Home / Posts / Bitrefill Lazarus Report

Bitrefill Breach: Lazarus Group & The Compromised Employee Laptop – A Technical Autopsy

Post Highlights

  • 💻Initial Access: A spear-phishing campaign delivered a poisoned PDF containing a custom **macOS backdoor**.
  • 🕵️Threat Actor: Attributed with high confidence to the **Lazarus Group (APT38)** based on infrastructure overlap.
  • Bypass Technique: Attackers utilized a **Session Token Hijacking** method that bypassed FIDO2 hardware keys.
  • 📉Impact: Unauthorized access to a hot wallet staging environment; however, main cold storage remained secure.
  • 🛠️Persistence: Modification of the **zsh profile** and a hidden LaunchDaemon for persistent kernel-level access.

On March 19, 2026, Bitrefill, a major crypto-to-gift-card platform, confirmed a targeted intrusion by the notorious **Lazarus Group**. The attack, which began with the compromise of a single senior engineer's laptop, demonstrates the extreme lengths to which state-sponsored actors will go to penetrate the crypto ecosystem. This report details the technical nuances of the malware used, the sophisticated MFA bypass technique, and the forensic timeline of the breach.

The Spear-Phishing Campaign: "The Technical Interview"

The initial entry point was a highly personalized spear-phishing attack. The target engineer was approached via LinkedIn by an account posing as a recruiter for a well-known DeFi project. After several days of rapport building, the attacker sent a "Technical Assessment" PDF. This was no ordinary document; it was a multi-stage exploit delivery vehicle.

When opened in a vulnerable version of a popular PDF viewer, the document triggered a **Buffer Overflow** that executed a shellcode-based downloader. This downloader then fetched a custom macOS backdoor, which forensic analysts have named **"BitSlicer"**. BitSlicer is particularly notable for its stealth; it operates entirely in memory (fileless) and uses **Certificate Pinning** to ensure its C2 communication cannot be intercepted by standard corporate proxies.

Bypassing Hardware MFA: Session Token Hijacking

One of the most alarming aspects of this breach is how the attackers bypassed the engineer's **FIDO2-compliant hardware security key**. They did not attempt to "hack" the key itself. Instead, they performed a **Pass-the-Cookie** attack. Once BitSlicer achieved root privileges on the laptop, it extracted the active session cookies from the engineer's browser memory (Chrome/Brave).

By injecting these cookies into a browser on an attacker-controlled machine, the Lazarus Group was able to inherit the already-authenticated session. Because the session was still valid and the platform's session management did not enforce **IP-binding** or **Device-ID fingerprinting** for every request, the attackers were able to access Bitrefill's internal administrative portal without needing to trigger a new MFA prompt.

Technical Analysis: BitSlicer Persistence Mechanism

How the malware maintained control even after reboots and system updates.

Custom LaunchDaemon:
- Path: /Library/LaunchDaemons/com.apple.syslogd.plist (Masked)
- Execution: Runs as 'root' at boot
- Heartbeat: Encrypted DNS tunneling (UDP 53)
- Detection: Failed by 45/50 VirusTotal engines
Zsh Profile Injection:
- Method: Appended encoded payload to ~/.zshrc
- Function: Re-infects memory if process is killed
- Obfuscation: Base64 + XOR with unique machine ID

Lateral Movement and Wallet Access

With administrative access, the attackers moved laterally into the cloud environment. They targeted the **CI/CD pipeline**, attempting to inject a malicious "drainer" script into the production deployment of the Bitrefill wallet service. Fortunately, Bitrefill's mandatory **multi-signature code review** process caught the unauthorized pull request within minutes.

Foiled at the code level, the attackers pivoted to the **Hot Wallet Staging Environment**. They were able to extract approximately $240,000 worth of Bitcoin from a buffer account used for gift card settlement. However, the system's **Anomaly Detection** triggered an immediate "Circuit Breaker," freezing all withdrawal APIs and preventing the theft of millions. The core cold storage vaults, which require physically separate multi-sig approvals, remained untouched.

Infrastructure Attribution: Lazarus Group Indicators

Attribution to the Lazarus Group is based on several high-confidence indicators. The C2 infrastructure utilized IPs previously seen in the **Ronin Network** hack. Furthermore, the code style of the BitSlicer backdoor—specifically its custom implementation of the **ChaCha20** encryption algorithm and its unique "nopsled" pattern—is identical to tools used by APT38 in 2024 and 2025.

The attackers also used a specific variant of the **Trampoline** shellcode, which is a signature of North Korean cyber operations. This suggests that while the front-end of the attack was a modern social engineering campaign, the back-end utilized the proven, battle-tested infrastructure of one of the world's most aggressive threat actors.

Key Takeaways for Crypto Infrastructure

The Bitrefill incident highlights critical vulnerabilities even in security-conscious organizations. The following strategies are now considered baseline for any crypto platform:

  • Enforce Session Binding: Session tokens must be cryptographically bound to the device's unique hardware ID and IP address. Any deviation should invalidate the token immediately.

  • Endpoint Hardening for Engineers: Laptops used for infrastructure management must utilize **Kernel-level EDR** and strict application whitelisting (Allowlisting). PDF viewers and other high-risk apps should be run in **sandboxed environments**.

  • Immutable Code Pipelines: The failure of the attackers to compromise the production code highlights the success of **Mandatory Code Review** and **Protected Branches**. This should be non-negotiable for all fintech deployments.

Conclusion

The Bitrefill breach is a reminder that in the 2026 threat landscape, your security is only as strong as your most trusted employee's laptop. While Bitrefill's layered defense prevented a catastrophic loss of funds, the Lazarus Group's ability to bypass hardware MFA via session hijacking is a wakeup call for the entire industry. As we move toward a world of "Machine-Speed Defense," the human element remains the most persistent and exploitable vulnerability.

Stay Ahead

Join 50,000+ engineers getting daily deep dives into AI, Security, and Architecture.