Crypto firms beware: Lazarus’ new malware can now bypass detection Post author:MiamiCrypto Post published:October 2, 2023 Post category:BlindingCan / ESET / Lazarus Group / LightlessCan / linkedin / Malware / payload / Peter Kálnai / Phishing attack / Social Engineering Attack The malware payload “LightlessCan” — used in fake job scams — is far more challenging to detect than its predecessor, warns cybersecurity researchers at ESET. You Might Also Like North Korean Hackers Set Up US Shell Companies to Target Crypto Developers: Report April 26, 2025 North Korea’s Lazarus Group Exploited Defi Protocol Alex Lab for $4.3 Million, Probe Reveals June 26, 2024 US Treasury’s OFAC Adds 3 ETH Addresses Linked to North Korean Cybercrime Group to SDN List April 24, 2022
North Korea’s Lazarus Group Exploited Defi Protocol Alex Lab for $4.3 Million, Probe Reveals June 26, 2024
US Treasury’s OFAC Adds 3 ETH Addresses Linked to North Korean Cybercrime Group to SDN List April 24, 2022