Bitrefill blames North Korea-linked Lazarus hacker group for compromising 18,500 purchase records

👁 0 views



Cryptocurrency funds and present card platform Bitrefill has blamed the North Korea-linked hacking group Lazarus for a cyberattack on March 1, 2026, that compromised components of its infrastructure and cryptocurrency wallets.

The attackers gained entry to manufacturing keys, transferred funds from sizzling wallets, and uncovered 18,500 purchase records containing emails, cost addresses, and IP addresses.

Approximately 1,000 records included encrypted usernames. Affected customers have been notified. Operations have resumed, with the corporate saying to cowl losses from operational capital. The incident underscores the significance of vigilance relating to crypto and on-chain safety.

The modus operandi included malware, on-chain tracing and reused IP and e-mail addresses and was much like earlier assaults attributed to North Korea’s Lazarus Group, also called Bluenoroff, the corporate mentioned in an in depth report on X.

The Lazarus Group has beforehand focused crypto tasks together with Ronin Network, Harmony’s Horizon Bridge, WazirX, and Atomic Wallet.

How the assault unfolded

It all started with with a compromised worker laptop computer, which uncovered legacy credentials and allowed attackers to entry Bitrefill’s broader infrastructure, together with components of its database and cryptocurrency wallets.

The breach rapidly grew to become obvious when the corporate seen uncommon buying patterns amongst sure suppliers, signaling that attackers have been exploiting its present card stock and provide chains. The agency additionally famous that attackers have been draining some sizzling wallets and transferring funds to their very own addresses, following which, the system was taken offline to include the harm.

“Bitrefill operates a global e-commerce business with dozens of suppliers, thousands of products, and multiple payment methods across many countries. Safely switching all these things off and bringing them back online is not trivial,” the corporate mentioned in a press release.

Since the incident, Bitrefill has been working with safety researchers, incident response groups, on-chain analysts, and regulation enforcement to research the breach.

Customer knowledge influence

Hackers accessed a small set of purchase records, roughly 18,500, containing

Bitrefill mentioned there is no such thing as a proof that buyer knowledge was a major goal. Its logs point out that attackers ran a restricted variety of queries geared toward cryptocurrency holdings and present card stock quite than extracting your complete database.

The platform shops minimal private knowledge and doesn’t require obligatory KYC. A small subset of purchase records, roughly 18,500, was accessed, containing data reminiscent of e-mail addresses, crypto cost addresses, and metadata together with IP addresses. About 1,000 records contained encrypted names for particular merchandise; the corporate is treating this knowledge as doubtlessly compromised and has notified affected prospects immediately by e-mail.

At current, Bitrefill doesn’t consider prospects have to take any further motion, although it advises warning relating to sudden communications associated to Bitrefill or cryptocurrency.

Steps to strengthen safety

In response to the breach, Bitrefill mentioned it has already strengthened its cybersecurity practices and is working to attract classes from the incident.

The firm outlined a number of measures, together with conducting complete penetration exams with exterior specialists, tightening inner entry controls, enhancing logging and monitoring for sooner risk detection, and refining incident response procedures and automatic shutdown protocols.

Looking ahead

Bitrefill acknowledged that this was its first main assault in additional than a decade of operation however careworn that it stays well-funded and worthwhile, able to absorbing operational losses. Most techniques, together with funds, inventory, and accounts, are again on-line, with gross sales volumes returning to regular.

“Getting hit by a sophisticated attack sucks (a lot),” the corporate mentioned. “But we survived. We will proceed to do our greatest to proceed deserving our prospects’ belief.”

Scroll to Top