Bitcoin
Separating fact from fiction – Cointelegraph Magazine
Published
3 Monaten agoon
By
The Democratic People’s Republic of Korea is widely considered to be a state sponsor of cryptocurrency hacking and theft. While multiple United States presidents have attempted to stifle the growth of North Korean nuclear energy development through a series of economic sanctions, cyber warfare is a new phenomenon that can’t be dealt with in a traditional way.
Unfortunately for the crypto industry, DPRK has taken a liking to digital currencies and seems to be successfully escalating their operations around stealing and laundering cryptocurrencies to bypass crippling economic sanctions that have led to extreme poverty in the pariah state.
Some evidence suggests that Pyongyang has racked up well over two billion U.S. dollars from ransomware attacks, hacks, and even stealing crypto directly from the public through a spectrum of highly sophisticated phishing tricks. Sources explain that the regime employs various tactics to convert the stolen funds into crypto, anonymize it and then cash out through overseas operatives. All this activity has been given a name by the United States authorities — “hidden cobra.”
To achieve all this, not only does the operation need to be backed by the state, but many highly trained and skilled people have to be involved in the process to pull off the heists. So, does the DPRK indeed have the means and capability to engage in cyber warfare on a global scale, even as the country’s leadership openly admits that the country is in a state of economic disrepair?
How much exactly have the hackers stolen?
2020 continues the pattern of multiple updates on how much money the DPRK-backed hackers have allegedly stolen. A United Nations report from 2019 stated that North Korea has snatched around $2 billion from crypto exchanges and banks.
Most recent estimates seem to indicate that the figure is around the $1.5 to $2.5 billion mark. These figures suggest that, although the exact data is hard to come by, the hacking efforts are on the rise and are bringing in more funds each year. Furthermore, multiple reports of new ransomware, elaborate hacks and novel ransomware methods, only supports this data.
Madeleine Kennedy, senior director of communications at crypto forensics firm Chainalysis told Cointelegraph that the lower estimate is likely understated:
We are confident they have stolen upwards of $1.5B in cryptocurrency. It seems likely that DPRK invests in this activity because these have been highly successful campaigns.
However, Rosa Smothers, senior vice president at KnowBe4 cyber security firms and a former CIA technical intelligence officer, told Cointelegraph that despite the recent accusations from the United States Department of Justice that North Korean hackers stole nearly $250 million from two crypto exchanges, the total figure may not be as high, adding: “Given Kim Jong Un’s recent public admission of the country’s dismal economic situation, $1.5B strikes me as an overestimate.”
How do the hacking groups operate?
It’s not very clear how exactly those North Korean hacking groups organized and where they are based, as none of the reports paint a definitive picture. Most recently, the U.S. Department of Homeland Security stated that a new DPRK-sponsored hacking group, BeagleBoyz, is now active on the international scene. The agency suspects the gang to be a separate, but affiliated entity to the infamous Lazarus group, which is rumored to be behind several high profile cyber attacks. DHS believes that BeagleBoyz have attempted to steal almost $2 billion since 2015, mostly targeting banking infrastructure such as ATMs and the SWIFT system.
According to Ed Parsons, managing director UK of F-Secure, “The ‘BeagleBoyz’ appears to be the U.S. government name for a recent cluster of activity targeting financials in 2019/2020,” adding that it’s unknown if the unit is new or “a new name attached to an initially unattributed campaign that was then later linked to DPRK activity.” He further told Cointelegraph that the malware samples were associated with those under the “hidden cobra” codename, which is a term used by the U.S. government to identify DPRK online activity.
According to the U.S. Security & Infrastructure Security Agency, the hidden cobra-related activity was flagged in 2009 and initially aimed to exfiltrate information or disrupt the processes. The main vectors of attack are “DDoS botnets, keyloggers, remote access tools (RATs), and wiper malware,” targeting the older versions of Microsoft’s Windows and Adobe software. Most notably, the hidden cobra actors make use of the DDoS botnet infrastructure, known as the DeltaCharlie, which is associated with over 600 IP addresses.
