The Lazarus Group, a North Korean state-affiliated hacking syndicate, is once again at the center of a major crypto laundering operation. Blockchain security firm CertiK flagged a 400 ETH deposit (worth approximately $750,000) to Tornado Cash on March 13, linking the transaction back to Lazarus’ illicit activities.
“The fund traces to the Lazarus Group’s activity on the Bitcoin network,” CertiK reported, indicating that the hackers are using privacy-focused mixing services to obscure the origin of stolen assets.
Lazarus has been tied to some of the largest cryptocurrency heists in history. The group is directly responsible for the $1.4 billion hack on Bybit in February 2024 and the $29 million breach of Phemex in January. Chainalysis data reveals that North Korean hackers have stolen over $1.3 billion across 47 incidents in 2024 alone, more than double the amount stolen in 2023.
New Lazarus Malware Targets Developers and Wallets
In addition to laundering stolen funds, the Lazarus Group has launched a new malware campaign, according to cybersecurity firm Socket. Researchers discovered six malicious packages designed to infiltrate developer environments, steal credentials, extract crypto data, and install backdoors.
The group’s latest attack method involves exploiting the Node Package Manager (NPM) ecosystem, which is widely used by JavaScript developers. By employing typosquatting techniques—creating package names that closely resemble legitimate libraries—the hackers deceive developers into unknowingly downloading infected dependencies.
A new strain of malware, dubbed “BeaverTail,” was found embedded in these malicious packages. The malware specifically targets cryptocurrency wallets, with a focus on Solana and Exodus wallets. Additionally, it attempts to extract sensitive files from Google Chrome, Brave, and Firefox browsers, while also compromising macOS keychain data.
Growing Threat to the Crypto Ecosystem
While Socket researchers have not definitively attributed this attack to Lazarus, they emphasize that the tactics, techniques, and procedures closely mirror the group’s historical operations. The widespread targeting of crypto exchanges, developer tools, and user wallets demonstrates an increasingly sophisticated approach to cybercrime.
With stolen funds flowing through Tornado Cash, and fresh malware campaigns emerging, Lazarus remains one of the most formidable threats to the crypto industry. Security experts urge developers, wallet users, and exchanges to exercise extreme caution and bolster security measures to mitigate the ongoing risk.