March 18, 2026 ChainGPT

Bitrefill Hack Linked to Lazarus: Hot Wallets Drained, 18,500 Purchases Exposed

Bitrefill Hack Linked to Lazarus: Hot Wallets Drained, 18,500 Purchases Exposed
Bitrefill, the Sweden-based crypto e-commerce service, says it was the target of a March 1, 2026 cyberattack linked to suspected North Korean actors associated with the notorious Lazarus group (including the Bluenoroff subgroup). The company disclosed the incident in a post‑mortem shared on X and provided technical details about how the breach unfolded and what customers should know. How the breach happened - Bitrefill’s investigation found the intrusion began from a compromised employee laptop. Attackers extracted legacy credentials from that device and used them to obtain a snapshot containing production secrets. - Those credentials gave the attackers broader access into Bitrefill’s infrastructure, databases and some hot wallets. - The team first detected the incident when it observed “suspicious purchasing patterns” — gift card inventories were being abused — and found funds being moved from some hot wallets to attacker-controlled addresses. Data exposure and scope - Bitrefill says customer information was not the primary target and there is no evidence the attackers copied the entire database. Instead, the intruders ran a limited number of queries, likely probing for high-value assets such as crypto and gift card inventory. - The company confirmed access to approximately 18,500 purchase records. Exposed fields included limited customer data such as email addresses, cryptocurrency payment addresses and metadata (including IP addresses). - For about 1,000 purchases, customers supplied names for specific products. That data is encrypted, but Bitrefill cautions attackers may have accessed the encryption keys. Response and remediation Bitrefill is working with external security firms, incident response teams, on‑chain analysts and law enforcement while hardening its environment. Actions underway include: - External reviews and penetration testing with implementation of recommendations - Tighter internal access controls and improved logging/monitoring for faster detection - Refinement of incident response playbooks and automated shutdown procedures Operational impact and financial posture - The company says operations are returning to normal: payment processing, stock availability and account functions are stabilizing. - Bitrefill stressed it was designed to limit the fallout from incidents like this, and that it remains well funded and profitable. The firm said it will absorb the losses from operational capital and pledged to keep working to earn user trust. Context Security researchers and authorities have long linked the Lazarus cybercrime umbrella and its Bluenoroff arm to high-profile crypto thefts and financially motivated intrusions. Bitrefill’s technical indicators reportedly align with patterns seen in those groups’ prior activity. Bitrefill’s full post‑mortem and remediation notes are available via its public statement on X. The company continues to cooperate with partners and law enforcement as the investigation progresses. Featured image: OpenArt. Chart: TradingView.com. Read more AI-generated news on: undefined/news