John Jefferies, chief financial analyst at CipherTrace, a blockchain forensics company, told Cointelegraph that there are several prominent hacking groups and it’s extremely difficult to differentiate between them. Anastasiya Tikhonova, head of APT Research at Group-IB, a cybersecurity company, echoed the sentiment saying that regardless of the group name attached, the attack vectors are very similar:
“Initial access to targeted financial organizations is gained using spear phishing — either via emails with a malicious document masquerading as a job offer or via personal message on social media from a person pretending to be a recruiter. Once activated the malicious file downloads the NetLoader.”
Additionally, several experts have outlined JS-sniffers as the latest thread to emerge, most commonly linked to the Lazarus group. JS-sniffers is a malicious code which was designed to steal payment data from small online stores, an attack in which all the parties who engaged in the transaction would have their personal information exposed.
Overall, the hacking groups seem to be perfecting the use of a very specific set of malicious tools that center around phishing, whereby unknowing company employees install the infested software which then spreads across the enterprise system targeting the core functions. Most notable examples of suspected activity are the 2014 hack of Sony Pictures and the spread of the WannaCry malware in 2017.
According to various sources most attacks are executed to a high standard with evidence of lengthy preparations. The latest examples from 2020 include a fake trading bot website built to lure in DragonEX crypto exchange employees which raked in $7 million in crypto.
In late June, a report warned that the Lazarus Group will seek to launch a COVID-19 specific attack in which the hackers would impersonate government offices in countries that are issuing pandemic-related financial relief to direct unwary email recipients to a malicious website that would siphon financial data and ask for crypto payments. Additionally, crypto industry job seekers also appear to be under threat as according to a recent report, the hackers are using LinkedIn-like emails to send fake job offers containing a malicious MS Word file.
Most notable are the attacks on the crypto exchanges. Although the exact amount stolen from trading platforms is unknown, several reports by cybersecurity firms and various government agencies put the estimated amount at well over a billion dollars. However, DPRK is only suspected of being behind some of those hacks with only a handful of cases having been tracked back to the regime. The best known example is the hack of the Japanese-based Coincheck exchange during which $534 million in NEM tokens was stolen.
In late August 2020 a statement from the U.S. Department of Justice outlined the details of an operation to launder stolen funds through crypto, which was traced back to 2019. It is believed that the North Korean-backed hackers initiated the heist with the support of a Chinese money laundering ring. The two Chinese nationals in question used the “peel chain” method to launder $250 million through 280 different digital wallets, in an attempt to cover the origin of the funds.
According to Kennedy, DPRK-linked hacking groups are indeed becoming more sophisticated at hacking and laundering: “Specifically, these cases highlighted their use of “chain hopping,” or trading them into other cryptocurrencies such as stablecoins. They then convert the laundered funds into Bitcoin.” Chain hopping refers to a method where traceable cryptocurrencies are converted into privacy coins such as Monero or Zcash.
Addressing the apparent success of the hackers, Parsons believes that:
The small IP space/access to the internet in the DPRK, as well as its less connected nature to global/online systems, arguably offers it an asymmetric advantage in relation to cyber operations.
Speaking to Cointelegraph, Alejandro Cao de Benos, a special delegate of the Committee for Cultural Relations with Foreign Countries of DPRK refuted claims that the country is behind the crypto cyber attacks, stating that it’s a “big propaganda campaign” against the government:
“Usually the DPRK is always portrayed in the media as a backward country without internet access or even electricity. But at the same time they always accuse it of having higher capacity, faster connectivity, better computers and experts than even the best banks or US government agencies. It does not make sense just from a basic logical and technological point of view.”
What’s the size of the alleged cyber force and where are they based?
