Monday, January 27, 2025
HomecryptocurrencyUS-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

Published on

SIEM as a Service

Follow Us on Google News

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed that the North Korean hacker group Lazarus was using it to launder funds that had been stolen.

Millions of dollars worth of virtual currency from Lazarus Group thefts, such as the Horizon Bridge and Axie Infinity heists, have been processed by Sinbad.

Cybercriminals also utilize Sinbad to disguise transactions connected to unlawful operations like drug trafficking, evading sanctions, buying materials involving child sexual abuse, and other illegal sales on darknet markets.

Document
Protect Your Storage With SafeGuard

Is Your Storage & Backup Systems Fully Protected? – Watch 40-second Tour of SafeGuard

StorageGuard scans, detects, and fixes security misconfigurations and vulnerabilities across hundreds of storage and backup devices.

Sinbad is behind Several of the Largest Crypto Hacks 

According to the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC), the Lazarus Group prefers Sinbad as a mixing service, and Sinbad is accountable for materially aiding in the laundering of millions of dollars in virtual currency that has been stolen. 

By hiding the origin, destination, and counterparties of illegal transactions, Sinbad, which runs on the Bitcoin blockchain, indiscriminately helps them along.

Some industry insiders believe that Sinbad is the replacement for the Blender.io mixer, which OFAC assigned to supply mixing services to the Lazarus Group.

A substantial amount of the $100 million in virtual currency taken from Atomic Wallet users on June 3, 2023, was laundered through Sinbad.

A sizable amount of virtual money from the $620 million Axie Infinity heist in March 2022 and the $100 million Horizon Bridge crime in June 2022 was also laundered through the usage of Sinbad.

Over the course of its more than 10 years of operation, the Lazarus Group is thought to have committed many crimes totaling over $2 billion in digital assets.

Details of Sanctions

As a result of the action on Wednesday, Sinbad’s U.S. assets are frozen, and Americans are typically prohibited from interacting with it. Individuals who use the mixer in specific ways run the danger of facing penalties.

According to a notice on its website, the service has been taken down as part of a coordinated law-enforcement operation, including the FBI and organizations in Finland and the Netherlands.

“Mixing services that enable criminal actors, such as the Lazarus Group, to launder stolen assets will face serious consequences,” said Deputy Secretary of the Treasury Wally Adeyemo. 

“The Treasury Department and its U.S. government partners stand ready to deploy all tools at their disposal to prevent virtual currency mixers, like Sinbad, from facilitating illicit activities. While we encourage responsible innovation in the digital asset ecosystem, we will not hesitate to take action against illicit actors.”

Experience how StorageGuard eliminates the security blind spots in your storage systems by trying a 14-day free trial.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

White House Considers Oracle-Led Takeover of TikTok with U.S. Investors

In a significant development, the Trump administration is reportedly formulating a plan to prevent...

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory...

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through...

GitHub Vulnerability Exposes User Credentials via Malicious Repositories

A cybersecurity researcher recently disclosed several critical vulnerabilities affecting Git-related projects, revealing how improper...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

White House Considers Oracle-Led Takeover of TikTok with U.S. Investors

In a significant development, the Trump administration is reportedly formulating a plan to prevent...

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory...

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through...