Months after being put on the SDN list, OFAC announced that Tornado Cash is linked to North Korea's nuke program in an effort to stomp Pyongyang's illegal weapons advancements.
Law enforcement authorities in Japan have published a public attribution statement claiming Lazarus has been mainly using phishing tactics to target digital asset business in Japan.
South Korea doubles down on efforts to track the origins of illegal virtual currency transactions as the U.S. warns of sanctions for those involved, with many fearing are banks from Seoul.
Using the right blockchain analysis tools and assigning experienced field investigators from the public and private sectors are key to combatting cybersecurity threats, Chainalysis finds.
Mandiant Inc., a cyber threat defense solutions provider, found that the hackers aim to gather intelligence about these firms' upcoming trends and gain access to their internal operations.
The U.K. national is detained in Saudi under the request of the U.S. government after they were identified as having partnered with Ethereum developer Virgil Griffith to organize a North Korea event.
The FBI traced the funds after a report filed by the Kansas medical center. The bureau identified the malware used in hijacking the servers as a strain called "Maui."
According to Elliptic, the methods used by the hackers in carrying out the hack and laundering the funds are reminiscent of other incidents that have been linked to the Lazarus Group.
According to the three U.S. departments, the North Koreans allegedly use false identities and VPNs to conceal their identities and usually ask for payments in digital assets.
According to reports, the digital assets exchange executive named Lee was recruited by a North Korean agent who paid him $600,000, Lee then recruited an army captain by paying him $38,000.
If found guilty of the charges, Alejandro Cao de Benos and Christopher Emms faces up to 20 years in prison. Currently, both individuals remain at large.