Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire Network, powered by N2K. Is your AppSec program actually reducing risk?
Zach Edwards (0:17)
Developers and AppSec teams drown in critical.
Dave Bittner (0:21)
Alerts, yet 95% of fixes don't reduce real risk. Why? Traditional tools use generic prioritization and lack the ability to filter real threats from noise. High impact threats slip through and surface in production, costing 10 times more to fix. Ox Security helps you focus on the 5% of issues that truly matter before they reach the cloud. Find out what risks deserve your attention in 2025. Download the Application Security Benchmark from AUX. Hello everyone and welcome to the Cyberwires Research Saturday. I'm Dave Buettner and this is our weekly conversation with researchers and analysts tracking down the threats and vulnerabilities, solving some of the hard problems, and protecting ourselves in our rapidly evolving cyberspace. Thanks for joining us.
Zach Edwards (1:32)
This report that we did really came on the heels of the $1.4 billion Bybit hack. And our team of course went when we saw this news, along with every other researcher in the industry, we immediately said, my goodness, that's the largest heist that's ever existed in crypto. Is there anything that we can see within this hack to figure out additional details or pivot into other parts of their infrastructure?
Dave Bittner (1:57)
That's Zach Edwards, a researcher at Silent Push. The research we're discussing today is titled New Lazarus Group Infrastructure Acquires Sensitive intel related to $1.4 billion Bybit hack and Past Attacks.
Zach Edwards (2:19)
And so we essentially started to immediately just look for any domains that mentioned Bybit that were registered recently. And so our process was rather elementary at the start of it, but almost immediately we had a hit that there was a domain bybit-assessment.com that was registered just hours before the attack supposedly occurred. And so our team started looking into this domain and immediately in the WHOIS records there was an email address exposed which actually had been used in other Lazarus North Korean hacker attacks in the past. And so our team immediately started to wonder, is this domain, which is registered by a threat actor, associated to this North Korean group? Was this actually the domain that was used in the heist? And what was quite interesting about our early findings was that this domain was actually being used by a different North Korean threat actor, not the North Korean threat actor who did the heist against bybit? And so just to simplify this a little bit, North Korea has number of hacking groups. They're all sort of classified under this Lazarus name. And then under Lazarus there are subgroups and the group that did the billion dollar Heist is an organization known as Trader Trader, which is a mouthful, but essentially this group is going after large crypto organizations. They're doing these complicated hacks, supply chain breaches, and they've been behind similar crypto heists in the past. But this domain that we had found that was registered just hours before the Bybit hack was actually a separate group called Contagious Interview. And so what's particularly interesting about this is that across these different North Korean hacker groups, they're targeting the same companies. And so as we started to get into more details about what Contagious Interview infrastructure we were looking at, we realized that this was actually going to create an opportunity for us to understand other North Korean threat actors as well. So not just the Contagious Interview subgroup, but potentially the other attackers and campaigns that they may be launching. And so, in short, our team was looking into this new domain that was registered by a Contagious Interview Lazarus subgroup. And we found a few pivots where this domain was connected into a couple of others through Server and Whois Commonalities. And one of the domains that we pivoted into was wide open. They'd left all of their code, all their infrastructure, just waiting for anyone to download it. And so our team immediately grabbed those resources and we were essentially able to get logs of these North Korean threat actors testing their own infrastructure and not only exposing email addresses that they use for this testing, but IP addresses that they're using to communicate, to basically communicate with this infrastructure. And so this, from one tiny pivot or one little investigation into can we find anything on the Bybit hack, eventually led us into what we have now is the actual code from one of these North Korean threat actor groups and their infrastructure logs.
![Bybit’s $1.4B breach. [Research Saturday] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F2d3b8b1c-1179-11f0-a7e8-137b8c27cdc2%2Fimage%2F95b72a93c2ffaf8ff900d662a9bd3735.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)