{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram
Lazarus Group is linked to the $600 million Ronin Bridge hack. ID.me gets more tough questions from Capitol Hill. And information-stealing malware is spreading quickly on Telegram. This is CyberScoop for April 15.

North Korean hackers tied to big crypto heist

There wasn’t much new in the most recent announcement of U.S. sanctions against the North Korean hackers known as Lazarus Group — except for one very important detail. The Treasury Department's announcement cited a single digital currency address, and cryptocurrency-tracking company Chainalysis quickly linked it to the the March hack of Ronin Bridge, which connects the Axie Infinity video game with the Ethereum blockchain. About $600 million in crypto ended up at the address. Treasury says Lazarus Group is helping to illicitly fund Pyongyang's weapons programs. Joe Warminsky has the details.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

ID.me under House panel's microscope

The House Oversight and Reform Committee launched an investigation of government contracts with identity verification company ID.me, twice citing CyberScoop reporting in their letter to the firm. The panel will probe the effectiveness of its facial recognition tech as well as its impact on privacy and equality. The company said it would respond to the committee's questions and touted its record helping "disadvantaged Americans" while battling benefits fraud. Tim Starks has the story.

Crooks share easy-to-use information stealer on Telegram

Cisco Talos researchers have identified a new information stealer they are calling “ZingoStealer.” They say a collective of cybercriminals known as Haskers Gang is responsible for the malware, which is proliferating quickly. Many of the victims are gamers, who are targeted with what they think are game cheats and pirated software. Instead, the files contain malware. Talos analysts say the malware is spreading quickly thanks to its easy-to-use template. ZingoStealer uses Telegram chat features to exfiltrate data and mine cryptocurrency on victims’ systems. Suzanne Smalley reports.

Tweet Of The Day


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}