"Where did the kelp $292m go? anatomy of a $292m laundering" published by TheSmartApe.
#KelpDAO,
#MoneyLaundering,
#DPRK,
#CTI https://archive.md/FUKS5"I got completely owned by the most sophisticated hack I've ever encountered" published by Turshija.
#ContagiousInterview,
#DPRK,
#CTI https://archive.md/eb6sl
Inside Lazarus: How North Korea uses AI to industrialize attacks on developers
Expel is tracking a North Korean (DPRK) state-sponsored APT group. This group is targeting Web3 developers to steal cryptocurrency and NFTs.
Expel
Unmasking DPRK Cyber Threat Actors: Fake IT Worker Infrastructure
Uncover how DPRK cyber threat actors use fake IT schemes, Astrill VPN, and freelance platforms to infiltrate networks. Learn to spot these advanced persistent threats.

KelpDAO Hacker Moving Funds: Attacker Transfers $175M to New Addresses
The Kelp DAO attacker has moved over $175 million to new addresses. Track the hacker’s use of cross-chain bridges and DeFi protocols here as the laundering process begins

Void Dokkaebi Uses Fake Job Interview Lure to Spread Malware via Code Repositories
Our research on Void Dokkaebi’s operations uncovered a campaign that turns infected developer repositories into malware delivery channels. By spreading through trusted workflows, organizational codebases, and open-source projects, the threat can scale from a single compromise to a broader supply chain risk.
Trend Micro"A Third Vultr Seoul Box: 60+ Kimsuky Domains, 18 Months of DDNS Rotation, and a 5-Year Infrastructure Trail" published by BreakGlassIntelligence.
#Kimsuky,
#DPRK,
#CTI https://intel.breakglass.tech/post/kimsuky-third-vultr-seoul-60-domains-ddns-rotation-naver-nts
A Third Vultr Seoul Box: 60+ Kimsuky Domains, 18 Months of DDNS Rotation, and a 5-Year Infrastructure Trail
Passive DNS analysis of a third Vultr Seoul VPS reveals 60+ Kimsuky credential harvesting domains across 18 months, systematically impersonating Naver, the Korean National Tax Service, and Korean government portals. 31 domains still resolve. The VPS has been under actor control since 2020.
Breakglass Intelligence
Detection strategies across cloud and identities against infiltrating IT workers | Microsoft Security Blog
The shift to remote and hybrid work since the pandemic expanded global hiring and accelerated digital onboarding, increasing reliance on online identity verification and remote access.
Microsoft Security Blog"New Lazarus APT Campaign: “Mach-O Man” macOS Malware Kit Hits Businesses" published by AnyRun.
#ClickFix,
#Lazarus,
#DPRK,
#CTI https://any.run/cybersecurity-blog/lazarus-macos-malware-mach-o-man/
Lazarus “Mach-O Man” Malware: What CISOs Need to Know
Learn how the Lazarus “Mach-O Man” campaign targets businesses, and how SOC leaders can reduce credential theft and data exposure risk.
ANY.RUN's Cybersecurity Blog
Techub News Exclusive: SlowMist on Kelp DAO × LayerZero Systemic Risk
This article is the full English translation of the Techub News interview.
Medium