Home OSINT News Signals
CYBER

Bitrefill Accuses North Korean Hackers of Stealing 18,500 Customer Purchase Records

🕓 2 min read

Cryptocurrency-powered e-commerce platform Bitrefill has publicly accused North Korean state-sponsored hackers of breaching its systems and stealing a cache of approximately 18,500 customer purchase records. The company, which allows users to buy gift cards and top up mobile phone credits using Bitcoin and other cryptocurrencies, disclosed the incident after detecting unauthorized access to a customer support panel. The compromised data is reported to include customer email addresses, order values, and the types of gift cards purchased, but notably excludes more sensitive financial information like payment details, passwords, or physical addresses. This incident underscores the persistent and financially motivated cyber threat posed by North Korean hacking groups, which are known to target cryptocurrency services to fund the regime's operations.

The attack methodology, as detailed by Bitrefill, involved credential stuffing. Threat actors used a list of previously breached username and password combinations to gain access to the customer support system. This technique exploits the common user habit of reusing passwords across multiple online services. While Bitrefill's core financial systems and cryptocurrency wallets were not compromised, the breach of the support panel provided the attackers with a valuable dataset. Security analysts suggest this customer and order information could be leveraged for highly targeted phishing campaigns, credential refinement for further attacks, or even for market analysis to understand cryptocurrency spending patterns.

The attribution to North Korea, specifically the Lazarus Group, is based on tactical analysis of the attack patterns and infrastructure used. Bitrefill's security team, in collaboration with external threat intelligence firms, traced the activity to infrastructure and tools commonly associated with North Korean advanced persistent threat (APT) actors. The Lazarus Group is infamously linked to major cyber heists, including the 2014 Sony Pictures hack and the 2017 WannaCry ransomware attack, but has increasingly focused on draining cryptocurrency exchanges and platforms. This shift aligns with United Nations reports that detail how North Korea uses stolen digital assets to circumvent international sanctions and finance its weapons programs.

For the cybersecurity community and cryptocurrency users, the Bitrefill breach serves as a critical reminder of the evolving threat landscape. It highlights the need for robust security practices beyond core financial systems, as ancillary services like customer support portals can become lucrative targets. Companies are urged to enforce multi-factor authentication (MFA) universally, monitor for credential stuffing attacks, and educate users on password hygiene. For individuals, the incident reinforces the necessity of using unique, strong passwords for every service and remaining vigilant against sophisticated phishing attempts that may leverage stolen personal data like purchase histories.

Telegram X LinkedIn
Back to News