断离场,才能跑赢大多数散户。 我能翻十倍,靠的从不是“梭哈盘感”,而是稳稳的节奏感。滚仓是章法,不是冲动,币圈从不缺机会,缺的是能守住规矩、活到最后的人。#Futures_Signals #doge⚡ #LazarusGroup 我只做实盘不玩虚的,想踏实避坑、稳步盈利的朋友,别在币圈独自摸黑。跟上节奏,@Square-Creator-deefd6579c218 带你们用稳赢逻辑赚稳钱!🔥 [币安聊天裙,点击即可加入](https://app.binance.com/uni-qr/group-chat-landing?channelToken=PdfJmZdC3KlQN-gvrbm4HA&type=1&entrySource=sharing_link)
说真的,太多人进币圈的第一天,就想着梭个10倍、20倍一夜暴富。

但你去问问那些从小钱做到大钱的,有几个是靠梭哈翻身的?
不是没可能,是概率太低。
我呢?一个月,从1万做到100万,靠的是滚仓。不是玄学,不是运气,而是三套清晰狠准的战术。
第一招,只做“启动波”,不猜底、不碰震荡。趋势没明确走出来,宁可空仓等待,绝不盲目入场;一旦出现突破前高+MACD金叉+EMA21确认的信号,我才敢重仓出手,止损一旦超过5%,果断砍仓,绝不犹豫拖泥带水。
第二招,守住本金,让利润滚动起来,复利才是王道。试仓只动用30%资金,盈利达到20%,立刻抽出全部本金,后续全用利润滚仓操作。真正的滚仓,从不是豪赌,而是赢了吃肉,输了也不伤根本,心态才能稳如泰山。
第三招,看懂情绪周期,不被市场带偏节奏。行情涨跌的背后,本质是市场情绪的起伏,别人踩低看空时果断进场,众人追捧跪舔时果断离场,才能跑赢大多数散户。
我能翻十倍,靠的从不是“梭哈盘感”,而是稳稳的节奏感。滚仓是章法,不是冲动,币圈从不缺机会,缺的是能守住规矩、活到最后的人。#Futures_Signals #doge⚡ #LazarusGroup
我只做实盘不玩虚的,想踏实避坑、稳步盈利的朋友,别在币圈独自摸黑。跟上节奏,@宝哥的带单日记 带你们用稳赢逻辑赚稳钱!🔥
币安聊天裙,点击即可加入
Článok
Lazarus Group: North Korea’s Tool for Cybercrime and Illicit FinancingLazarus Group is one of the world’s most dangerous cyber hacking organizations, believed to be operating under the supervision of the North Korean government. It began its activities in the early 2000s and has since carried out high-profile attacks targeting financial institutions, technology companies, and cryptocurrency platforms. Its primary objectives are to fund the North Korean regime, evade international sanctions, and gather intelligence. Origins and Development Lazarus Group first appeared on the cyber scene in 2009, but it gained global attention in 2014 after the infamous attack on Sony Pictures. During that attack, the hackers infiltrated the company’s systems, stole sensitive data, and released threatening messages in response to the film “The Interview”, which mocked North Korean leader Kim Jong-un. Since then, the group has diversified its targets, including banks, governments, and cryptocurrency companies. Group’s Objectives and Motives 1. Illicit Financing: Due to the economic sanctions imposed on North Korea, the group steals money and cryptocurrencies to fund its nuclear and military programs. 2. Cyber Espionage: The group gathers intelligence from governments and corporations to strengthen North Korea’s position in international negotiations. 3. Destabilization: Some attacks are aimed at creating chaos in enemy countries or disrupting their economic systems. Notorious Cyberattacks 1. Sony Pictures Hack (2014) • The hackers infiltrated Sony’s systems, leaking unreleased films and sensitive emails. • The attack caused significant financial losses and raised concerns about online freedom of expression. 2. WannaCry Ransomware Attack (2017) • A global ransomware attack that infected over 230,000 devices in 150 countries. • It crippled hospitals, companies, and banks, with hackers demanding ransom in Bitcoin to unlock encrypted files. 