-
North Korean hackers laundered stolen crypto worth $150,000 through Cambodian company Huione Pay.
-
Lazarus’ group used phishing to steal from Atomic Wallet CoinsPaid and Alphapo.
-
Huione Pay received funds that were unknowingly stolen, highlighting regulatory gaps and compliance issues.
New evidence suggests that North Korea’s Lazarus Group has laundered over $150k in stolen cryptocurrency via Huione Pay in Cambodia. This highlights the group’s sophisticated methods and the challenges in combating crypto-related crimes in Southeast Asia.
This revelation provides a glimpse at the sophisticated methods used by the Lazarus Group to launder money in Southeast Asia. Huione Pay claims ignorance, but blockchain analysis shows the company received illicit funds between June 20,23 and February 20,24.
Huione Pay is the Cambodian company implicated in this case. It offers currency exchange services, payments and remittances. The company claimed to have no idea where the cryptos came from. Hun To, the cousin of Cambodian Prime Minister Hun To, is on the board of the company. They claim that the multiple transactions between the hacker’s wallet and the company’s own wallet made it difficult to determine the source.
The FBI has identified the Lazarus Group as responsible for stealing $160 million from crypto companies. These hacks were carried out using phishing attacks. These attacks are part a series heists that fund North Korea’s weapon programs. The United Nations has highlighted the use of cryptocurrency by North Korea to bypass international sanctions and facilitate illegal transactions. The Royal United Services Institute has also stated that cryptocurrency may be used by North Korea to purchase banned goods and/or services.
Despite regulations, the National Bank of Cambodia prohibits payment companies from dealing in cryptocurrencies. This ban is intended to prevent investment losses as well as cybercrime. The NBC said that if necessary, it would take corrective measures against Huione Pay. It did not specify the actions it intended to take.
Blockchain analysis firms TRM Labs & Merkle Science traced the movements of stolen funds. They revealed that Lazarus used the Tron Blockchain to convert the stolen crypto in tether (USDT). The funds were then transferred through different exchanges and OTC brokers. These brokers provide traders with more privacy than regular cryptocurrency exchanges.
The Lazarus group uses sophisticated techniques to launder stolen cryptocurrency. These techniques involve multiple transfers to hide the money trail. The stolen funds were converted into different cryptocurrencies in order to further conceal their origins.
Southeast Asia has become a hotbed of high-tech money laundering, thanks to its unregulated crypto service providers. The United Nations has highlighted the region’s crucial role in such operations. Cambodia’s anti-money laundering policy is under scrutiny despite being removed from FATF’s grey list.
This site is for entertainment only. Click here to read more