HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔓 Breach

North Korean Lazarus Group Compromises Bitrefill, Exposes 18.5K Crypto Purchase Records

Bitrefill, a crypto‑powered gift‑card marketplace, was breached in early March 2026. The North Korean Lazarus/BlueNoroff group compromised an employee laptop, stole credentials, and exfiltrated ~18,500 purchase records containing emails, IPs, and crypto payment addresses. The incident underscores third‑party credential risk for fintech services.

🛡️ LiveThreat™ Intelligence · 📅 March 20, 2026· 📰 bleepingcomputer.com
🟠
Severity
High
🔓
Type
Breach
🎯
Confidence
High
🏢
Affected
4 sector(s)
Actions
4 recommended
📰
Source
bleepingcomputer.com

North Korean Lazarus Group Compromises Bitrefill, Exposes 18.5K Crypto Purchase Records

What Happened — In early March 2026, cryptocurrency‑gift‑card platform Bitrefill suffered a breach attributed to the North Korean Lazarus/BlueNoroff group. Attackers compromised an employee laptop, stole legacy credentials, and accessed production snapshots, leading to exfiltration of ~18,500 purchase records (emails, IPs, crypto payment addresses; 1,000 records also contained names).

Why It Matters for TPRM

  • Credential theft on a third‑party vendor can cascade into exposure of customer payment data.
  • Encrypted data may be compromised if decryption keys are also stolen, raising the risk of downstream fraud.
  • Supply‑chain attacks on crypto‑focused services highlight the need for continuous vendor security assessments.

Who Is Affected — FinTech / payments providers, cryptocurrency exchanges, e‑commerce platforms that rely on Bitrefill’s gift‑card APIs, and their end‑users.

Recommended Actions — Review Bitrefill’s security posture, verify encryption key management, enforce MFA and least‑privilege for vendor accounts, and monitor for fraudulent activity on exposed crypto wallets.

Technical Notes — Attack vector: compromised employee laptop → stolen credentials → privileged access to production snapshots and databases. No public CVE; threat actor used known Lazarus malware, reused IPs and email addresses. Exfiltrated data: 18,500 purchase records (email, IP, crypto address); 1,000 with names. Data stored encrypted but decryption keys may have been obtained. Source: BleepingComputer

📰 Original Source
https://www.bleepingcomputer.com/news/security/bitrefill-blames-north-korean-lazarus-group-for-cyberattack/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.