Stop overpaying - start transferring money with Ogvio. Join the waitlist & grab early Rewards NOW! 🎁
Lazarus Group Strikes Again: $1.4 Billion Crypto Heist Exposed by AhnLab
Key Takeaways
- Hackers use spear-phishing emails disguised as lecture invitations or interview requests to steal credentials and install malware;
- Kaspersky recommends VPNs, limited information sharing, source verification, and multifactor authentication to reduce cyber risks;
- AI will soon make phishing attacks harder to detect, which will increase threats from deepfakes and sophisticated evasion techniques.
An investigation by cybersecurity firm AhnLab shows that the Lazarus Group, based in North Korea, relied on spear-phishing throughout the past year to steal digital assets.
Lazarus Group is linked to major crypto-related thefts, including the $1.4 billion Bybit
The attacks employed emails crafted to appear as lecture invites or interview requests, a tactic AhnLab highlights in its November 26 report titled Cyber Threat Trends & 2026 Security Outlook.
Did you know?
Subscribe - We publish new crypto explainer videos every week!
What is a Bitcoin Faucet? Pros & Cons Explained (With Animations)
These targeted messages enabled hackers to gather credentials, install malware, or gain unauthorized access by impersonating trusted communicators.
Kaspersky advised practical steps to guard against such threats. Recommended measures include using a VPN to encrypt connections, avoiding excessive sharing of personal information online, verifying message sources through alternate channels, and enabling multifactor or biometric authentication whenever possible.
For organizations, AhnLab stressed that a multi-layered security strategy is vital. Key actions include conducting routine security audits, keeping systems fully patched, and educating staff on potential attack vectors.
AhnLab also warned that artificial intelligence (AI) will make spear phishing more potent in 2026. Attackers may use AI to craft deceptive emails and websites that are harder to recognize, and to generate modified code that can evade detection.
Fake MON token transfers appeared on Monad’s blockchain explorers two days after launch. What did CTO and co-founder, James Hunsaker, say? Read the full story.