spot_img
AccueilEnglishCrypto gift-card site Bitrefill hit by hack; 18,500 purchases exposed as North...

Crypto gift-card site Bitrefill hit by hack; 18,500 purchases exposed as North Korea-linked clues emerge

Bitrefill, a popular site that lets people buy gift cards with cryptocurrency, says hackers broke into its systems in early March and viewed data tied to roughly 18,500 purchases, information that could fuel highly targeted scams.

The company says it shut down parts of its network to contain the intrusion and has since brought operations mostly back online. Bitrefill also says some technical breadcrumbs resemble tactics previously linked to North Korean hacking crews often blamed for major crypto thefts, most Lazarus and its offshoot Bluenoroff, though it stopped short of claiming definitive attribution.

A compromised employee laptop opened the door

Bitrefill says the attack started the way many real-world breaches do: an employee’s laptop was compromised, giving intruders a foothold inside the company.

From there, the attackers allegedly found a “legacy” login, an older credential still connected to production systems. That kind of leftover access is common in fast-moving tech companies, and it can be devastating when it’s overlooked.

Bitrefill says the intruders expanded their reach into parts of its database and into certain crypto “hot wallets,” the internet-connected wallets used for day-to-day transactions. Hot wallets keep a global payments business running smoothly, but they’re also a prime target because they’re closer to liquid funds than offline “cold” storage.

The company describes a parallel operation: manipulating gift-card inventory systems while also moving funds from hot wallets to attacker-controlled addresses. In other words, this wasn’t just snooping, it was a smash-and-grab designed to cash out quickly.

What was exposed, and what wasn’t

Bitrefill’s headline number: about 18,500 purchase records were accessed. The exposed data includes customer email addresses, crypto payment addresses, and IP-related metadata.

That’s not the same as a breach spilling Social Security numbers or credit card data, Bitrefill customers pay in crypto, after all, but it’s still enough to identify and profile users. And in phishing, specificity is the weapon.

Bitrefill also says around 1,000 records included customer names stored in encrypted form that “could” have been accessed. Encryption helps, but it doesn’t erase risk: a scammer doesn’t always need to decrypt a name if they can reference a real purchase date, a real email, and a real crypto address to sound legitimate.

The company says it has no proof the entire database was exfiltrated. That distinction matters, “some records viewed” is different from “everything stolen”, but it also leaves customers in the familiar gray zone of modern breaches: absence of proof isn’t proof of absence.

Why Bitrefill is pointing to Lazarus and Bluenoroff

Bitrefill says it saw indicators that resemble operations previously attributed to Lazarus and Bluenoroff, names that routinely surface when crypto platforms get hit. For American readers: Lazarus is widely described by U.S. and allied governments as a North Korea-linked hacking apparatus tied to sanctions-evasion and revenue generation for the regime.

The company cited factors such as malware signals, reused infrastructure, and on-chain tracing, following the movement of stolen crypto across public blockchains, to compare the incident to known campaigns.

On-chain analysis isn’t magic, but it can reveal patterns: how funds move, where they consolidate, and which services or wallets repeatedly show up in laundering routes. Bitrefill says it’s working with on-chain analysts to track where the money went and how it may be recycled.

Context matters here. Crypto industry reporting has pegged suspected North Korea-linked theft in 2025 at about $2.02 billion, up 51% year over year, including one extreme case: a $1.5 billion Bybit hack. Those numbers have made “North Korea” a default suspect in big crypto incidents, but attribution remains tricky because criminals can copy tools and tactics to frame others.

The emergency shutdown, and the business hit that comes with it

Once Bitrefill detected the intrusion, it says it cut off systems to stop the bleeding. For an always-on e-commerce platform that depends on payment rails, vendors, and real-time inventory, that kind of shutdown is costly, but often necessary.

Bitrefill says it first noticed suspicious purchasing patterns and irregularities tied to suppliers. That’s a key detail: the attack wasn’t confined to data access. It hit the mechanics of the business, gift-card inventory and fulfillment, where disruption can quickly cascade into failed orders and customer distrust.

The company says operations are now “almost” back to normal and that it remains profitable and able to absorb the loss, language aimed at preventing the crypto equivalent of a bank run, and reassuring partners who might otherwise pull back.

What customers should do now

Bitrefill says there’s no specific immediate action required for customers. But the practical takeaway is simple: expect sharper, more convincing scams.

If you get an email or message claiming to be “Bitrefill support” asking you to click a link, download a file, “re-verify” your account, or connect your wallet to fix a problem, treat it as hostile until proven otherwise. The most dangerous phishing attempts are the ones that include real details, your email, a crypto address you’ve used before, or a believable reference to a past purchase.

More broadly, the incident is another reminder of crypto’s recurring weak points: internet-connected hot wallets and old credentials that never got fully retired. Bitrefill says it’s tightening access controls, monitoring, and incident response. The bigger implication is for the rest of the industry: if platforms handling crypto payments don’t harden those basics, attackers won’t need new tricks, they’ll just move to the next target.

Key Takeaways

  • Bitrefill says it suffered a cyberattack on March 1, 2026, originating from a compromised employee laptop.
  • About 18,500 purchase records were accessed: emails, crypto addresses, IP metadata; around 1,000 included encrypted names.
  • Technical indicators and on-chain tracing resemble campaigns attributed to Lazarus/Bluenoroff, but there is no definitive legal attribution.
  • The platform shut down and isolated its systems to contain the incident, then nearly fully restored operations.
  • For customers, no action is required, but heightened vigilance is advised against phishing and messages that seem "too believable."

Frequently Asked Questions

What data was exposed in the Bitrefill incident?

Bitrefill says that about 18,500 purchase records were accessed, including email addresses, cryptocurrency payment addresses, and IP metadata. About 1,000 records also contained customer names stored in encrypted form, which may have been accessed.

Do I need to change anything immediately on my Bitrefill account?

According to Bitrefill, no specific immediate action is required. The main advice is to stay alert for suspicious communications—especially emails or messages asking you to click a link, download a file, or connect a wallet to “verify” a transaction.

Why are Lazarus or Bluenoroff mentioned in this hack?

Bitrefill points to similarities with past operations attributed to North Korean groups, based on indicators such as malware elements, reused infrastructure, and on-chain analysis of fund flows. These are technical indicators, not a definitive attribution.

What is a hot wallet, and why is it critical?

A hot wallet is a connected crypto wallet used for day-to-day operations. It’s convenient for a payment platform, but it’s more exposed than a cold wallet. If an attacker gains sufficient access, they can try to move funds quickly to addresses they control.

What is the main risk for customers after this kind of leak?

The number one risk is targeted phishing. With an email address and crypto payment details, a scammer can craft very convincing messages impersonating customer support and push you to connect a wallet or sign a transaction. The best defense is to verify official channels and be wary of urgent requests.

Rédacteur de News at Publi News
Un réel plaisir d'écrire des articles sur différents types de thématiques. Je vous fais profiter des dernières actualités du moment : entreprise, technologies, finance, investissement.
Martin Leroux
Français