yugatech x infinix

Binance recovers USD 5.8M of stolen funds linked to Axie Infinity hack

Binance CEO Changpeng Zhao on Friday has announced that their trading platform had recovered USD 5.8 million worth of crypto funds linked to North Korean-orchestrated hacking of blockchain based, play-to-earn game Axie Infinity. Zhao says that the whole sum of recovered funds has been spread across over 86 different accounts.

As previously reported, Ronin Bridge Ethereum (ETH) sidechain of Sky Mavis’ Axie Infinity has suffered USD 625 million theft—which is considered the biggest crypto heists ever recorded. The United States Department of Treasury revealed last April 14 that “Lazarus Group” was the cybercrime gang responsible for the massive Ronin hack, and the said hacking group has been included in their sanctions list.

Following the cryptocurrency thefts since at least 2020, the US Cybersecurity & Infrastructure Security Agency (CISA) along with the Federal Bureau of Investigation (FBI), and Treasury on April 18 has issued joint Cybsersecurity Advisory (CSA) for blockchain-related companies and cryptocurrency sector regarding the cyber threats posed by North Korea.

The said advisory mentions hacking groups that are believed to be state sponsored by North Korea and are targeting crypto companies. Lazarus, APT38, BlueNoroff, and Stardust Chollima are the hacking groups tagged as advanced persistent threat (APT)—which means that these threats can gain unauthorized access to computer systems and remain undetected for long periods of time.

The US government noted that crypto exchanges, decentralized finance protocols, play-to-earn crypto games, venture capital firms and trading firms are being targeted by hackers to steal and launder crypto assets. Individual holders of cryptocurrency or valuable non-fungible tokens (NFTs) are also vulnerable.

“The activity described in this advisory involves social engineering of victims using a variety of communication platforms to encourage individuals to download trojanized cryptocurrency applications on Windows or macOS operating systems. The cyber actors then use the applications to gain access to the victim’s computer, propagate malware across the victim’s network environment, and steal private keys or exploit other security gaps,” the joint CSA stated.

React to this article:
JM Chavaria
JM's highest stat is probably his curious ardor to anything tech—electronics and gaming in particular. He certainly heeds utmost regard to specsheet, visuals, and rule of thirds. If creativity and wit sometimes leave JM's system, watching films, anime and a good stroll for memes are his approved therapeutic claims.
    Leave a Reply

    Your email address will not be published. Required fields are marked *

    Community Leaderboard

    1 Abe Olandres
    Abe Olandres 🥉 Rookie
    33,225 3,286 comments
    🏆 3
    2 EasyE
    EasyE 💠 Supremacy
    21,060 1,763 comments
    🏆 3
    3 abuzalzal
    abuzalzal 💠 Supremacy
    17,440 1,176 comments
    🏆 3
    4 wew
    wew 💠 Supremacy
    15,360 1,410 comments
    🏆 3
    5 Justin
    Justin 💎 Platinum
    9,190 744 comments
    🏆 2
    6 Jay
    Jay 💎 Platinum
    8,450 830 comments
    🏆 1
    7 BrianB
    BrianB 🏅 Newbie
    5,980 595 comments
    🏆 2
    8 Aa
    Aa 🥈 Silver
    5,675 505 comments
    🏆 2
    9 Calvin
    Calvin 🥈 Silver
    5,180 497 comments
    🏆 1
    10 Benchmark33
    Benchmark33 🥈 Silver
    5,065 434 comments
    🏆 1
    yugatech x ASUS

    Latest Review

    Sleek HUAWEI MatePad 12 X tablet on a dark surface
    HUAWEI MatePad 12 X (2026) Review
    A person holding the new iPhone 17 Pro Max
    iPhone 17 Pro Max Review
    Gray Philips tablet with rear camera and flash on metallic finish
    PHILIPS 10-inch Tablet (T7305L) Review
    nubia Neo 3 GT vs. Infinix GT 30 Comparison Review
    Nothing Phone (3a) Lite smartphone on a white background
    Nothing Phone (3a) Lite Review

    Latest Guide

    What’s new with Samsung One UI 8
    Smartphones Under PHP 10,000 | Q3 2025
    Smartphones Under ₱6K (Php 6,000) | Q3 2025
    Xiaomi 15T Pro vs. Xiaomi 14T Pro: What’s different?
    List of Xiaomi devices for HyperOS 3 Update Timeline
    Binance recovers USD 5.8M of stolen funds linked to Axie Infinity hack » YugaTech | Philippines Tech News & Reviews
    Yugatech Logo 2023
    YugaTech is the largest and longest-running technology website in the Philippines. Orignally established in October 2002, the site was transformed in 2005 into a full-fledged technology news and reviews destination for Filipinos across the globe.

    Tech Guides

    YugaTech | Philippines Tech News & Reviews
    © 2025. All Rights Reserved.