Saturday, February 22, 2025
HomecryptocurrencyRussian National Arrested for Laundering Crypto Payments from Lazarus Group

Russian National Arrested for Laundering Crypto Payments from Lazarus Group

Published on

SIEM as a Service

Follow Us on Google News

Argentine authorities have arrested a Russian national accused of laundering cryptocurrency payments linked to the notorious North Korean Lazarus Group.

The operation, led by the Argentine Federal Police (PFA) and the San Isidro Specialized Fiscal Unit in Cybercrime Investigations (UFEIC), resulted in the seizure of millions of dollars in assets.

Complex Web of Transactions Unraveled

The investigation, spearheaded by UFEIC lead prosecutors Alejandro Musso and Denis Banchero, uncovered a sophisticated network of illicit transactions.

Adrian Acosta of the PFA’s Technologic Cybercrime Department played a crucial role in tracing the flow of assets across multiple blockchains.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN -14-day free trial

The suspect reportedly operated a makeshift financial institution from his apartment in Argentina, facilitating the exchange of illicit cryptocurrency for clean crypto and fiat currency.

The subject’s activities extended beyond the Lazarus Group, as he allegedly accepted proceeds from child sexual abuse vendors and terrorist financiers.

Using blockchain intelligence tools provided by TRM Labs, investigators tracked suspicious transfers linked to these criminal activities.

Prosecutor Musso presented compelling evidence to Judge Yadarola, who approved the arrest and asset seizure.

The operation highlights the importance of collaboration between law enforcement and private sector experts in combating cybercrime.

TRM Labs, a private cryptocurrency mapping company, played a pivotal role in the investigation by providing tools that allowed authorities to map and analyze the complex web of transactions.

This partnership underscores the growing need for advanced technological solutions to tackle the illicit use of cryptocurrency.

During the arrest, the PFA seized over $120,000 worth of cryptocurrency and an additional $15,000,000 from the suspect’s properties.

This substantial asset seizure marks a critical step in disrupting cybercriminals’ financial networks and serves as a warning to those who exploit digital currencies for illegal purposes.

The case demonstrates Argentina’s commitment to addressing cybercrime and protecting the integrity of its financial systems.

Protect Your Business with Cynet Managed All-in-One Cybersecurity Platform – Try Free Trial

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...