In short
- Bitrefill was hit by a March 1 cyberattack that escalated from a compromised laptop computer to database and pockets entry, with proof pointing to North Korean hacking teams Lazarus and Bluenoroff.
- About 18,500 buy data have been partially uncovered; no full database exfiltration occurred, and affected customers have been notified straight.
- Most operations have been restored, losses might be lined by operational capital, and Bitrefill is tightening safety measures going ahead.
Bitrefill, a platform that lets customers change cryptocurrency for present playing cards and telephone service credit score, disclosed Tuesday that it was focused in a March 1 cyberattack.
In response to the agency, it started with a compromised worker laptop computer, then expanded into broader infrastructure after attackers exfiltrated a legacy credential tied to a snapshot containing manufacturing secrets and techniques.
In an incident report posted to X, the corporate mentioned the attackers moved from preliminary entry into components of its database and sure cryptocurrency wallets, whereas additionally exploiting present card stock and provider buying traces. Bitrefill mentioned it detected the breach after recognizing suspicious provider buying patterns. As soon as confirmed, it took all programs offline as a part of containment.
The corporate had beforehand disclosed on March 1 that it was coping with a “technical subject” after which later a “safety subject,” at which level it took down all providers. Tuesday was the primary time that Bitrefill supplied full particulars on the assault and potential instigators.
March 1st incident report
On March 1, 2026, Bitrefill was the goal of a cyberattack. Based mostly on indicators noticed in the course of the investigation – together with the modus operandi, the malware used, on-chain tracing and reused IP + e mail addresses (!) – we discover many similarities…
— Bitrefill (@bitrefill) March 17, 2026
The corporate mentioned its investigation discovered a number of indicators that it described as just like prior business assaults from the North Korean state-sponsored hacking teams Lazarus and Bluenoroff, together with malware patterns, on-chain tracing, and reused infrastructure. Bitrefill mentioned it has been working with incident responders, on-chain analysts, and regulation enforcement because the investigation continues.
On buyer affect, Bitrefill mentioned logs present no proof of full database exfiltration, however a subset of data was accessed. The corporate mentioned roughly 18,500 buy data have been affected, together with restricted fields corresponding to e mail addresses, crypto fee addresses, and metadata together with IP addresses.
For roughly 1,000 purchases requiring buyer names, Bitrefill mentioned these fields have been encrypted however is treating them as doubtlessly accessed as a result of attackers might have obtained related keys. The corporate mentioned customers in that subset have been notified straight by e mail.
Bitrefill mentioned it doesn’t require necessary KYC and shops verification data with an exterior supplier, somewhat than in inside backups. Based mostly on present findings, the corporate mentioned it doesn’t imagine clients have to take particular motion, whereas advising warning round sudden Bitrefill- or crypto-related communications.
The corporate mentioned most operations are actually again to regular, together with funds, inventory, and accounts, and that losses might be absorbed by means of operational capital. Bitrefill additionally mentioned it’s persevering with exterior safety opinions and penetration testing, tightening inside entry controls, and upgrading logging, monitoring, and incident-response automation.
North Korean hacking teams have been tied by authorities to many distinguished crypto business heists, together with final yr’s $1.4 billion Bybit change hack, and 2022’s $622 million hack of the Ronin gaming community tied to crypto sport Axie Infinity. Final yr, hackers linked to North Korea swiped over $2 billion value of crypto, per a report from Chainalysis.
Each day Debrief E-newsletter
Begin day by day with the highest information tales proper now, plus authentic options, a podcast, movies and extra.

