Friday, December 6, 2024
HomecryptocurrencyRussian National Arrested for Laundering Crypto Payments from Lazarus Group

Russian National Arrested for Laundering Crypto Payments from Lazarus Group

Published on

SIEM as a Service

Argentine authorities have arrested a Russian national accused of laundering cryptocurrency payments linked to the notorious North Korean Lazarus Group.

The operation, led by the Argentine Federal Police (PFA) and the San Isidro Specialized Fiscal Unit in Cybercrime Investigations (UFEIC), resulted in the seizure of millions of dollars in assets.

Complex Web of Transactions Unraveled

The investigation, spearheaded by UFEIC lead prosecutors Alejandro Musso and Denis Banchero, uncovered a sophisticated network of illicit transactions.

- Advertisement - SIEM as a Service

Adrian Acosta of the PFA’s Technologic Cybercrime Department played a crucial role in tracing the flow of assets across multiple blockchains.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN -14-day free trial

The suspect reportedly operated a makeshift financial institution from his apartment in Argentina, facilitating the exchange of illicit cryptocurrency for clean crypto and fiat currency.

The subject’s activities extended beyond the Lazarus Group, as he allegedly accepted proceeds from child sexual abuse vendors and terrorist financiers.

Using blockchain intelligence tools provided by TRM Labs, investigators tracked suspicious transfers linked to these criminal activities.

Prosecutor Musso presented compelling evidence to Judge Yadarola, who approved the arrest and asset seizure.

The operation highlights the importance of collaboration between law enforcement and private sector experts in combating cybercrime.

TRM Labs, a private cryptocurrency mapping company, played a pivotal role in the investigation by providing tools that allowed authorities to map and analyze the complex web of transactions.

This partnership underscores the growing need for advanced technological solutions to tackle the illicit use of cryptocurrency.

During the arrest, the PFA seized over $120,000 worth of cryptocurrency and an additional $15,000,000 from the suspect’s properties.

This substantial asset seizure marks a critical step in disrupting cybercriminals’ financial networks and serves as a warning to those who exploit digital currencies for illegal purposes.

The case demonstrates Argentina’s commitment to addressing cybercrime and protecting the integrity of its financial systems.

Protect Your Business with Cynet Managed All-in-One Cybersecurity Platform – Try Free Trial

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Top Five Industries Most Frequently Targeted by Phishing Attacks

Researchers analyzed phishing attacks from Q3 2023 to Q3 2024 and identified the top...

Russian BlueAlpha APT Exploits Cloudflare Tunnels to Distribute Custom Malware

BlueAlpha, a Russian state-sponsored group, is actively targeting Ukrainian individuals and organizations by using...

Russian Hackers Hijacked Pakistani Actor Servers For C2 Communication

Secret Blizzard, a Russian threat actor, has infiltrated 33 command-and-control (C2) servers belonging to...

Sophisticated Celestial Stealer Targets Browsers to Steal Login Credentials

Researchers discovered Celestial Stealer, a JavaScript-based MaaS infostealer targeting Windows systems that, evading detection...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Top Five Industries Most Frequently Targeted by Phishing Attacks

Researchers analyzed phishing attacks from Q3 2023 to Q3 2024 and identified the top...

Russian BlueAlpha APT Exploits Cloudflare Tunnels to Distribute Custom Malware

BlueAlpha, a Russian state-sponsored group, is actively targeting Ukrainian individuals and organizations by using...

Russian Hackers Hijacked Pakistani Actor Servers For C2 Communication

Secret Blizzard, a Russian threat actor, has infiltrated 33 command-and-control (C2) servers belonging to...