The FBI continues to combat malicious cyber activity, including the threat posed by the Democratic People’s Republic of Korea (DPRK) to the U.S. and our private sector partners. Through our investigation, we were able to confirm that the Lazarus Group (also known as APT28) cyber actors associated with the DPRK, are responsible for the theft of $100 million of virtual currency from Harmony’s Horizon bridge reported on June 24, 2022.
FBI Los Angeles and FBI Charlotte—in coordination with the FBI’s Cyber Division, the United States Attorney’s Office for the Central District of California, the United States Attorney’s Office for the District of Columbia, the National Cryptocurrency Enforcement Team, the National Security Division’s Counterintelligence and Export Control Section, and the FBI’s Virtual Assets Unit—continue to identify and disrupt North Korea’s theft and laundering of virtual currency, which is used to support North Korea’s ballistic missile and Weapons of Mass Destruction programs.
On Friday, January 13, 2023, North Korean cyber actors used RAILGUN, a privacy protocol, to launder over $60 million worth of ethereum (ETH) stolen during the June 2022 heist. A portion of this stolen ethereum was subsequently sent to several virtual asset service providers and converted to bitcoin (BTC).
Some of these funds were frozen in coordination with some virtual asset service providers. The remaining bitcoin subsequently moved to a group of addresses the FBI has confirmed.
In conjunction with the Cybersecurity and Infrastructure Security Agency (CISA) and the U.S. Treasury Department, the FBI published a joint Cybersecurity Advisory describing a malware campaign dubbed “TraderTraitor” that the DPRK used in the Harmony intrusion.
The FBI will continue to expose and combat the DPRK’s use of illicit activities—including cybercrime and virtual currency theft—to generate revenue for the regime. If you have any information to provide, please contact your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or [email protected]