FBI Confirms that North Korea was Behind $41 Million Stake.com Exploit 

TRM InsightsInsights
FBI Confirms that North Korea was Behind $41 Million Stake.com Exploit 

This week the FBI issued a release confirming that the theft of approximately $41 million in crypto assets from Stake.com, an online casino and betting platform, was the work of North Korea’s Lazarus Group.  Lazarus stole these assets from Stake-controlled addresses on Ethereum, Binance Smart Chain (BSC), and Polygon blockchains  and, as of yesterday, had moved them into the 40 crypto addresses identified in the FBI’s press release.

TRM's on-chain analysis of the hack and the post-theft movement of funds confirms DPRK involvement. The ETH and BSC assets have, for the most part, been swapped into unfreezable native assets but remain parked. The Polygon/MATIC were swapped and bridged via Squid Router. Those swaps generally went from MATIC to USDT or USDC and were moved to Avalanche. On Avalanche, they were swapped into wrapped BTC, then bridged to Bitcoin, where they now sit, parked. This type of activity is a hallmark of recent Lazarus Group exploits.


Figure 1 shows that the hackers quickly moved the stolen funds across multiple currencies and multiple chains, which can easily be seen on one graph in TRM’s Graph Visualizer


Figure 2 shows a closer look at some of the specific cross-chain swaps from AVAX to Bitcoin

As described in TRM’s recent report on North Korean crypto thefts, the Avalanche Bridge has become North Korean hacker's vehicle of choice to move funds to and from the Bitcoin blockchain.

According to the FBI, and a recent report from TRM, these same DPRK actors are also responsible for several other large scale attacks stealing more than $200 million so far in 2023. According to the FBI, this amount includes, but is not limited to, approximately $60 million of virtual currency from Alphapo and CoinsPaid on or about July 22, 2023, and approximately $100 million of virtual currency from Atomic Wallet on or about June 2, 2023. According to TRM, North Korean cyber actors have stolen over $2 billion in cryptocurrency over the last five years. 

The FBI has previously provided information to the public regarding the DPRK’s attacks against Harmony’s Horizon bridge and Sky Mavis’ Ronin Bridge and put out a cybersecurity advisory on TraderTraitor. In addition, the U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) sanctioned the Lazarus Group in 2019

The FBI's recent spate of public announcements, confirming North Korean involvement in a series of hacks, are part of a larger effort by the US government to arm industry with the knowledge necessary to reject, block, and freeze crypto assets under North Korea's control. By publicizing exactly which addresses North Korea is known to control, the FBI is making it vastly easier for compliance professionals to identify and block suspicious deposits by North Korean hackers.

North Korean cybercriminals continue to evolve

Even in the last year, North Korea’s laundering tactics have shifted. In 2022 North Korean actors tended to move stolen funds quickly to Ethereum based mixer Tornado Cash as the majority of hacks occurred on Ethereum or other EVM blockchains. Funds were then bridged to Bitcoin via the Ren Bridge, where they were laundered again via ChipMixer, a then-popular Bitcoin mixing service. 

However, Tornado Cash was the target of OFAC sanctions in August 2022 and ChipMixer was taken down by law enforcement earlier this year making it more difficult for Lazarus Group to use those mixers. After the Tornado Cash sanctions, earlier this year we saw funds from the Harmony Bridge hack - dormant since their initial laundering through Tornado Cash in the summer of 2022 - suddenly move through a variety of services and offloaded to apparent OTC brokers. This new laundering model essentially involves the bridging of funds to Bitcoin via the Avalanche Bridge - a much lower cost and still-functional alternative to the Ren Bridge - then laundering through Sinbad, a Bitcoin mixer that has emerged as the go-to mixer for North Korean cybercriminals. From there, North Korea’s hackers typically then move funds back to a chain like Avalanche, as we saw in the Stake.com hack, with possible detours to other, more obscure chains like BTTC, before ultimately ending up on the Tron blockchain via the SWFT Bridge, a Tron bridging service most popular with Chinese-speaking crypto users.

Once on Tron, the stolen funds, which have almost always already been converted to USDT, are then apparently liquidated with high-volume, high-value addresses that appear to be most likely be Over-the-Counter brokers, likely servicing illicit Chinese crypto traders.