3. Bangladesh Central Bank Heist (2016) • The group stole $81 million through illegal transfers from the Federal Reserve Bank of New York to accounts in the Philippines. • The theft could have reached $1 billion if the breach had not been discovered at the last minute. 4. Ronin Network Hack (2022) • The group breached the blockchain network of the game Axie Infinity, stealing over $620 million in Ethereum (ETH) and USDC. • This was one of the largest cryptocurrency hacks in history. Hacking Techniques and Tools Lazarus Group employs advanced techniques and diverse methods, including: 1. Social Engineering: Tricking employees into clicking malicious links via emails or social media. 2. Ransomware: Encrypting data and demanding cryptocurrency payments to restore access. 3. Blockchain Breaches: Exploiting vulnerabilities in smart contracts and decentralized finance (DeFi) platforms. 4. Money Laundering: Using cryptocurrency mixers like Tornado Cash to hide the origin of stolen funds. Organizational Structure Little is known about the group’s internal structure due to its secrecy. However, it is believed to operate under North Korea’s Reconnaissance General Bureau (RGB), responsible for intelligence activities and special operations abroad. The group is likely supported by skilled programmers and hackers trained within the country. Global Economic Impact Lazarus Group’s attacks have resulted in billions of dollars in losses and disrupted financial markets worldwide. For example, ransomware attacks like WannaCry harmed healthcare providers and banks, while cryptocurrency thefts undermined investor confidence in blockchain technology. International Response 1. United States: The U.S. Treasury Department has imposed sanctions on individuals and entities linked to Lazarus Group. The FBI has also classified the group as a top cyber threat. 2. United Nations: UN reports indicate that stolen funds are used to finance North Korea’s nuclear weapons program. 3. Cybersecurity Companies: Firms like Kaspersky, Symantec, and CrowdStrike are actively tracking the group’s activities and developing protection systems against its attacks. How to Protect Yourself from Lazarus Group’s Attacks • Enhance Cybersecurity: Use advanced firewalls and antivirus software. • Employee Awareness: Train employees to recognize phishing emails and suspicious links. • Enable Two-Factor Authentication (2FA): Especially for managing cryptocurrency wallets. • Backup Important Data: Keep encrypted backups of critical data. Conclusion Lazarus Group is a clear example of how cybercrime can be used as a political and economic tool. With its advanced skills and diverse strategies, it has become a major player in the world of cybercrime. As the world increasingly relies on digital assets, the group is expected to continue its attacks, making cybersecurity a top priority for individuals and organizations alike. $AXS $ETH $BTC #BybitSecurityBreach #LazarusGroup #SouthKorea #ETH #BTC☀ {spot}(BTCUSDT) {spot}(ETHUSDT) {spot}(AXSUSDT)

