The post Bitrefill Cyberattack Linked to North Korea’s Lazarus Group, Exposes 18,500 Customer Records appeared on BitcoinEthereumNews.com. TLDR: Bitrefill’s MarchThe post Bitrefill Cyberattack Linked to North Korea’s Lazarus Group, Exposes 18,500 Customer Records appeared on BitcoinEthereumNews.com. TLDR: Bitrefill’s March

Bitrefill Cyberattack Linked to North Korea’s Lazarus Group, Exposes 18,500 Customer Records

For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

TLDR:

  • Bitrefill’s March 2026 breach was linked to North Korea’s Lazarus Group based on malware and IP patterns.
  • Attackers used a stolen legacy credential from an employee laptop to access production infrastructure. 
  • Around 18,500 purchase records were accessed, exposing emails, crypto addresses, and IP metadata.
  • Bitrefill confirmed it remains financially stable, absorbing all losses through its operational capital.

Bitrefill, a global crypto payments platform, disclosed a cyberattack that took place on March 1, 2026. The attack is suspected to involve North Korea’s Lazarus Group, also known as Bluenoroff.

Approximately 18,500 purchase records were accessed, containing email addresses, crypto payment addresses, and IP metadata.

The company went public with the incident after a detailed investigation involving external security experts and law enforcement agencies.

How the Bitrefill Attack Was Carried Out

The breach started on a compromised employee laptop within the company’s network. Attackers extracted a legacy credential from that device without triggering immediate alerts. That credential gave them access to a snapshot holding production secrets.

Using those secrets, the attackers escalated access into Bitrefill’s broader infrastructure. They reached parts of the company’s database and specific cryptocurrency hot wallets. Funds were then moved to attacker-controlled wallets.

The platform detected the breach after noticing suspicious purchasing patterns with certain suppliers. The team found that gift card stock and supply lines were being exploited simultaneously. Several hot wallets were also being drained in real time.

On March 1, Bitrefill’s official account posted a full incident report on social media. The company confirmed taking all systems offline as soon as the breach was detected. Restoring services across dozens of suppliers and payment methods required careful coordination.

Security investigators found strong similarities between this attack and prior DPRK Lazarus Group operations. The malware deployed, on-chain tracing, and reused IP addresses all matched known patterns. The team collaborated with ZeroShadow, SEAL_Org, Recoveris, and other incident response specialists throughout the process.

What Happened to Customer Data and What Bitrefill Is Doing

Customer data was not the primary target in the Bitrefill breach. Logs showed the attackers ran only a limited number of queries during the intrusion. Those queries were focused on probing cryptocurrency and gift card inventory, not personal records.

Around 18,500 purchase records were accessed during the attack. Those records included email addresses, crypto payment addresses, and IP metadata. For roughly 1,000 purchases, names stored in encrypted form may also have been accessed.

Since the attackers potentially obtained the encryption keys, the company treated that name data as compromised. Bitrefill directly notified all affected customers by email. No specific action is currently required from the broader customer base.

As a precaution, Bitrefill advised customers to stay alert to unexpected communications related to the platform. The company stated it will notify affected users if the risk assessment changes. Transparency remained a central part of its public response throughout the ordeal.

The company confirmed it remains financially stable and has been profitable for several years. All losses were covered using operational capital, with no disruption to ongoing services. Sales volumes and payment processing have since returned to normal.

The post Bitrefill Cyberattack Linked to North Korea’s Lazarus Group, Exposes 18,500 Customer Records appeared first on Blockonomi.

Source: https://blockonomi.com/bitrefill-cyberattack-linked-to-north-koreas-lazarus-group-exposes-18500-customer-records/

Market Opportunity
Ucan fix life in1day Logo
Ucan fix life in1day Price(1)
$0.0003075
$0.0003075$0.0003075
+2.98%
USD
Ucan fix life in1day (1) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Leonardo AI Unveils Comprehensive Image Editing Suite with Six Model Options

Leonardo AI Unveils Comprehensive Image Editing Suite with Six Model Options

Leonardo AI releases detailed guide to AI image editing featuring Nano Banana, GPT Image 1.5, and Flux models as competition heats up with Adobe, Google, and Canva
Share
BlockChain News2026/03/19 12:39
RBA warns high and rising risk of severe shock to world economy amid Iran war

RBA warns high and rising risk of severe shock to world economy amid Iran war

The post RBA warns high and rising risk of severe shock to world economy amid Iran war appeared on BitcoinEthereumNews.com. The Reserve Bank of Australia (RBA)
Share
BitcoinEthereumNews2026/03/19 11:49
Headwind Helps Best Wallet Token

Headwind Helps Best Wallet Token

The post Headwind Helps Best Wallet Token appeared on BitcoinEthereumNews.com. Google has announced the launch of a new open-source protocol called Agent Payments Protocol (AP2) in partnership with Coinbase, the Ethereum Foundation, and 60 other organizations. This allows AI agents to make payments on behalf of users using various methods such as real-time bank transfers, credit and debit cards, and, most importantly, stablecoins. Let’s explore in detail what this could mean for the broader cryptocurrency markets, and also highlight a presale crypto (Best Wallet Token) that could explode as a result of this development. Google’s Push for Stablecoins Agent Payments Protocol (AP2) uses digital contracts known as ‘Intent Mandates’ and ‘Verifiable Credentials’ to ensure that AI agents undertake only those payments authorized by the user. Mandates, by the way, are cryptographically signed, tamper-proof digital contracts that act as verifiable proof of a user’s instruction. For example, let’s say you instruct an AI agent to never spend more than $200 in a single transaction. This instruction is written into an Intent Mandate, which serves as a digital contract. Now, whenever the AI agent tries to make a payment, it must present this mandate as proof of authorization, which will then be verified via the AP2 protocol. Alongside this, Google has also launched the A2A x402 extension to accelerate support for the Web3 ecosystem. This production-ready solution enables agent-based crypto payments and will help reshape the growth of cryptocurrency integration within the AP2 protocol. Google’s inclusion of stablecoins in AP2 is a massive vote of confidence in dollar-pegged cryptocurrencies and a huge step toward making them a mainstream payment option. This widens stablecoin usage beyond trading and speculation, positioning them at the center of the consumption economy. The recent enactment of the GENIUS Act in the U.S. gives stablecoins more structure and legal support. Imagine paying for things like data crawls, per-task…
Share
BitcoinEthereumNews2025/09/18 01:27