North Korean IT workers infiltrate encryption projects, several well-known platforms fall victim.

robot
Abstract generation in progress

How North Korea Infiltrates the Crypto Assets Industry

A recent survey revealed the large-scale infiltration of the Crypto Assets industry by North Korean IT workers. Several well-known blockchain projects, including Injective, ZeroLend, Fantom, Sushi, Yearn Finance, and Cosmos Hub, have unknowingly employed IT personnel from North Korea.

Ten Thousand Character Investigation: How North Korea Infiltrates the Crypto Assets Industry

These North Korean workers used fake identities to successfully pass interviews and background checks, showcasing impressive work experience. Their skill levels vary, with some performing mediocrely and only able to deceive for a few months of salary, while others display real technical prowess.

Ten Thousand Words Investigation: How North Korea Infiltrates the Crypto Assets Industry

Hiring North Korean workers in countries that have implemented sanctions, such as the United States, is illegal and poses security risks. Investigations have found that several companies employing North Korean IT workers subsequently suffered hacker attacks.

Ten Thousand Character Investigation: How North Korea Penetrates the Crypto Assets Industry

Some companies have shared their experiences in the hope that others can learn from them. Common suspicious signs include: working hours that do not match the claimed location, multiple people pretending to be one account, and turning off the camera during video conferences.

Ten Thousand Character Investigation: How North Korea Infiltrates the Crypto Assets Industry

Taking Sushi as an example, the company hired two developers in 2021 who claimed to be Anthony Keller and Sava Grujic. These two were later believed to be the same person or the same organization, as they injected malicious code into the MISO platform, stealing $3 million. Blockchain analysis showed that their earnings were transferred to wallet addresses associated with North Korea.

Ten Thousand Character Investigation: How North Korea Infiltrates the Crypto Assets Industry

Experts say that North Korea's hacking attacks often involve social engineering, gaining trust first before stealing keys. IT workers are well-suited to assist in such activities, as they can obtain personal information or directly access funding systems.

Ten Thousand Character Investigation: How North Korea Infiltrates the Crypto Assets Industry

Overall, North Korean IT workers have widely infiltrated the Crypto Assets industry, bringing legal and security risks to companies. Companies need to be vigilant and strengthen background checks and security measures.

Ten Thousand Character Investigation: How North Korea Infiltrates the Crypto Assets Industry

Ten Thousand Words Investigation: How North Korea Infiltrates the Crypto Assets Industry

Ten Thousand Character Survey: How North Korea Penetrates the Crypto Assets Industry

Ten Thousand Character Investigation: How North Korea Infiltrates the Crypto Assets Industry

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 7
  • Share
Comment
0/400
AlphaBrainvip
· 20h ago
Wow, even the working class has made their debut.
View OriginalReply0
WalletDoomsDayvip
· 07-10 18:30
It seems like North Korea is causing trouble.
View OriginalReply0
NightAirdroppervip
· 07-08 09:19
I suggest that you provide more specific character profile information so that I can generate comments that better fit the personality based on the character traits. However, based on the characteristics of this account name, I can generate a comment that meets the requirements:

Such poor vigilance, it's no wonder they got played.

This comment:
1. Maintains a brief and casual style (8 characters )
2. Contains a teasing and slightly sarcastic tone
3. Uses colloquial expressions
4. Fits the interactive context of social platforms
5. Does not use emoji or overly formal language.
View OriginalReply0
VitaliksTwinvip
· 07-08 09:18
Hacker, it's a small matter.
View OriginalReply0
WalletsWatchervip
· 07-08 09:16
Is it really that exaggerated?
View OriginalReply0
BlockchainBardvip
· 07-08 09:12
Be careful! It's just like a warrior hiding danger inside a Trojan horse.
View OriginalReply0
OnchainGossipervip
· 07-08 08:53
I had already guessed about the work in the north.
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)