Another number that various reports and studies fail to agree upon is the size of the cyber force that the North Korean government allegedly backs. Most recently, The U.S. Army report “North Korean Tactics” stated that the figure stands at 6,000 operatives, mainly spread across Belarus, China, India, Malaysia, Russia and several other countries, all united under the leadership of a cyber warfare unit called “Bureau 121.”
Parsons believes that the number was most likely derived from previous estimates obtained from a defector who fled DPRK in 2004, although conceding that: “The figure may also have been generated from internal U.S. intelligence that is not publicly attributable.” Tikhonova agreed that it’s hard to assess the size of the force: “Different reports can give a clue to the regime’s ‘hiring’ strategy,” she said, continuing that:
“The North Koreans have been allegedly attracting students from universities. In addition, some of the North Korean hackers were recruited while working for IT companies in other countries. For example, Park Jin Hyok, an alleged member of the Lazarus APT wanted by the FBI, worked for the Chosun Expo IT company based in Dalian, China.”
Smothers was more skeptical of the report’s conclusion, however stating that: “This is consistent with reporting from South Korea’s Defense Ministry who had, just a few years ago, estimated their number at 3,000,” adding that if anyone has such information, it would be South Korea. Addressing the question of how the set cyber force is organized and where it’s based, she also agreed that most hackers would be stationed around the world “given the limited bandwidth in North Korea.”
Jefferies also believes that “North Korean hackers are based all around the world — a privilege afforded to very few in the country,” also adding that in most cases, hacks attributed to North Korea are not conducted by hackers-for-hire. Tikhonova provided a possible reason behind both assertions, saying:
It is unlikely that they would give someone access to their list of potential targets or their data given the sensitivity of the operations, so those are carried out by North Koreans themselves.
What can be done to stop the hackers?
It seems that, so far, identifying the movement of money and uncovering some of the third parties is the only thing that has been done successfully — at least in public. One report by BAE systems and SWIFT has even outlined how the funds stolen by the Lazarus Group are processed through East Asian facilitators, eluding the Anti-Money Laundering procedures of some crypto exchanges.
Jeffreries believes that more needs to be done in that regard: “Authorities need to enact and enforce crypto anti-money laundering laws and Travel Rule regulation to ensure that suspicious transactions are reported.” He also stressed the importance of authorities ensuring that virtual asset service providers deploy adequate Know Your Customer measures:
“One known tactic used by North Korean-backed professional money launderers was the use of fake IDs to create accounts at multiple exchanges. The exchanges with stronger KYC controls were better able to detect these fraudulent accounts and prevent the abuse of their payment networks.”
According to the information revealed by the U.S. DOJ, those laundering the money target exchanges with weaker KYC requirements. Although no platforms have been named, these are likely smaller exchanges operating solely in the Asian market. There’s also the issue of some authorities being unable to do take action when it comes to companies that are not under their jurisdiction, as Smothers points out:
“The global nature of these exchanges, as well as the Chinese OTC (over-the-counter cryptocurrency trading) actors, limits our Justice Department’s ability to take swift action. For instance, the DOJ filed a civil action in March, but the Chinese OTCers pulled all funds out of the target accounts within hours of the DOJ’s filing.”
But what complicates things even further is that according to a Chainalysis report from 2019, those laundering the funds may take months — if not years — to complete the process. According to the authors supported the notion that attacks were for financial benefit as the stolen crypto could sit idle in wallets for up to 18 months prior to being moved due to fear of detection.
However, researchers believe that since 2019, the tactics employed by the criminals have changed to accommodate faster withdrawals through the extensive use of cryptocurrency mixers to obscure the source of the funds. Kennedy explained further:
“We can’t speak to the reasons behind their techniques, but we have noticed that these actors often move money around from one hack, then stop to concentrate on moving money around from another hack, and so on. […] Cryptocurrency exchanges were critical in the investigations, and the public and private sectors are working together to address the threats posed by these hackers.”
How serious is the issue?
When discussing DPRK, it’s hard to avoid the topics of human rights violations and the nuclear program that the country reportedly continues to run, despite tightening economic sanctions.
