Summary: Bitrefill says attack shows Lazarus Group patterns after hot wallets drained

Published: 1 month and 8 days ago
Based on article from AMBCrypto

A significant security incident has impacted Bitrefill, a prominent cryptocurrency service, revealing a sophisticated cyberattack that compromised its internal infrastructure and led to the draining of funds from its hot wallets. The company's investigation has uncovered striking similarities with the tactics often employed by the notorious Lazarus Group, a state-sponsored threat actor, underscoring the persistent and evolving risks faced by the crypto industry.

The Breach: From Employee Device to Drained Wallets

The intrusion, detected on March 1, 2026, originated from a compromised employee's laptop, which allowed attackers to extract legacy credentials. This initial access provided a gateway to production secrets, enabling the adversaries to escalate privileges across Bitrefill's internal systems. Exploiting both the gift card inventory system and core crypto infrastructure, the attackers orchestrated the drainage of hot wallets and moved funds to their own addresses while simultaneously abusing supply lines through suspicious purchasing activity. Although the total financial loss was not disclosed, the breach impacted both e-commerce operations and wallet balances, leading to operational disruptions.

Limited Data Exposure and Suspected Attribution

During the incident, approximately 18,500 purchase records were accessed, exposing email addresses, crypto payment addresses, and metadata such as IP addresses. For about 1,000 purchases, customer names were also involved; Bitrefill is treating this encrypted data as potentially exposed due to possible access to encryption keys. While emphasizing that customer data was not the primary target and no full database extraction occurred, the company promptly notified affected users. Crucially, Bitrefill's investigation, involving malware analysis, on-chain tracing, and infrastructure examination, identified multiple overlaps in modus operandi and tooling with the Lazarus Group and its Bluenoroff unit, though a definitive attribution remains cautious.

Restored Operations and Proactive Security Enhancements

Following the breach, Bitrefill swiftly took its systems offline to contain the incident and collaborated with external cybersecurity experts, on-chain analysts, and law enforcement. Most services have since been restored to normal functionality, with the company asserting its financial stability and ability to absorb the losses from operational capital. In a move to bolster its defenses against future threats, Bitrefill has implemented enhanced access controls, expanded monitoring and logging capabilities, and committed to additional security audits and penetration testing. Users are advised to remain vigilant against suspicious communications, though no specific action is required on their part based on current findings.

Cookies Policy - Privacy Policy - Terms of Use - © 2025 Altfins, j. s. a.