Lazarus Group Exposed Through Amateur Security Lapses in BitMEX Investigation
BitMEX security researchers have uncovered operational security failures within North Korea's state-sponsored Lazarus Group.
The investigation revealed that at least one hacker accidentally exposed their true IP address in Jiaxing, China.
Researchers gained access to a Supabase database instance used by the cybercrime network for operations.
The analysis highlighted a split between low-skill social engineering teams and sophisticated exploit developers.
This asymmetry suggests the organization has fragmented into separate sub-groups with varying threat capabilities.
The report follows multiple high-profile #hacking incidents and social engineering scams attributed to North Korean agents.
Federal agencies issued warnings in September 2024 about DPRK-backed phishing attempts targeting crypto users.
