CF
ClearFeed
Trust Analysis
78Trust
Highly Accurate
๐Ÿ” Web Verified๐Ÿ” Search Verified
Marcus Hutchins :verified:onMastodon22h ago
I spent nearly 4 months investigating the inner workings of a North Korean state-sponsored hacking group. Here's what I found: - The group used generative AI tools to aid in almost every part of their operations. - They exfiltrated 26,584 cryptocurrency wallets from victim systems, with a combined value totaling as much $12 million dollars. - In several cases, the threat actors set up entire front companies to lure in developers via fake job posting, then infected them with malware. - The threat actors successfully pulled off a supply-chain attack by compromising a VS Code extension developer's system. ๐Ÿ”— Full article: https://expel.com/blog/inside-lazarus-how-north-korea-uses-ai-to-industrialize-attacks-on-developers/
Trust Metrics
82
Accuracy
88
Framing
80
Context
50
Tone
Accuracy82%
Framing88%
Context80%
Tone50%
Analysis Summary
A North Korean hacking group called Lazarus used AI-generated malware, fake job postings, and VS Code compromises to steal cryptocurrency and developer credentials in 2026. The group's tactics have shifted from directly attacking exchanges to infiltrating developer environments through social engineering and open-source supply chains, making them harder to detect. Multiple security firms documented these campaigns in real time as Lazarus stole over $500 million from DeFi protocols in April 2026 alone.
Claims Analysis (4)
โ€œThe group used generative AI tools to aid in almost every part of their operationsโ€
Confirmed in multiple 2026 security reports documenting AI-generated code in Lazarus malware.
โœ“ Verified
โ€œThey exfiltrated 26,584 cryptocurrency wallets from victim systems, with a combined value totaling as much $12 million dollarsโ€
Specific count and valuation not found in web search. Related wallet-targeting campaigns documented but not this exact metric.
? Unverifiable
โ€œThe threat actors set up entire front companies to lure in developers via fake job posting, then infected them with malwareโ€
Multiple sources confirm Lazarus uses fake recruiter profiles and job postings to distribute malware to developers.
โœ“ Verified
โ€œThe threat actors successfully pulled off a supply-chain attack by compromising a VS Code extension developer's systemโ€
Confirmed in January-April 2026 reports of VS Code malware delivery via compromised repositories and extensions.
โœ“ Verified
Was this analysis helpful?
Try ClearFeed free โ†’
clearfeed.app โ€” Trust scores for your social feed