Artwork

Content provided by Laura Shin. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Laura Shin or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

North Korean Hackers Are Winning. Is the Crypto Industry Ready to Stop Them? - Ep. 789

1:27:05
 
Share
 

Manage episode 468414727 series 1822984
Content provided by Laura Shin. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Laura Shin or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

$1.5 billion gone in an instant. And what’s worse, to fund a nuclear weapons program.

The largest crypto hack in history just hit Bybit, and the culprit is the infamous North Korean hacking group, Lazarus. Known for some of the most sophisticated cyber heists ever, they often use social engineering tactics and start by tricking low level employees. Although they can often wait to launder funds, in the case of Bybit they started right away.

How did this happen? Could it have been prevented? And what does this mean for the security of the entire crypto industry?

Taylor Monahan, security at MetaMask, and Jonty, a senior investigator at zeroShadow, talk all about it.

Show highlights:

  • 2:53 Taylor’s and Jonty’s backgrounds and why they are relevant to this discussion
  • 6:06 What the mechanics of the hack were
  • 13:03 How Lazarus usually operates and the tactic of blind signing
  • 17:11 Jonty’s important tips for people handling large amounts of crypto
  • 23:45 How Bybit was able to say almost immediately that their other assets were secure
  • 29:02 How much exchanges typically hold in each cold wallet
  • 32:00 Why the evidence of the hack points to North Korean group Lazarus
  • 41:01 Why North Korean hackers don’t care if their attack is linked to them
  • 49:30 How Lazarus typically social engineers its hacks
  • 53:48 Why Jonty thinks the industry needs a serious upgrade in terms of security
  • 58:08 How the funds get laundered in such cases and what the industry can do
  • 1:09:54 The chances Lazarus actually makes money from the hack
  • 1:15:34 How DeFi protocols should approach this problem

Visit our website for breaking news, analysis, op-eds, articles to learn about crypto, and much more: unchainedcrypto.com

Thank you to our sponsors!

Guests:

Links

Learn more about your ad choices. Visit megaphone.fm/adchoices

  continue reading

874 episodes

Artwork
iconShare
 
Manage episode 468414727 series 1822984
Content provided by Laura Shin. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Laura Shin or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

$1.5 billion gone in an instant. And what’s worse, to fund a nuclear weapons program.

The largest crypto hack in history just hit Bybit, and the culprit is the infamous North Korean hacking group, Lazarus. Known for some of the most sophisticated cyber heists ever, they often use social engineering tactics and start by tricking low level employees. Although they can often wait to launder funds, in the case of Bybit they started right away.

How did this happen? Could it have been prevented? And what does this mean for the security of the entire crypto industry?

Taylor Monahan, security at MetaMask, and Jonty, a senior investigator at zeroShadow, talk all about it.

Show highlights:

  • 2:53 Taylor’s and Jonty’s backgrounds and why they are relevant to this discussion
  • 6:06 What the mechanics of the hack were
  • 13:03 How Lazarus usually operates and the tactic of blind signing
  • 17:11 Jonty’s important tips for people handling large amounts of crypto
  • 23:45 How Bybit was able to say almost immediately that their other assets were secure
  • 29:02 How much exchanges typically hold in each cold wallet
  • 32:00 Why the evidence of the hack points to North Korean group Lazarus
  • 41:01 Why North Korean hackers don’t care if their attack is linked to them
  • 49:30 How Lazarus typically social engineers its hacks
  • 53:48 Why Jonty thinks the industry needs a serious upgrade in terms of security
  • 58:08 How the funds get laundered in such cases and what the industry can do
  • 1:09:54 The chances Lazarus actually makes money from the hack
  • 1:15:34 How DeFi protocols should approach this problem

Visit our website for breaking news, analysis, op-eds, articles to learn about crypto, and much more: unchainedcrypto.com

Thank you to our sponsors!

Guests:

Links

Learn more about your ad choices. Visit megaphone.fm/adchoices

  continue reading

874 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Listen to this show while you explore
Play