North Korean Cyber Heist: Radiant Capital’s $50M Vanishing Act!

Radiant Capital fell victim to a $50 million heist orchestrated by a North Korean threat actor. The cunning hackers used malware-infected developer devices to sign fraudulent transactions during a routine process. The attack, attributed to UNC4736, went undetected as malicious transactions hid behind a façade of legitimacy.

Pro Dashboard

Hot Take:

In this techy twist of fate, it looks like the only thing Radiant Capital got from their “trusted” contractor was a big ol’ $50 million headache, courtesy of North Korea. Maybe next time they’ll think twice before opening that sketchy PDF. Who knew that malware could double as a financial advisor?

Key Points:

  • Radiant Capital suffered a $50 million heist in October due to a sophisticated malware attack.
  • Three developers were deceived into signing fraudulent transactions via infected devices.
  • The incident began with a deceptive Telegram message and a disguised malware-laden PDF.
  • Mandiant attributes the attack to a North Korean threat group, UNC4736, also known as AppleJeus or Citrine Sleet.
  • The attack spanned multiple blockchain networks, including Arbitrum, Base, Binance Smart Chain, and Ethereum.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?