On the weekend, Lazarus's group linked to North Korea whitewashed 17,000 eth of the harmony hack he led last year.
Lazarus, the piracy group associated with North Korea, has whitewashed 17,000 eth of the Bridge of Harmony attack he carried out last year. Transfers occurred over the weekend, with the total amount in excess of $27 million.
Cryptographic analysts and Inspector Zachxbt posted information on the movement of funds on January. 29. He first noticed that Lazarus had moved 11,304 ETH, listing the main addresses involved.
Funds were sent to six electoral districts, and ZachXBT noted 14 addresses related to BTC removals. Some scholarships have frozen the funds, but we do not know exactly how many have been frozen since they started to circulate.
Another movement of a country that is known to target the crypto sector, many believing that the funds are being used to finance its nuclear missile program. Numerous analyses related the lazarus group to several attacks on the crypto market.
$63.5M Of the Assault on Earlier Displaced Harmony. This Month
This is the second time funds linked to the Lazarus Group have moved this month. In mid-January, the group moved $63.5 million from the same Harmony Bridge attack. This brings our total laundered amount this month to approximately $93.5 million.
If the group is interested in laundering money, suggesting that North Korea is strengthening its cash flow, more such transfers of funds could occur. The group has made other attacks on the crypto market, and there may well be other funds waiting to be transferred.
Lazarus after Harmony Hack.
The FBI confirmed last week that the Lazarus Group was behind the Harmony bridge attack. At that time, and huobi succeeded in recovering more than 124 btc. Multiple chain bridges have become a prime choice for attacks, which explains all the achievements.
The largest attack last year may have been the Ronin Bridge. The $600 million theft was also committed by the Lazarus Group. It spurred companies to prioritize security, though it appears that attackers will still throw themselves at the DeFi market, searching for exploits.