Bitrefill will cover the losses from operational capital.
Bitrefill said a March 1, 2026 cyberattack linked to North Korea’s Lazarus Group compromised parts of its infrastructure, drained some hot wallets and exposed about 18,500 purchase records. The breach began with a compromised employee laptop that revealed legacy credentials, allowing attackers to access production keys, exploit gift card supply chains and move funds before the company took systems offline.
Cryptocurrency payments and gift card platformthe North Korea-linked hacking group Lazarus for a cyberattack on March 1, 2026, that compromised parts of its infrastructure and cryptocurrency wallets. The attackers gained access to production keys, transferred funds from hot wallets, and exposed 18,500 purchase records containing emails, payment addresses, and IP addresses. Approximately 1,000 records included encrypted usernames. Affected users were notified. Operations have resumed, with the company announcing to cover losses from operational capital. The incident underscores the importance of vigilance regarding crypto and on-chain security. The modus operandi included malware, on-chain tracing and reused IP and email addresses and was similar to previous attacks attributed to North Korea’s Lazarus Group, also known as Bluenoroff, the company said in a detailed report on X. The Lazarus Group has previously targeted crypto projects including Ronin Network, Harmony’s Horizon Bridge, WazirX, and Atomic Wallet.It all began with with a compromised employee laptop, which exposed legacy credentials and allowed attackers to access Bitrefill’s broader infrastructure, including parts of its database and cryptocurrency wallets. The breach quickly became apparent when the company noticed unusual purchasing patterns among certain suppliers, signaling that attackers were exploiting its gift card inventory and supply chains. The firm also noted that attackers were draining some hot wallets and moving funds to their own addresses, following which, the system was taken offline to contain the damage. “Bitrefill operates a global e-commerce business with dozens of suppliers, thousands of products, and multiple payment methods across many countries. Safely switching all these things off and bringing them back online is not trivial,” the company said in a statement. Since the incident, Bitrefill has been working with security researchers, incident response teams, on-chain analysts, and law enforcement to investigate the breach.Hackers accessed a small set of purchase records, approximately 18,500, containing Bitrefill said there is no evidence that customer data was a primary target. Its logs indicate that attackers ran a limited number of queries aimed at cryptocurrency holdings and gift card inventory rather than extracting the entire database. The platform stores minimal personal data and does not require mandatory KYC. A small subset of purchase records, approximately 18,500, was accessed, containing information such as email addresses, crypto payment addresses, and metadata including IP addresses. About 1,000 records contained encrypted names for specific products; the company is treating this data as potentially compromised and has notified affected customers directly by email. At present, Bitrefill does not believe customers need to take any additional action, though it advises caution regarding unexpected communications related to Bitrefill or cryptocurrency.In response to the breach, Bitrefill said it has already strengthened its cybersecurity practices and is working to draw lessons from the incident. The company outlined several measures, including conducting comprehensive penetration tests with external experts, tightening internal access controls, enhancing logging and monitoring for faster threat detection, and refining incident response procedures and automated shutdown protocols.Bitrefill acknowledged that this was its first major attack in more than a decade of operation but stressed that it remains well-funded and profitable, capable of absorbing operational losses. Most systems, including payments, stock, and accounts, are back online, with sales volumes returning to normal. “Getting hit by a sophisticated attack sucks ,” the company said. “But we survived. We will continue to do our best to continue deserving our customers’ trust."
United States Latest News, United States Headlines
Similar News:You can also read news stories similar to this one that we have collected from other news sources.
Armed group killed security personnel in an ambush in north-central Nigeria, authorities sayGunmen ambushed and killed security personnel who were on patrol in communities in Nigeria’s Plateau state, according to the state government. It did not specify the number of casualties among the security personnel, which included military officers and local residents, but a local group claimed 20 operatives were killed.
Read more »
North Dakota, Michigan Lead the Pack as Conference Tournaments Heat UpThe bracket is nearly set. The stakes have never been higher. Here is where things stand.
Read more »
Portal North Bridge opens for NJ Transit riders, restoring regular routes and serviceNew Jersey's new Portal North Bridge opened for NJ Transit on Monday, marking a milestone in the Gateway Program after weeks of disruptions.
Read more »
Wendy Funkhouser Named ISS North America West Region PresidentWith 30+ years of workplace hospitality experience, Wendy Funkhouser takes the helm as ISS North America's West Region President. Read the full news here.
Read more »
North Bay agricultural laborers and employers report ICE threats having a chilling effect on jobs, wagesAgricultural employers and workers throughout the North Bay say ongoing federal immigration enforcement actions are severely affecting their ability to earn a living.
Read more »
Bitrefill links Lazarus Group to employee laptop hack, stolen fundsThe most recent news about crypto industry at Cointelegraph. Latest news about bitcoin, ethereum, blockchain, mining, cryptocurrency prices and more
Read more »
