BlockBeats 消息,2 月 23 日,慢雾创始人余弦发文表示,“通过取证分析与关联追踪,我们确认 CEX 被盗事件攻击者正是朝鲜黑客组织 Lazarus Group,这是一场针对加密货币交易平台的国家级 APT 攻击。”
“攻击者利用 pyyaml 进行 RCE(远程代码执行),实现恶意代码下发,从而控制目标电脑和服务器。这种方式绕过了绝大多数杀毒软件的查杀。在与合作伙伴同步情报后,又获取了多个类似的恶意样本。攻击者的主要目标是通过入侵加密货币交易平台的基础设施,获取对钱包的控制权,进而非法转移钱包中的大量加密资产。”
“慢雾发表总结文章揭示了 Lazarus Group 的攻击方式,还分析了其利用社会工程学、漏洞利用、权限提升、内网渗透及资金转移等一系列战术。同时基于实际案例总结了针对 APT 攻击的防御建议,希望能为行业提供参考,帮助更多机构提升安全防护能力,减少潜在威胁的影响。”
Disclaimer: Investing carries risk. This is not financial advice. The above content should not be regarded as an offer, recommendation, or solicitation on acquiring or disposing of any financial products, any associated discussions, comments, or posts by author or other users should not be considered as such either. It is solely for general information purpose only, which does not consider your own investment objectives, financial situations or needs. TTM assumes no responsibility or warranty for the accuracy and completeness of the information, investors should do their own research and may seek professional advice before investing.