In that sense, the dynastic government guided by supreme leader Kim Jong Un is seen to be of considerable threat to the world: But now, it’s not just because of the regime’s nuclear aspirations. Even though cybersecurity attacks in most cases are not directly harmful to a human life, these efforts provide a steady stream of income for the state to continue strengthening its ideals and goals.
But, perhaps more worryingly, is that, according to several commentators cited in this article, the hacking groups that seem to be backed by the North Korean regime continue to expand and branch out their operations since their methods are proving to be exceedingly successful. Jefferies for one believes that: “It’s not a surprise that they would continue to build upon and invest in their cyber capabilities.”
You may like
-
Launching crypto into orbit – Cointelegraph Magazine
-
Former CEOs grapple with DAO governance – Cointelegraph Magazine
-
Cointelegraph Consulting: Institutions are bullish on Bitcoin, but is retail?
-
Blockchain’s Role in Empowering Survivors – Cointelegraph Magazine
-
Cointelegraph to auction digital collectibles inspired by famous works of art
-
6 Questions for Sheila Warren of the World Economic Forum – Cointelegraph Magazine
Bitcoin
The next decade of sustainable crypto innovation begins today
Published
47 Minuten agoon
Dezember 29, 2020By
Since the creation of the first cryptocurrency over a decade ago, many have often been skeptical of their legitimacy, with some even dismissing them as a fraud. But in 2020, this paradigm seemed to have shifted. What has emerged is a shared recognition that Bitcoin (BTC) and other digital assets are here to stay and that they will play a key role in the future of global finance.
This is not some far-fetched vision reserved to crypto-anarchists — financial actors that were traditionally wary of cryptocurrencies are now expressing confidence in their disruptive potential. JPMorgan and Goldman Sachs, for instance, have recently reversed their initial opposition to cryptocurrencies, becoming some of the latest to offer new banking services and offerings for the digital assets market.
Related: Will PayPal’s crypto integration bring crypto to the masses? Experts answer
As optimism and appreciation for the long term potential of cryptocurrencies continue to grow, so will the opportunities for revenue expansion among players within the ecosystem. Bitcoin miners, for instance, saw their topline figures surge by close to 50% on a month-on-month basis in November, as Bitcoin prices rallied more than 60% to above $18,000 over the same time period. Yet, in a highly competitive environment, success has largely been confined to a few industry leaders while remaining elusive to many.
For miners, gaining access to highly advanced mining equipment — one that boasts the highest level of power and cost efficiencies, and the fastest processing speeds — remains the single most critical factor to securing a competitive edge.
Related: Cryptocurrency mining profitability in 2020: Is it possible?
The evolution
The crypto mining industry has undergone a succession of substantial transformations to arrive at today’s advanced technical state. In its early days, mining was done using simple computers without any complex or high-powered devices. General-purpose central processing units, or CPUs, were all it took to produce Bitcoin. This led to a rapid expansion of the Bitcoin network, as the allure of easy money prompted an influx of new entrants — so much so that these first-generation miners were unable to keep pace with demand, rendering them obsolete in just a year’s time.
Graphics processing units were introduced next and made mining Bitcoin more efficient and profitable. Combining several GPUs became a common sight, as miners sought to further increase their mining performance and capabilities while maximizing gains. Despite these advancements, second-generation miners did not stand the test of time due to their high energy consumption and lack of long-term efficacy.
In 2011, field-programmed gate arrays, or FPGAs, emerged as the next logical step of progression. They were fast, highly energy-efficient, offered better performance and easier cooling than their predecessors. Nonetheless, FPGA miners were short-lived and eventually replaced by ASICs, which, until today, remain the dominant technology for the Bitcoin mining industry. Designed, built and optimized for the sole purpose of mining, ASICs are recognized for their superior harmonization of power consumption, performance and cost — around a million times more energy efficient and 50 million times faster in mining Bitcoin than the CPUs used in 2009.
