The Lazarus Group has reportedly launched two U.S.-based businesses in violation of Treasury sanctions, using them to spread malware to crypto developers.
Cybersecurity researchers and documents reviewed by Reuters reveal that Blocknovas LLC and Softglide LLC — two businesses tied to the North Korea-linked cyber hacking group — were established in New York and New Mexico using fake identities and addresses. A third company, Angeloper Agency, is also connected to the operation, although it does not appear to be officially registered in the United States.
“This is a rare example of North Korean hackers actually managing to set up legal corporate entities in the U.S. in order to create corporate fronts used to attack unsuspecting job applicants,” Kasey Best, director of threat intelligence at cybersecurity firm Silent Push, said.
Silent Push revealed that the hackers involved belong to a subgroup within the Lazarus Group. On Thursday, an FBI seizure notice appeared on Blocknovas’ website, stating that the domain had been seized “as part of a law enforcement action against North Korean Cyber Actors who utilized this domain to deceive individuals with fake job postings and distribute malware.”
Prior to the seizure, FBI officials told Reuters they remain focused on holding both the Democratic People’s Republic of Korea (DPRK) hackers and their enablers responsible.