Lazarus Group: North Korea’s Tool for Cybercrime and Illicit Financing

Lazarus Group is one of the world’s most dangerous cyber hacking organizations, believed to be operating under the supervision of the North Korean government. It began its activities in the early 2000s and has since carried out high-profile attacks targeting financial institutions, technology companies, and cryptocurrency platforms. Its primary objectives are to fund the North Korean regime, evade international sanctions, and gather intelligence.
Origins and Development
Lazarus Group first appeared on the cyber scene in 2009, but it gained global attention in 2014 after the infamous attack on Sony Pictures. During that attack, the hackers infiltrated the company’s systems, stole sensitive data, and released threatening messages in response to the film “The Interview”, which mocked North Korean leader Kim Jong-un. Since then, the group has diversified its targets, including banks, governments, and cryptocurrency companies.

Group’s Objectives and Motives
1. Illicit Financing:
Due to the economic sanctions imposed on North Korea, the group steals money and cryptocurrencies to fund its nuclear and military programs.
2. Cyber Espionage:
The group gathers intelligence from governments and corporations to strengthen North Korea’s position in international negotiations.
3. Destabilization:
Some attacks are aimed at creating chaos in enemy countries or disrupting their economic systems.

Notorious Cyberattacks
1. Sony Pictures Hack (2014)
• The hackers infiltrated Sony’s systems, leaking unreleased films and sensitive emails.
• The attack caused significant financial losses and raised concerns about online freedom of expression.
2. WannaCry Ransomware Attack (2017)
• A global ransomware attack that infected over 230,000 devices in 150 countries.
• It crippled hospitals, companies, and banks, with hackers demanding ransom in Bitcoin to unlock encrypted files.
3. Bangladesh Central Bank Heist (2016)
• The group stole $81 million through illegal transfers from the Federal Reserve Bank of New York to accounts in the Philippines.
• The theft could have reached $1 billion if the breach had not been discovered at the last minute.
4. Ronin Network Hack (2022)
• The group breached the blockchain network of the game Axie Infinity, stealing over $620 million in Ethereum (ETH) and USDC.
• This was one of the largest cryptocurrency hacks in history.

Hacking Techniques and Tools

Lazarus Group employs advanced techniques and diverse methods, including:
1. Social Engineering: Tricking employees into clicking malicious links via emails or social media.
2. Ransomware: Encrypting data and demanding cryptocurrency payments to restore access.
3. Blockchain Breaches: Exploiting vulnerabilities in smart contracts and decentralized finance (DeFi) platforms.
4. Money Laundering: Using cryptocurrency mixers like Tornado Cash to hide the origin of stolen funds.

Organizational Structure

Little is known about the group’s internal structure due to its secrecy. However, it is believed to operate under North Korea’s Reconnaissance General Bureau (RGB), responsible for intelligence activities and special operations abroad. The group is likely supported by skilled programmers and hackers trained within the country.

Global Economic Impact

Lazarus Group’s attacks have resulted in billions of dollars in losses and disrupted financial markets worldwide. For example, ransomware attacks like WannaCry harmed healthcare providers and banks, while cryptocurrency thefts undermined investor confidence in blockchain technology.
International Response
1. United States: The U.S. Treasury Department has imposed sanctions on individuals and entities linked to Lazarus Group. The FBI has also classified the group as a top cyber threat.
2. United Nations: UN reports indicate that stolen funds are used to finance North Korea’s nuclear weapons program.
3. Cybersecurity Companies: Firms like Kaspersky, Symantec, and CrowdStrike are actively tracking the group’s activities and developing protection systems against its attacks.
How to Protect Yourself from Lazarus Group’s Attacks
• Enhance Cybersecurity: Use advanced firewalls and antivirus software.
• Employee Awareness: Train employees to recognize phishing emails and suspicious links.
• Enable Two-Factor Authentication (2FA): Especially for managing cryptocurrency wallets.
• Backup Important Data: Keep encrypted backups of critical data.
Conclusion
Lazarus Group is a clear example of how cybercrime can be used as a political and economic tool. With its advanced skills and diverse strategies, it has become a major player in the world of cybercrime. As the world increasingly relies on digital assets, the group is expected to continue its attacks, making cybersecurity a top priority for individuals and organizations alike.
$AXS $ETH $BTC
#BybitSecurityBreach #LazarusGroup #SouthKorea #ETH #BTC☀
Викрито хакера Bybit – крадіжка на суму 1,5 мільярда доларів відслідковується компанією Lazarus GrouЗа даними Arkham Intelligence, організатор зламу Bybit на суму 1,5 мільярда доларів був ідентифікований, і винуватцем є не хто інший, як Lazarus Group, сумнозвісний північнокорейський синдикат кіберзлочинців. 🔎 Що ми знаємо на даний момент: 🔹 Lazarus Group має історію великих криптовалютних крадіжок, відмиваючи мільярди через складні блокчейн-транзакції. 🔹 Викрадені кошти переміщуються через кілька гаманців, що ускладнює повернення. 🔹 Влада та аналітики блокчейну зараз відстежують активи, щоб запобігти ліквідації. ⚠️ Що далі? Ця атака посилює потребу в більш сильних заходах криптобезпеки та глобальній співпраці для боротьби з кіберзлочинністю. Чи Bybit поверне втрачені кошти, чи це ще одна загадка на мільярд доларів? 💬 Що ви думаєте про останнє пограбування криптовалюти? Залиште свої думки нижче! 👇 👉 Слідкуйте за новинами про криптовалюту в реальному часі! – Мухаммад Еджаз #BybitHack #CryptoSecurity #LazarusGroup #CyberCrimeFighter #BlockchainForensics 🚨