The Role of Blockchain Intelligence in Following North Korean Stolen Funds

The Stake.com hack, and the post theft movement of funds, is another example of North Korea’s evolved obfuscation techniques in a multi and cross-chain ecosystem. Blockchain intelligence – blockchain data enriched with open-source and proprietary threat intelligence – as represented by TRM Forensics, enables investigators to follow the money in cryptocurrency to ultimately identify threat actors and seize illicit funds including funds stolen and laundered by North Korea.

In 2019, in response to the growing number of blockchains and the growing use of different chains by cybercriminals, TRM Labs introduced cross-chain analytics in TRM Forensics, our flagship tracing tool. This enables investigators to trace funds from multiple blockchains and multiple assets in a single visualization. 

In 2022, TRM identified the growing use of chain-hopping as an obfuscation technique, and  introduced TRM Phoenix, the industry’s first solution for automatically tracing the flow of funds across blockchains through bridges and other services.

As North Korea continues to attack the growing crypto ecosystem, the ability to follow stolen funds is more critical than ever, and, as North Korea’s laundering methodologies evolve so must the tools investigators rely on.



Addresses identified in the FBI release:

0x94f1b9b64e2932f6a2db338f616844400cd58e8a     

0xba36735021a9ccd7582ebc7f70164794154ff30e  

0xbda83686c90314cfbaaeb18db46723d83fdf0c83  

0x7d84d78bb9b6044a45fa08b7fe109f2c8648ab4e  

0xff29a52a538f1591235656f71135c24019bf82e5  

0x0004a76e39d33edfeac7fc3c8d3994f54428a0be

0xbcedc4f3855148df3ea5423ce758bda9f51630aa   

0xe03a1ae400fa54283d5a1c4f8b89d3ca74afbd62   

0x95b6656838a1d852dd1313c659581f36b2afb237   

0xa2e898180d0bc3713025d8590615a832397a8032   

0xa26213638f79f2ed98d474cbcb87551da909685e   

bc1qfesn3jj65fhmf00hh45ueql8je8jae6ep3qk84  

bc1qtalh4l8qc0p2qw70axxjhwu9z7rm93td5sgsl3  

bc1qlq3s8hgczfe62yt94xqasdr5ftuuyrc5kgvpwr

bc1qy78e6ml7f3p438jqrrlzsewx625y0sr7jsesa7

bc1qqa682d2q0wtx5gfpxh4yfl9s4k00ukakl5fpk5

bc1qmqgkxzzfzjqepptw9xzxy03672xg55q559fmvr

bc1qdjmwm8q74r0yx99nghaeu33xdmz3lqnt2uspqv

bc1qrqv5f7jxhp67jcgk9wv5jx4795wlntvhdz2a7j

bc1q82gvk20m08uctmmr97p2mqyxtyh6xf68rwe0t9

bc1q8y9wc2p9444y8r77xtmswxm9qqw90nrpufkx47

bc1qqvpjgaurtnhc8smkmdtwhx9c8207m0prsyxyjx

bc1qfcl8a4ck7uu3phgg5fj6g9servp6f85j3frcd3

bc1qqydp9muxtnxyet3ryfqc467wjtm23f0r7eh5aa

bc1qe4n22sduyylws74aewc6y6g32nglvglqu7hted

bc1qy0ggpxu8f6lta6vf44vervr4py2uu829grj8yh

bc1q32dzmf4t5a3xxvyxn07scgpmjznnz3kwjhw8uc

bc1qkrkxgvp2te3xhgn74c2azt4flf9u05y56kh3a9

bc1q6w7qlaj3mfkgfrxwtvhw45cu86wew7xpjfqcmy

bc1qc593a4d2hznk2ext3k2zmpdrqazlhhh80m4xas

bc1qtnuzecpqaakj0dt855n24dv7u5pme7vyct2cf2

bc1qvjpgxa2g3nvyw2hnclptextllu9dr4vkew8jfp

bc1qg0qygyv3qfp8cjyy99ch9vc9dp876vl8wys67u





This is some text inside of a div block.
Subscribe and stay up to date with our insights

Access our coverage of TRON, Solana and 23 other blockchains

Fill out the form to speak with our team about investigative professional services.

Services of interest
Select
Transaction Monitoring/Wallet Screening
Training Services
Training Services
 
By clicking the button below, you agree to the TRM Labs Privacy Policy.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.