BitMEX Uncovers Lazarus Group Security Flaws Exposing IP Addresses

Coin WorldSunday, Jun 1, 2025 5:13 am ET
1min read

BitMEX researchers have uncovered significant security flaws within the operations of North Korea’s Lazarus Group, a state-sponsored cybercrime network notorious for high-profile cryptocurrency hacks. The findings reveal technical missteps that exposed parts of the group’s infrastructure, including IP addresses, an accessible database, and tracking algorithms used in their campaigns.

One of the most notable discoveries was the exposure of a hacker’s real IP address, which was traced back to Jiaxing, China. This rare slip provided a glimpse into the group’s operational tactics and highlighted a potential vulnerability in their otherwise secretive operations. Researchers also gained access to a Supabase database instance used by the attackers, underscoring the group’s evolving use of advanced tools and platforms.

BitMEX’s report suggests a growing divide within the Lazarus Group’s internal structure. The group appears to be fragmented into sub-groups with varying capabilities, ranging from low-skill social engineering teams to more advanced developers creating sophisticated exploits. This fragmentation indicates that while some cells rely on basic tactics to trick users into downloading malware, others deploy complex technical attacks targeting the blockchain and tech sectors.

The findings come at a time when global law enforcement agencies are increasingly concerned about the surge in DPRK-linked cyber activity. In September 2024, the FBI issued a warning about phishing scams using fake job offers to lure crypto users. This warning was later echoed by officials from Japan, South Korea, and the U.S., who labeled Lazarus a threat to financial stability. The international community is now focusing on coordinated strategies to mitigate the damage from the group’s activities.

G7 leaders are expected to address North Korea’s escalating cyberattacks and cryptocurrency thefts at their upcoming summit. The Lazarus Group is believed to be behind a series of major crypto thefts, including a record $1.4 billion heist from exchange Bybit in February. The regime employs various tactics, including rogue IT workers infiltrating crypto firms from within, to further its cyber strategies. In April, Lazarus-linked operatives reportedly set up U.S.-based shell companies to distribute malware to crypto developers, and Kraken recently thwarted an infiltration attempt by a suspected North Korean posing as a job candidate.

BitMEX’s findings offer new insights into the Lazarus Group’s operational vulnerabilities and potential avenues for disruption. As the group remains an active force in the crypto threat landscape, these revelations could play a crucial role in developing effective countermeasures against their activities. The international community’s heightened awareness and coordinated efforts are essential in addressing the growing threat posed by North Korea’s cyber operations.