Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026

Brazil's central bank bans stablecoin and crypto settlement in cross-border payments

May 2, 2026

Maple Finance’s SYRUP Token Now Available on Revolut in UK and EU

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»Bitrefill reports Lazarus-style exploit drained funds and exposed some user data
Security

Bitrefill reports Lazarus-style exploit drained funds and exposed some user data

March 18, 2026No Comments3 Mins Read

Bitrefill, the established crypto-to-gift-card platform, was hit by a sophisticated cyberattack earlier this month that drained company funds and exposed some customer data.

The team disclosed the incident in an X article on Tuesday, saying that it shares strong similarities with operations linked to Lazarus Group, the notorious North Korean cybercrime collective believed to be responsible for billions of dollars in crypto thefts.

According to Bitrefill, the breach happened on March 1, when attackers gained access to an employee’s device and extracted a legacy login credential.

From there, they used that foothold to pull production secrets and move deeper into Bitrefill’s infrastructure, escalating privileges until they reached parts of its database and certain crypto wallets.

Bitrefill first detected the intrusion after noticing unusual purchasing activity from suppliers.

The company discovered that its gift card inventory and supply chains had been exploited alongside wallet drains. Upon identifying the breach, Bitrefill took all systems offline as part of its containment protocol.

“Getting hit by a sophisticated attack sucks (a lot). We’ve been in business for over 10 years, and it’s the first time we’ve been hit this hard. But we survived,” the company stated in its incident report.

Scope of data exposure

The breach affected about 18,500 purchase records, including customer email addresses, crypto payment addresses, and metadata such as IP addresses.

Roughly 1,000 transactions involved products that required customer names. While that information was encrypted, it may have been exposed if attackers accessed the encryption keys. Bitrefill said it has notified affected customers.

See also  Cipher Digital Stock Pops as Firm Bolsters Shift From Bitcoin Mining With 15-Year Data Center Deal

The company said customer-held gift cards, store credits, and account balances were not impacted. It also noted that it does not require mandatory know-your-customer checks, and any KYC data submitted for higher purchase limits is handled by an external provider, not stored on its systems.

Investigators found multiple signs linking the attack to the Lazarus Group and its affiliate Bluenoroff, including malware similarities, blockchain tracing patterns, and reused IP and email infrastructure tied to earlier crypto breaches.

Bitrefill said it worked with security firms and law enforcement in responding to the incident.

Bitrefill plans to cover the financial losses caused by the attack using its operational capital. The platform has restored most functions, including payments, inventory, and customer accounts, with sales volumes returning to pre-incident levels.

The company said it is strengthening its security posture through additional penetration testing, tighter access controls, improved logging and monitoring, and updated incident response procedures, including automated shutdown protocols.

Disclosure: This article was edited by Vivian Nguyen. For more information on how we create and review content, see our Editorial Policy.

Source link

Bitrefill Data drained Exploit Exposed funds Lazarusstyle reports user

Related Posts

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026

ZachXBT Exposes US Law Firm Gerstein Harrow’s $71M Grab of Stolen Lazarus Funds

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026
Top Posts

Trader Says Crypto Entering Final Stages of Bear Market, Examines a Weakening Bitcoin (BTC)

October 13, 2023

Matrixport Says Bitcoin Will Rise to Between $42K and $56K if BlackRock ETF Is Approved

October 19, 2023

Bitcoin Miners Sold $85M in BTC After Recent Price Rally

September 22, 2023

Type above and press Enter to search. Press Esc to cancel.