The road ahead
Indeed, crypto mining has come a long way. Aside from performance-related developments, there have also been notable improvements to the environmental aspect of the technology, such as higher energy efficiency and faster hash rates. With a growing emphasis on sustainability, this is a trend likely to continue as chip design providers look to develop innovative solutions to cater to this evolving demand.
Two main developmental areas come to mind. First, the reengineering of current mining hardware to radically utilize less energy; and, second, a reprogramming of current mining chips to allow the use of hybrid energy for optimal cost performance.
Reengineering of the current mining hardware. Already, there are several concepts out in the market that are being researched and rigorously put to test — one of them being the use of photonic chips to perform computing. In theory, the technology appears promising, with two to three orders of magnitude better energy efficiency over current electronic processors. Yet, in reality, it remains inconclusive as to whether the power savings are realizable, particularly as Bitcoin scales. Until then, ASICs and their ongoing enhancements will continue to dominate the crypto mining space and lead the charge on energy efficiency in crypto mining.
Reprogramming of the current mining chips. Against common belief, the crypto mining industry is a relatively green one. As of December 2019, Bitcoin was powered by over 70% of renewable electricity. While the benefits of using renewables are undisputed, the truth is that renewables are an intermittent source of energy and are not always reliable for Bitcoin miners, who have a constant energy requirement. Fossil fuel-based power, on the contrary, serves generally as a more steady source of energy. To strike a balance between the sustainability of the industry and sustainability more broadly, a hybrid model can be adopted, whereby renewables are used predominantly as an energy source, with fossil fuel-based power setting in during production shortages. This entails redesigning and reprogramming current mining chips to enable greater ease of toggling between the two variants of energy sources, with no disruption to the mining processes.
As cryptocurrencies continue to rise in prominence, so will the influx of competition from new providers wanting a slice of the pie. Healthy competition can be positive in that it can lead to more innovation that brings greater efficiencies and maturity to the industry. To fully capitalize on the growth of the nascent cryptocurrency market, however, incumbent chip designers will need to invest further into research and development, particularly in areas of energy optimization and power performance.
The views, thoughts and opinions expressed here are the author’s alone and do not necessarily reflect or represent the views and opinions of Cointelegraph.
Nangeng Zhang, also known as NG, is the founder, chairman and CEO of Canaan Inc., a leading provider of supercomputing solutions. While specializing in the field of supercomputing, NG explored the potential of application-specific integrated circuit design, consequently launching the world’s first digital cryptocurrency miner based on ASIC chips and catalyzing the era of ASIC mining.
Bitcoin
Dormant Bitcoin on the move as price volatility rises
Published
2 Stunden agoon
Dezember 29, 2020By
In a period filled with holidays, the cryptocurrency industry refused to take a day off. Strong market performances from Bitcoin (BTC) and some other high profile alt-coins like Ether (ETH,) was offset by the legal action against Ripple by the United States Securities and Exchange Commission. In response, a number of prominent trading platforms, including Coinbase, Crypto.com, and FalconX responded by halting trading or deposits of the XRP token.
The latest findings by Santiment, published in Cointelegraph Consulting’s biweekly newsletter, indicate that the balance of wallets holding dormant BTC over a 365-day period has become more active. Between December 13 and 20, more than 146,620 BTC (~$3.9 billion at the time of writing) that fit this description moved on the blockchain, marking its highest weekly volume since July 2019.
These long-term investors tend to trade based on extensive analysis or intimate market knowledge, which is why intense spikes in dormant Bitcoin tend to be more indicative of larger shifts in market conditions and interim price volatility.
Still, with Coinbase’s high-profile IPO right around the corner, and institutional buying is high, so it’s not unreasonable to expect conditions to remain positive going into 2021. Many investors were considering the possibility of a “Christmas Dump” as $2.3 billion in Bitcoin options contracts were set to expire, the largest ever in a single day. With that event in the rear-view mirror, many investors are now optimistic that the momentum of 2020 will continue into the new year.