Викрито хакера Bybit – крадіжка на суму 1,5 мільярда доларів відслідковується компанією Lazarus Grou

За даними Arkham Intelligence, організатор зламу Bybit на суму 1,5 мільярда доларів був ідентифікований, і винуватцем є не хто інший, як Lazarus Group, сумнозвісний північнокорейський синдикат кіберзлочинців.

🔎 Що ми знаємо на даний момент:
🔹 Lazarus Group має історію великих криптовалютних крадіжок, відмиваючи мільярди через складні блокчейн-транзакції.
🔹 Викрадені кошти переміщуються через кілька гаманців, що ускладнює повернення.
🔹 Влада та аналітики блокчейну зараз відстежують активи, щоб запобігти ліквідації.

⚠️ Що далі?
Ця атака посилює потребу в більш сильних заходах криптобезпеки та глобальній співпраці для боротьби з кіберзлочинністю. Чи Bybit поверне втрачені кошти, чи це ще одна загадка на мільярд доларів?

💬 Що ви думаєте про останнє пограбування криптовалюти? Залиште свої думки нижче! 👇

👉 Слідкуйте за новинами про криптовалюту в реальному часі! – Мухаммад Еджаз
#BybitHack #CryptoSecurity #LazarusGroup #CyberCrimeFighter #BlockchainForensics 🚨
🚨🚨🚨 There was no code exploit, no leaked private keys. Bybit’s own multisig signers approved the transactions. They thought they were signing a routine transfer. Instead, they were handing over their entire cold wallet... But that raises a terrifying question. How did Lazarus know exactly who to target? A multisig wallet requires multiple signers. If even one refused to sign, the hack would fail. But they all signed. That means Lazarus didn’t just hack Bybit. They knew who to manipulate. There are only a few ways to get that kind of information. 🚩 Inside job – Someone leaked the signer list. 🚩 Social engineering – Lazarus studied their emails and behavior. 🚩 Device compromise – One or more signers were infected with malware. This means other exchanges are at risk, too... Lazarus stole 0.42% of all Ethereum It means they own more than the Ethereum Foundation, more than Vitalik Buterin and more than Fidelity. Advice: Keep your money on multiple wallets, not on exchanges #BybitSecurityBreach #LazarusGroup
🚨🚨🚨 There was no code exploit, no leaked private keys. Bybit’s own multisig signers approved the transactions. They thought they were signing a routine transfer. Instead, they were handing over their entire cold wallet...

But that raises a terrifying question. How did Lazarus know exactly who to target?

A multisig wallet requires multiple signers. If even one refused to sign, the hack would fail. But they all signed.

That means Lazarus didn’t just hack Bybit. They knew who to manipulate. There are only a few ways to get that kind of information.

🚩 Inside job – Someone leaked the signer list.
🚩 Social engineering – Lazarus studied their emails and behavior.
🚩 Device compromise – One or more signers were infected with malware.

This means other exchanges are at risk, too...

Lazarus stole 0.42% of all Ethereum

It means they own more than the Ethereum Foundation, more than Vitalik Buterin and more than Fidelity.

Advice:
Keep your money on multiple wallets, not on exchanges

#BybitSecurityBreach #LazarusGroup
Miss Sara Bellum
·
--
#BenZhou now live on X

#BybitSecurityBreach
Ak chcete preskúmať ďalší obsah, prihláste sa
Pripojte sa k používateľom kryptomien na celom svete na Binance Square
⚡️ Získajte najnovšie a užitočné informácie o kryptomenách.
💬 Dôvera najväčšej kryptoburzy na svete.
👍 Objavte skutočné poznatky od overených tvorcov.
E-mail/telefónne číslo