FBI Reveals North Korea’s Role in Horizon Bridge’s Theft Worth $100M

Last Updated:
FBI Reveals North Korea’s Role in Horizon Bridge’s Theft Worth $100M
  • The FBI announced that the hacker groups Lazarus Group and APT38 are responsible for the $100 million laundering from Harmony’s Horizon Bridge.
  • The blockchain was hacked in June 2022, by which they lost almost $100 million in digital assets.
  • After investigation, it has been revealed that the theft was done for supporting North Korea’s ballistic missile and Weapons of Mass Destruction programs.

The Federal Bureau of Investigation (FBI) declared that the two hacker groups related to the Democratic People’s Republic of Korea (DPRK) — Lazarus Group and APT38 — have been responsible for the theft of $100 million of virtual currency from the US crypto exchange Harmony’s Horizon Bridge.

On June 24 in 2022, Harmony’s Horizon Bridge tweeted informing its community about a theft that has been identified to happen that morning:

Notably, the exchange told that the blockchain had been exploited for $100 million in digital currencies. The firm analyzed that there had been 11 transactions that took place within the blockchain ecosystem between 7:08 am EST and 7:26 am EST.

Yesterday, the FBI National Press released a document revealing the mastermind behind the theft. The document read that the North Korean cyber hackers had stolen $60 million worth of Ethereum (ETH) during the heist, using a privacy protocol called “RAILGUN”.

In addition, the FBI told that the investigation would continue to disrupt North Korea’s mission to use the stolen money to “support North Korea’s ballistic missile and Weapons of Mass Destruction programs.”

FBI Los Angeles and FBI Charlotte—in coordination with the FBI’s Cyber Division… and the FBI’s Virtual Assets Unit—continue to identify and disrupt North Korea’s theft and laundering of virtual currency, which is used to support North Korea’s ballistic missile and Weapons of Mass Destruction programs.

In April 2022, the FBI, in collaboration with the Cybersecurity and Infrastructure Agency (CISA) and the US Treasury Department, issued a joint Cybersecurity Advisory, explaining that the theft was associated with a malware campaign called “TraderTraitor”, led by DPRK.

Disclaimer: The information presented in this article is for informational and educational purposes only. The article does not constitute financial advice or advice of any kind. Coin Edition is not responsible for any losses incurred as a result of the utilization of content, products, or services mentioned. Readers are advised to exercise caution before taking any action related to the company.