North Korea’s Lazarus Group Leads Spear Phishing Crypto Attacks

Lazarus Group's Spear Phishing Campaigns Target Cryptocurrency Sectors Amid Rising AI-Driven Cyberattack Threats

  • Lazarus Group led spear phishing attacks to steal funds across multiple sectors, including cryptocurrency, over the past year.
  • Spear phishing involves sending targeted fake emails that imitate trusted sources to gain access to sensitive information.
  • Recommended defenses include VPN use, multifactor authentication, regular software updates, and staff education.
  • Emerging technologies like AI are expected to increase the sophistication of such cyberattacks.

North Korean state-backed Hackers from the Lazarus Group primarily used spear phishing over the last year to steal money, particularly targeting cryptocurrency and financial sectors. Spear phishing is a targeted attack method using deceptive emails disguised as legitimate invitations or requests to capture sensitive data, according to AhnLab’s November 2025 report. The group was the most frequently identified Hacking entity in post-attack analyses conducted between October 2024 and September 2025.

- Advertisement -

The Lazarus Group is believed to be behind major hacks such as the $1.4 billion Bybit breach on February 21, 2025, and a $30 million exploit of South Korean exchange Upbit. Spear phishing requires attackers to research targets and impersonate trusted contacts, allowing them to steal credentials, install Malware, or access secure systems.

Cybersecurity company Kaspersky defines spear phishing as a more precise phishing technique that involves extensive attacker research, as explained on their resource page. Their recommended protections include encrypting online activity via VPNs, minimizing the sharing of personal information, verifying communications through alternate channels, and enabling multifactor or biometric authentication.

In addition to the Lazarus Group, other North Korean-linked hacking groups like Kimsuky and TA-RedAnt also contributed to cyberattack activity, with 27 and 17 disclosures respectively, per AhnLab. To reduce risks, companies are advised to implement a “multi-layered defense system” consisting of frequent security audits, up-to-date software patches, and employee training.

Individual users are encouraged to use multifactor authentication, keep security software current, avoid opening suspicious attachments or URLs, and download only from trusted sources. Looking ahead, AhnLab warns Artificial Intelligence will enable attackers to craft more convincing phishing emails and websites, use varied code to bypass detection, and increase spear phishing effectiveness through technologies such as deepfakes. The evolving threat landscape calls for heightened attention to data protection and leak prevention measures.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Corvex Lands Nvidia H200 GPU Lease for Battery AI R&D to IPO

Corvex signed a long-term lease to deploy NVIDIA H200 GPUs for an AI-driven battery...

Kansas bill would create Bitcoin reserve from unclaimed prop

Kansas lawmakers introduced a state-managed Bitcoin and digital assets reserve funded through unclaimed property.The...

Capital One to Buy Brex for $5.15B; Cards Interest Boost now

Capital One will buy Brex for $5.15 billion in a deal set to close...

Sen. Lummis says CLARITY Act unites crypto, urges quick vote

Senator Cynthia Lummis says renewed alignment across the crypto industry has boosted momentum for...

Negative XRP Funding Mirrors Past Setups Ahead of Rally Soon

XRP perpetual funding rates on Binance have been negative recently, signaling a bearish derivatives...
- Advertisement -

Must Read

The Best Bitcoin Casinos of 2025: An Expert’s Data-Driven Guide

Key TakeawaysA Deep Dive into the Top Bitcoin Casinos of 2025Bitcoin Casino Comparison Table1. Stake.com: Best for Variety & Integrated Sports Betting2. BC.Game: Best...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!