Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Collapse
Brand Logo
UDS UDS: $2.5193
24h: 0.51%
Trade UDS
Gate.io
Gate.io
UDS / USDT
MEXC
MEXC
UDS / USDT
WEEX
WEEX
UDS / USDT
COINSTORE
COINSTORE
UDS / USDT
Biconomy.com
Biconomy.com
UDS / USDT
BingX
BingX
UDS / USDT
XT.COM
XT.COM
UDS / USDT
Uniswap v3
Uniswap v3
UDS / USDT
PancakeSwap v3
PancakeSwap v3
UDS / USDT

Earn up to 50 UDS per post

Post in Forum to earn rewards!

Learn more
UDS Right

Spin your Wheel of Fortune!

Earn or purchase spins to test your luck. Spin the Wheel of Fortune and win amazing prizes!

Spin now
Wheel of Fortune
selector
wheel
Spin

Paired Staking

Stake $UDS
APR icon Earn up to 50% APR
NFT icon Boost earnings with NFTs
Earn icon Play, HODL & earn more
Stake $UDS
Stake $UDS
UDS Left

Buy UDS!

Buy UDS with popular exchanges! Make purchases and claim rewards!

Buy UDS
UDS Right

Post in Forum to earn rewards!

UDS Rewards
  1. Home
  2. Crypto-Detective
  3. 🚨 North Korean IT Workers Infiltrate Crypto Projects via Fake IDs & Google Tools

🚨 North Korean IT Workers Infiltrate Crypto Projects via Fake IDs & Google Tools

Scheduled Pinned Locked Moved Crypto-Detective
3 Posts 3 Posters 15 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
This topic has been deleted. Only users with topic management privileges can see it.
  • johnblockbusterJ Offline
    johnblockbusterJ Offline
    johnblockbuster
    wrote on last edited by
    #1

    0198a647-1c9c-784f-8fa4-26839dc6f098.webp

    A small DPRK team linked to a $680K crypto hack in June has been exposed using fake identities, Google products, and freelance platforms to penetrate the Web3 industry.

    πŸ•΅οΈ Key findings (via @zachxbt):

    The six-person team used at least 31 fake identities with real government IDs, phone numbers, and purchased Upwork/LinkedIn accounts.

    Posed as engineers from Polygon Labs, OpenSea, and Chainlink in scripted interviews.

    Secured jobs on Upwork as blockchain devs, accessed companies using AnyDesk, VPNs, and Google tools for ops and comms.

    Monthly expenses to run the op: $1,489 (as shown in internal docs).

    Tied to $680K exploit on Favrr in June 2025 via wallet 0x78e1a.

    Used Payoneer to convert fiat to crypto.

    πŸ“‚ Leaked docs show:

    Interview prep docs.

    Curiosity in AI firms and ERC-20 deployment on Solana.

    Chrome profiles, Google Drive exports, and budget spreadsheets in English via translation tools.

    🧠 Why it matters:

    DPRK ops aren’t always sophisticated, just persistent.

    Lax hiring and minimal due diligence = big vulnerabilities.

    U.S. Treasury recently sanctioned multiple actors linked to similar rings.

    πŸ”’ Takeaway for crypto orgs:
    Stronger due diligence and better platform coordination are urgently needed.

    1 Reply Last reply
    2
    • J Offline
      J Offline
      jacson4
      wrote on last edited by
      #2

      What stands out to me is how this DPRK team didn’t rely on ultra-sophisticated zero-day exploits β€” instead, they exploited human trust and weak verification processes. Fake LinkedIn/Upwork accounts, scripted interviews, and remote access tools like AnyDesk are not cutting-edge hacks, yet they still breached companies handling millions. This should be a wake-up call for Web3 firms to treat hiring pipelines as part of their security perimeter. Identity verification, multi-stage interviews, and background checks need to be standard, especially for remote dev roles with sensitive access.

      1 Reply Last reply
      0
      • Nahid10N Offline
        Nahid10N Offline
        Nahid10
        wrote on last edited by
        #3

        This case highlights a huge vulnerability in the freelance economy β€” especially in crypto. Platforms like Upwork and LinkedIn are fantastic for finding talent, but they’re also perfect hunting grounds for nation-state actors who can blend in as skilled remote workers. Once inside, even with a small contract, they gain tools, credentials, and insider knowledge. It’s not just a blockchain problem; any remote-first tech company could be next. The industry desperately needs better collaboration between freelance platforms, security researchers, and hiring managers to flag suspicious patterns before these actors cash out with another $680K.

        1 Reply Last reply
        0


        • Login or register to search.
        Powered by NodeBB Contributors
        • First post
          Last post
        0
        • Categories
        • Recent
        • Tags
        • Popular
        • World
        • Users
        • Groups