Read the full newsletter edition here for more news and signals, complete with detailed charts and images.
Cointelegraph’s Market Insights Newsletter shares our knowledge on the fundamentals that move the digital asset market. With market intelligence from one of the industry’s leading analytics providers, Santiment, the newsletter dives into the latest data on social media sentiment, on-chain metrics, and derivatives.
We also review the industry’s most important news, including mergers and acquisitions, changes in the regulatory landscape, and enterprise blockchain integrations. Sign up now to be the first to receive these insights. All past editions of Market Insights are also available on Cointelegraph.com.
Bitcoin
If History Rhymes, This Indicator Suggests Bitcoin May See a Parabolic Explosion
Published
2 Stunden agoon
Dezember 29, 2020By
- Bitcoin has seen some mixed price action as of late, with bulls being unable to take control of its trend in the time following its rally up to $28,500
- The rejection here was quite intense, and it has yet to show any signs of strength in the time following this occurrence
- The fact that bulls have guarded against any deeper drawback is positive because it invalidates the possibility that this recent high is a blow-off top
- One trader is now noting that there is an incredibly bullish indicator that is flashing for Bitcoin
- He points to the cryptocurrency’s monthly RSI, noting that a monthly close above a specific level that it is nearing is historically followed by parabolic moves higher
- In the past, these movements have had an average return of 1,010%, but their size and length seem to diminish with time
Bitcoin and the entire crypto market have declined over the past 12 hours, which appears to be the direct result of the pressure that XRP is placing on the market due to its latest selloff.
Where the market trends in the mid-term likely won’t depend on XRP, which means that this latest round of selling pressure may mark a knee-jerk reaction from investors.
One analyst is noting that Bitcoin’s monthly RSI is flashing an incredibly bullish sign for where BTC trends next.
Bitcoin Struggles to Gain Momentum Following $28,500 Rejection
At the time of writing, Bitcoin is trading down just over 1% at its current price of $26,700.
The crypto has been trading between the upper-$26,000 region and the lower-$27,000 region throughout the past few days.
It has yet to garner enough buy-side support to break above the heavy resistance laced throughout the lower-$28,000 region. For now, this peak could mark a blow-off top.
Indicator Suggests BTC is About to Go Parabolic
One trader explained in a recent tweet that Bitcoin could be on the cusp of seeing a parabolic move higher in the days and weeks ahead.
He points to the cryptocurrency’s monthly RSI as an indicator for this possibility.
“BTC – Monthly RSI. Monthly candle is about to close above 80. When this happens, bullish trend continues, with an avg. return of 1010.87%. Each cycle is shorter.”

Image Courtesy of il Capo of Crypto. Source: BTCUSD on TradingView.
The coming few days should shed light on Bitcoin’s trend, as continued weakness could confirm $28,500 as a local high and lead to a deeper retrace.
Featured image from Unsplash. Charts from TradingView.
Opyn Upgrade Aims to Add Capital Efficiency and Liquidity to DeFi Options Market
The next decade of sustainable crypto innovation begins today
Crypto enthusiasts could make $122K per year mining Ethereum with this setup
Trending
-
Bitcoin4 Monaten agoBitcoin and cryptocurrency are no hedge for inflation
-
Regulation3 Monaten agoCongress weighs crypto payments and fintech lending in hearing today
-
Bitcoin3 Monaten agoMicroStrategy CEO seems to embrace Bitcoin maximalism
-
Altcoin3 Monaten agoDfinance: Layer 2 Blockchain Network
-
Cryptocurrency4 Monaten agoBank of England is Planing to Adopt Digital Currency
-
Monero9 Monaten agoSophisticated Mining Botnet Identified After 2 Years
-
Market4 Monaten ago
The request could not be satisfied
-
Blockchain3 Monaten agoThe US is number one…in blockchain patents

