• Hacken
  • Blog
  • Discover
  • Advanced Persistent Threat (APT)

Advanced Persistent Threat (APT)

2 minutes

By koriahin

What is Advanced Persistent Threat

An advanced persistent threat (APT) is a broad term used to describe an attack campaign in which a team of intruders establishes an illicit, long-term presence on a network to mine sensitive data.

The biggest and the most notable example of this attack type is the Ronin validator hack.

Such attacks, in most cases, are performed by Nation states, well-funded criminal organizations, and other advanced organized groups.

There are a lot of talks and even confirmations that some advanced groups are actively targeting web3 projects.

The people behind the most concerning APTs usually live in places without extradition treaties with the U.S. and EU, making it harder for them to be prosecuted for their criminal activities. One of the most well-known APTs is Lazarus, widely linked to North Korea.

Malware Types

From the earlier investigations, it is known that Lazarus advanced persistent threat (APT) group targets cryptocurrency companies with trojanized Windows and macOS cryptocurrency applications.

The malicious apps steal private keys and exploit other security vulnerabilities to execute subsequent attacks and fraudulent transactions.

U.S. authorities linked Lazarus to Ronin’s $625 million hack.

Phishing Methods

Lazarus APT targets employees of blockchain companies, using fake job offers.

Lazarus APT uses various communication platforms to send phishing messages to employees of cryptocurrency companies. It targets all employees, but mostly system administrators, software developers, or IT operations (DevOps).

The messages often mimic a recruitment effort and offer high-paying jobs to push the recipients to download malware applications, which the U.S. government refers to as ‘TraderTraitor.

According to CISA, the Lazarus campaign distributes apps developed in JavaScript targeting the Node.js runtime environment using the cross-platform Electron framework. The apps are forked from various open-source cryptocurrency projects. 

How to protect yourself

U.S. agencies published a comprehensive list of tactics, techniques, and procedures (TTPs) and indicators of compromise (IoC) related to Lazarus APT. Moreover, they advised blockchain companies to use various mitigations to minimize Lazarus APT’s threat to the cryptocurrency industry.

According to CISA, blockchain companies should implement security strategies, at least access models and defense-in-depth.

Subscribe
to our newsletter

Be the first to receive our latest company updates, Web3 security insights, and exclusive content curated for the blockchain enthusiasts.

Speaker Img

Table of contents

  • What is Advanced Persistent Threat
  • Malware Types
  • Phishing Methods
  • How to protect yourself

Tell us about your project

Follow Us

Read next:

More related
  • Blog image
    zkEVM: Unlocking Scalability for Ethereum with Zero-Knowledge Proofs

    7 min read

    Discover

  • Blog image
    ERC-404 Under Spotlight

    11 min read

    Discover

  • Blog image
More related →

Trusted Web3 Security Partner