Bitrefill Breach Tied to Lazarus Drains Wallets, Exposes 18,500 Orders
Situation and chronology
On March 1 the crypto commerce provider Bitrefill detected unauthorized access that resulted in the exfiltration of payment-related data and the partial depletion of operational wallets. Forensic indicators—transaction trails, reused infrastructure footprints and tooling overlaps—steered investigators toward techniques attributed to the DPRK-aligned Lazarus / Bluenoroff cluster, prompting public attribution while investigators continue evidence collection. The intrusion initiated at an endpoint and expanded into vendor-facing order systems, enabling suspicious purchase activity routed through third parties. Containment involved a planned service takedown, coordinated external forensics, progressive remediation of persistence, and staged restoration to baseline sales volumes.
Technical exposure and scope
Investigators report attackers executed targeted queries against inventory and payment subsystems rather than performing a broad, noisy database siphon, narrowing the theft vector to transactional flows and vendor fulfillment channels. Roughly 18,500 purchase records were accessed and about 1,000 of those include higher-risk encrypted name fields; affected customers received direct notifications. Bitrefill says most KYC remains with an external provider and that on-platform backups do not contain comprehensive identity files. No firm public dollar amount for losses has been released; the firm stated it will absorb shortfalls from operating capital.
Cross-incident context: control-plane and supply-chain parallels
Independent reporting on recent supply‑chain incidents (for example, injected client-side scripts delivered via compromised CDN/DNS configuration) shows an overlapping tradecraft set: human-targeted credential harvesting, transient memory-only loaders, and control‑plane abuse to manipulate delivery infrastructure. Those cases—where stolen operator credentials enabled malicious configuration pushes to widely used hosts—explain how attackers can weaponize seemingly peripheral distribution channels into steady monetization funnels that conclude on cryptocurrency on‑ramps. The shared mechanics do not prove a single operator in every case; rather they indicate a commoditized toolkit and an operational preference for control‑plane vectors that can blur attribution boundaries.
Operational response and market signals
Response teams including zeroShadow, SEAL911, and RecoverisTeam removed persistence mechanisms and validated system integrity before reopening services. Short-term remediation steps recommended across similar incidents include immediate rotation and revocation of exposed CDN/DNS tokens and API keys, targeted endpoint forensics for operator devices, and accelerated vendor token audits. Sales volumes returned to prior levels after containment steps, but the attack has increased scrutiny across exchanges, custodians, and compliance vendors.
Industry implications and next moves
If state-aligned actors and criminal groups continue exploiting payment rails and fulfillment pipelines via credential and control‑plane compromise, firms will need deeper segmentation between operational capital and customer assets, hardened endpoint controls, stronger vendor attestations, and mandatory post-acquisition forensic assessments for delivery infrastructure. Expect increased demand for on‑chain forensic services, insurer underwriting adjustments requiring endpoint telemetry and vendor SLAs, and regulatory attention on control‑plane access controls. Stakeholders should treat gift-card and vendor pipelines as frontline attack surfaces; mitigation requires both technical controls and contractual remediation clauses. For the original disclosure see Bitrefill statement.
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you

LexisNexis breach exposes legacy datasets, raises cloud-hygiene alarm
LexisNexis confirmed an intrusion that exposed legacy files and identifiers, with the attacker alleging exploitation of React2Shell and weak cloud controls. Immediate risks include exposed credentials, roughly 400,000 personal records, and elevated regulatory and insurance scrutiny — a pattern echoed by recent large-scale exfiltrations where fast operational recovery did not eliminate downstream fraud and identity risk.

ManoMano: Support-Portal Breach Exposes Millions of Customer Records
ManoMano confirmed a support‑channel compromise tied to a third‑party supplier that a threat actor claims exposed ~37.8 million accounts and ~43 GB of support data. Corroborating incidents show attackers increasingly combine support‑system intrusions with credential caches and real‑time session orchestration—raising immediate risks from phishing, MFA bypass, and long‑tail credential‑stuffing and intensifying EU cross‑border regulatory exposure.

Bybit Rebounds to Second-Largest Exchange Despite $1.5B Cold‑wallet Breach
After losing $1.5 billion in a February 2025 cold‑wallet breach, Bybit recovered to record $1.5 trillion in annual trading volume and an 8.1% market share, according to CoinGecko. The episode highlights both the fragility of custodial infrastructure and how rapid liquidity management and public assurances can limit long‑term commercial damage.

Polyfill.io Compromise Linked to North Korean Operators, Impacting 100k+ Sites
Forensic artifacts (LummaC2 sample and harvested CDN/DNS credentials) tie the 2024 Polyfill.io library compromise to operators aligned with North Korea; investigators warn the incident exemplifies a broader trend of supply‑chain abuse that pairs credential theft, control‑plane takeover, and resilient off‑platform monetization to convert web traffic into crypto flows.
Ransomware strike at Ingram Micro exposes sensitive records of ~42,500 people
A July ransomware incident at Ingram Micro led to the theft of employment and applicant records for about 42,521 people and service outages that were largely resolved within a week. A threat actor later published roughly 3.5 TB of claimed data; the company is offering two years of identity protection while facing regulatory notification, legal exposure, and heightened supply‑chain scrutiny.

ApolloMD Data Breach Exposes PHI for Over 626,000 Individuals
A late‑May 2025 intrusion into ApolloMD’s systems led to the unauthorized access and copying of personally identifiable and clinical information for about 626,540 people, with some files containing Social Security numbers; the incident was later posted to a ransomware-linked leak site. ApolloMD reported the event to federal health authorities, began mailing breach notifications by September 2025 and is offering affected parties complimentary credit monitoring, highlighting broader third‑party risk in health data aggregation.

Canadian Tire: Data Compromise Hits Tens of Millions of Customers
A wide-scale e-commerce breach at Canadian Tire exposed roughly 38M customer accounts and an auxiliary data set that totals about 42M records. Passwords hashed with PBKDF2 , partial payment details, and contact fields are in circulation, raising fraud and regulatory risk. Industry signals from other recent retail and support-channel incidents indicate attackers often combine credential caches, infostealers and social‑engineering to amplify impact.

Ledger Flags MediaTek Secure‑Boot Flaw That Exposes Android Wallet Secrets
Ledger's Donjon team disclosed a MediaTek firmware weakness that can let an attacker with physical access extract PINs and private keys from affected Android phones in under a minute. The issue may touch roughly 25% of devices using MediaTek chips and demands immediate firmware updates from vendors and operators.