The post Bitrefill Cyberattack Linked to North Korea’s Lazarus Group, Exposes 18,500 Customer Records appeared on BitcoinEthereumNews.com. TLDR: Bitrefill’s MarchThe post Bitrefill Cyberattack Linked to North Korea’s Lazarus Group, Exposes 18,500 Customer Records appeared on BitcoinEthereumNews.com. TLDR: Bitrefill’s March

Bitrefill Cyberattack Linked to North Korea’s Lazarus Group, Exposes 18,500 Customer Records

2026/03/18 15:39
Okuma süresi: 3 dk
Bu içerikle ilgili geri bildirim veya endişeleriniz için lütfen crypto.news@mexc.com üzerinden bizimle iletişime geçin.

TLDR:

  • Bitrefill’s March 2026 breach was linked to North Korea’s Lazarus Group based on malware and IP patterns.
  • Attackers used a stolen legacy credential from an employee laptop to access production infrastructure. 
  • Around 18,500 purchase records were accessed, exposing emails, crypto addresses, and IP metadata.
  • Bitrefill confirmed it remains financially stable, absorbing all losses through its operational capital.

Bitrefill, a global crypto payments platform, disclosed a cyberattack that took place on March 1, 2026. The attack is suspected to involve North Korea’s Lazarus Group, also known as Bluenoroff.

Approximately 18,500 purchase records were accessed, containing email addresses, crypto payment addresses, and IP metadata.

The company went public with the incident after a detailed investigation involving external security experts and law enforcement agencies.

How the Bitrefill Attack Was Carried Out

The breach started on a compromised employee laptop within the company’s network. Attackers extracted a legacy credential from that device without triggering immediate alerts. That credential gave them access to a snapshot holding production secrets.

Using those secrets, the attackers escalated access into Bitrefill’s broader infrastructure. They reached parts of the company’s database and specific cryptocurrency hot wallets. Funds were then moved to attacker-controlled wallets.

The platform detected the breach after noticing suspicious purchasing patterns with certain suppliers. The team found that gift card stock and supply lines were being exploited simultaneously. Several hot wallets were also being drained in real time.

On March 1, Bitrefill’s official account posted a full incident report on social media. The company confirmed taking all systems offline as soon as the breach was detected. Restoring services across dozens of suppliers and payment methods required careful coordination.

Security investigators found strong similarities between this attack and prior DPRK Lazarus Group operations. The malware deployed, on-chain tracing, and reused IP addresses all matched known patterns. The team collaborated with ZeroShadow, SEAL_Org, Recoveris, and other incident response specialists throughout the process.

What Happened to Customer Data and What Bitrefill Is Doing

Customer data was not the primary target in the Bitrefill breach. Logs showed the attackers ran only a limited number of queries during the intrusion. Those queries were focused on probing cryptocurrency and gift card inventory, not personal records.

Around 18,500 purchase records were accessed during the attack. Those records included email addresses, crypto payment addresses, and IP metadata. For roughly 1,000 purchases, names stored in encrypted form may also have been accessed.

Since the attackers potentially obtained the encryption keys, the company treated that name data as compromised. Bitrefill directly notified all affected customers by email. No specific action is currently required from the broader customer base.

As a precaution, Bitrefill advised customers to stay alert to unexpected communications related to the platform. The company stated it will notify affected users if the risk assessment changes. Transparency remained a central part of its public response throughout the ordeal.

The company confirmed it remains financially stable and has been profitable for several years. All losses were covered using operational capital, with no disruption to ongoing services. Sales volumes and payment processing have since returned to normal.

The post Bitrefill Cyberattack Linked to North Korea’s Lazarus Group, Exposes 18,500 Customer Records appeared first on Blockonomi.

Source: https://blockonomi.com/bitrefill-cyberattack-linked-to-north-koreas-lazarus-group-exposes-18500-customer-records/

Piyasa Fırsatı
Ucan fix life in1day Logosu
Ucan fix life in1day Fiyatı(1)
$0.0003489
$0.0003489$0.0003489
+14.50%
USD
Ucan fix life in1day (1) Canlı Fiyat Grafiği
Sorumluluk Reddi: Bu sitede yeniden yayınlanan makaleler, halka açık platformlardan alınmıştır ve yalnızca bilgilendirme amaçlıdır. MEXC'nin görüşlerini yansıtmayabilir. Tüm hakları telif sahiplerine aittir. Herhangi bir içeriğin üçüncü taraf haklarını ihlal ettiğini düşünüyorsanız, kaldırılması için lütfen crypto.news@mexc.com ile iletişime geçin. MEXC, içeriğin doğruluğu, eksiksizliği veya güncelliği konusunda hiçbir garanti vermez ve sağlanan bilgilere dayalı olarak alınan herhangi bir eylemden sorumlu değildir. İçerik, finansal, yasal veya diğer profesyonel tavsiye niteliğinde değildir ve MEXC tarafından bir tavsiye veya onay olarak değerlendirilmemelidir.

Ayrıca Şunları da Beğenebilirsiniz

Sobering warning issued about America's 'ticking time-bombs' Trump may soon detonate

Sobering warning issued about America's 'ticking time-bombs' Trump may soon detonate

An economics expert issued a sobering warning on Thursday about the impact President Donald Trump's war in Iran could have at home. Catherine Rampell, economics
Paylaş
Rawstory2026/03/20 09:03
Trump tells Israel not to repeat strikes on Iranian energy as crisis deepens

Trump tells Israel not to repeat strikes on Iranian energy as crisis deepens

QatarEnergy's liquefied natural gas production facilities, amid the US-Israeli conflict with Iran, in Ras Laffan Industrial City, Qatar March 2, 2026.
Paylaş
Rappler2026/03/20 09:08
BlockDAG’s $0.0013 Entry Draws Market Attention Ahead of Deadline

BlockDAG’s $0.0013 Entry Draws Market Attention Ahead of Deadline

The post BlockDAG’s $0.0013 Entry Draws Market Attention Ahead of Deadline appeared on BitcoinEthereumNews.com. Crypto News 20 September 2025 | 00:00 Discover why BlockDAG’s $0.0013 entry is making headlines with nearly $410M raised, 26.3B coins sold, and the limited-time entry closing on Oct 1st. Occasionally, a single figure captures attention across crypto. This time, it isn’t a projection or a chart setup; it is a presale entry point. The $0.0013 price lock from BlockDAG (BDAG) has become more than a presale detail. It represents a marker of timing, reliability, and measurable progress. With more than 26.3 billion coins sold and nearly $410 million already secured, this price is not a teaser. It is a structured offer that continues to attract participants in large numbers. Once October 1st passes, the $0.0013 entry will close, and its significance could be remembered as one of those rare early-stage milestones. The $0.0013 Window Reflects More Than a Temporary Offer Many presales are defined by uncertainty, often shifting timelines and unclear goals. By fixing its presale price at $0.0013 until October 1st, BlockDAG has created a point of clarity in a crowded market. It is less about a discount and more about a defined statement: the project is setting a clear cut-off for early access. This approach has shown results. Over 26.3 billion BDAG coins have already been purchased. That momentum stems from demonstrated progress, not just speculation. A live Testnet, close to 20,000 miners distributed, and more than 3 million daily users of the X1 mobile miner all point to activity happening now rather than deferred promises. On top of this, the return profile is notable. The current batch price is $0.03, while the $0.0013 entry remains open for a limited time. That gap means an ROI of about 2,900% compared with batch 1. Even so, the project is keeping the entry level steady until October 1st, providing…
Paylaş
BitcoinEthereumNews2025/09/20 06:25