Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
South Korean Agencies Investigate $82M Orbit Bridge Hack After Reports of Lazarus Group's Involvement
Last updated: January 5, 2024 01:39 EST . 1 min read
Disclosure: Crypto is a high-risk asset class. This article is provided for informational purposes and does not constitute investment advice. By using this website, you agree to our terms and conditions. We may utilise affiliate links within our content, and receive commission.
Source: DALL·EOrbit Bridge, which serves as the main bridge for the Claytont eco, was exploited for nearly $82 million hours before the new year’s eve. Multiple South Korean agencies are currently investigating the multi million hack.
Allegations have emerged identifying North Korea’s hacking group, ‘Lazarus,’ as the orchestrator of the exploit, ing several South Korean National Intelligence Service (NIS) to intervene for a comprehensive investigation.
The bridge was utilized by prominent Korean domestic platforms such as Kakao’s blockchain platform Claytont and WEMIX, a blockchain project by WEMADE.
Intelligence Agencies Investigate the Exploit
The NIS’s involvement in determining the perpetrator of the attack signifies an unusual level of engagement for a blockchain-related virtual asset theft. According to Orbit Bridge’s operating company, OZYS, they ly reported the asset misappropriation incident to the Korea Internet & Security Agency (KISA) and the National Police Agency on January 1st, complying with mandatory reporting obligations under the Information and Communication Network Act.
The NIS commented on the ongoing investigation, stating, “We are currently investigating the cause and the perpetrator of the incident. While no direct link to North Korea has been confirmed so far, we are collaborating with relevant agencies and considering the possibility,” local news media reported.
NIS Involvement in Investigation Deemed Unusual
The incident follows a pattern observed in the cryptocurrency space where cybercrime incidents trigger the involvement of agencies like the Cyber Investigation Division of the National Police Agency and KISA. However, the inclusion of the NIS in this case is deemed exceptional.
OZYS has actively cooperated with the investigation, notifying authorities ly and seeking assistance from global blockchain analysis firms such as UPsala Security and the TON Foundation.
As the fallout from this incident reverberates not only within the Claytont decentralized finance (DeFi) sector but across the entire eco, OZYS anticipates support from Claytont for resolving the crisis and assisting affected parties.
OZYS plans to release further details on their joint response with Claytont in addressing the incident.