If you know anything about a crypto hack, you’ve probably heard of the Lazarus Group.
They’re pretty much the final boss of crypto cybercrime – a North Korean state-backed hacking group responsible for some of the biggest thefts in the industry, including the Bybit hack earlier this year.
They’ve always carried this boogeyman of blockchain, mysterious vibe. But a new BitMEX report pulled back the curtain a bit.
And turns out… they’re not as flawless as some might think.
|
Over time, Lazarus seems to have split into smaller teams, and not all of them are equally skilled. Some are pros. Others – not so much.
Case in point: a BitMEX employee got a message on LinkedIn about joining a crypto project.
If you’ve followed Lazarus’ past scams, you know this is something they’ve done before – so the employee flagged it to the security team.
They were sent a GitHub repo with a Next.js/React project that – surprise – contained malware.
The attacker wanted them to run the code locally, which would’ve let malicious scripts execute on the employee’s computer.
|
Now, here’s what BitMEX found in the code:
-
It used JavaScript’s eval() function, which takes a piece of text and treats it like code. So if it says “delete everything,” your computer will actually try to run that command – and that opens the door for attackers to sneak in harmful code;
-
The malware tried to connect to suspicious URLs to download even more code – the kind of infrastructure Lazarus has used before in past attacks;
-
It collected data like usernames, IP addresses, operating systems, and uploaded all of it to… wait for it… a public Supabase database 😀👍
Yes. Public.
This is like using Google Sheets to store stolen data… and then leaving the spreadsheet unlocked.
|
The BitMEX team took a look and found nearly 900 logs from infected machines.
And in one of them, they caught a big oopsie: a hacker forgot to turn on their VPN and exposed their real location in Jiaxing, China.
Instead of treating this oopsie as a one-off discovery, BitMEX saw an opportunity here – they built a tool to keep checking the database.
This lets BitMEX:
-
Track new infections as they happen;
-
Figure out who’s being targeted – devs, exchange workers, or random users;
-
Watch for repeat mistakes by the hackers (like more IP leaks);
-
Potentially map out patterns – like locations, time zones, or organizational targets.
Lazarus is still dangerous – no doubt about it.
But the more we learn about their tricks (and their mistakes), the easier it becomes to protect people from falling for them.
Now you’re in the know. But think about your friends – they probably have no idea. I wonder who could fix that… 😃🫵 Spread the word and be the hero you know you are! |