CryptoBitrefill reports Lazarus-style exploit drained funds and exposed some...

Bitrefill reports Lazarus-style exploit drained funds and exposed some user data

-


Bitrefill, the established crypto-to-gift-card platform, was hit by a sophisticated cyberattack earlier this month that drained company funds and exposed some customer data.

The team disclosed the incident in an X article on Tuesday, saying that it shares strong similarities with operations linked to Lazarus Group, the notorious North Korean cybercrime collective believed to be responsible for billions of dollars in crypto thefts.

According to Bitrefill, the breach happened on March 1, when attackers gained access to an employee’s device and extracted a legacy login credential.

From there, they used that foothold to pull production secrets and move deeper into Bitrefill’s infrastructure, escalating privileges until they reached parts of its database and certain crypto wallets.

Bitrefill first detected the intrusion after noticing unusual purchasing activity from suppliers.

The company discovered that its gift card inventory and supply chains had been exploited alongside wallet drains. Upon identifying the breach, Bitrefill took all systems offline as part of its containment protocol.

“Getting hit by a sophisticated attack sucks (a lot). We’ve been in business for over 10 years, and it’s the first time we’ve been hit this hard. But we survived,” the company stated in its incident report.

Scope of data exposure

The breach affected about 18,500 purchase records, including customer email addresses, crypto payment addresses, and metadata such as IP addresses.

Roughly 1,000 transactions involved products that required customer names. While that information was encrypted, it may have been exposed if attackers accessed the encryption keys. Bitrefill said it has notified affected customers.

The company said customer-held gift cards, store credits, and account balances were not impacted. It also noted that it does not require mandatory know-your-customer checks, and any KYC data submitted for higher purchase limits is handled by an external provider, not stored on its systems.

Investigators found multiple signs linking the attack to the Lazarus Group and its affiliate Bluenoroff, including malware similarities, blockchain tracing patterns, and reused IP and email infrastructure tied to earlier crypto breaches.

Bitrefill said it worked with security firms and law enforcement in responding to the incident.

Bitrefill plans to cover the financial losses caused by the attack using its operational capital. The platform has restored most functions, including payments, inventory, and customer accounts, with sales volumes returning to pre-incident levels.

The company said it is strengthening its security posture through additional penetration testing, tighter access controls, improved logging and monitoring, and updated incident response procedures, including automated shutdown protocols.

Disclosure: This article was edited by Vivian Nguyen. For more information on how we create and review content, see our Editorial Policy.



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest news

Bitcoin falls below $90,000 one week before Trump inauguration

After Trump’s election, bitcoin jumped from $68,000 to $108,000 but has now fallen back by 17% to today’s...

Ethereum Price Analysis: Is ETH Doomed in May as Key Metric Turns Negative?

Ethereum is opening May at around $2.3k, having spent the final week of April consolidating below the $2.4k...

Why have MicroStrategy insiders been dumping MSTR?

As MicroStrategy continues to dilute common shareholders to add bitcoin to its balance sheet, insiders continue to sell...

Advertisement

OpenAI Enables Marketing Cookies by Default for Free ChatGPT Users

OpenAI is ready to target free users of its services with advertisements around the web, based on what...

1,000 Victims Hit in $215M Scam—$1.2M in Crypto, Cash Found

Key Takeaways: Authorities detailed a global email fraud scheme using hacked accounts and deceptive payment requests. Losses...

Must read

You might also likeRELATED
Recommended to you