{"id":203921,"date":"2025-01-17T06:24:29","date_gmt":"2025-01-17T12:24:29","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2025\/01\/lazarus-group-targets-web3-developers-with-fake-linkedin-profiles-in-operation-99"},"modified":"2025-01-17T06:24:29","modified_gmt":"2025-01-17T12:24:29","slug":"lazarus-group-targets-web3-developers-with-fake-linkedin-profiles-in-operation-99","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2025\/01\/lazarus-group-targets-web3-developers-with-fake-linkedin-profiles-in-operation-99","title":{"rendered":"Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/lazarus-group-targets-web3-developers-with-fake-linkedin-profiles-in-operation-99.jpg\"><\/a><\/p>\n<p>\u201cBy compromising developer accounts, attackers not only exfiltrate intellectual property but also gain access to cryptocurrency wallets, enabling direct financial theft,\u201d the company said. \u201cThe targeted theft of private and secret keys could lead to millions in stolen digital assets, furthering the Lazarus Group\u2019s financial goals.\u201d<\/p>\n<p>The malware architecture adopts a modular design and is flexible, and capable of working across Windows, macOS, and Linux operating systems. It also serves to highlight the ever-evolving and adaptable nature of nation-state cyber threats.<\/p>\n<p>\u201cFor North Korea, hacking is a revenue generating lifeline,\u201d Sherstobitoff said. \u201cThe Lazarus Group has consistently funneled stolen cryptocurrency to fuel the regime\u2019s ambitions, amassing staggering sums. With Web3 and cryptocurrency industries booming, Operation 99 zeroes in on these high-growth sectors.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cBy compromising developer accounts, attackers not only exfiltrate intellectual property but also gain access to cryptocurrency wallets, enabling direct financial theft,\u201d the company said. \u201cThe targeted theft of private and secret keys could lead to millions in stolen digital assets, furthering the Lazarus Group\u2019s financial goals.\u201d The malware architecture adopts a modular design and is [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1761,34,45],"tags":[],"class_list":["post-203921","post","type-post","status-publish","format-standard","hentry","category-cryptocurrencies","category-cybercrime-malcode","category-finance"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/203921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=203921"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/203921\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=203921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=203921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=203921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}