Us Crypto Exchange Kraken detailed the North Korean hacker attempt to infiltrate the organization by applying for a work interview.
“What started as a routine recruitment process for an engineering role that quickly turned into an intelligence collection,” the company books In the May 1 blog post.
Krakin said that the red flags of the applicant appeared early in this process when they joined an interview under a different name from what they applied with and “sometimes turned between the voices”, apparently directed during the interview.
Instead of the applicant’s refusal to immediately, Kraken decided to submit it through the recruitment process to collect information about the tactics used.
International sanctions have actually cut North Korea from the rest of the world, and the dictatorship of the Kim ruling family has targeted the encryption companies and users for a long time to lead the country’s treasures. Billions of encryption have been hurried so far this year.
Kraken reported that industry partners had stopped them that North Korean actors were actively applying for jobs in encryption companies.
He said: “We have received a list of email -related email addresses, and one of them matched the email used by the candidate used to apply to Kraken.”
With this information, the company’s security team revealed a network of fake identities that the infiltrator uses to apply to multiple companies.
Kraken also noticed technical contradictions, which included the use of Mac desktops from a remote through VPNS and modified identity documents.
Kraken cseo @c7five I recently spoken to CBSNEWS On how to try North Korea without success, get a job in Kraken.
Do not trust. Check 👇 pic.twitter.com/1vvo3perh2
– Krakeen Exchang (@krakenfx) May 1, 2025
Your CV of the applicant has been linked to the GitHub definition file containing an exposed email address in the previous data breach, and the stock market said that the basic form of the candidate “appears to have been changed, probably using stolen details in case of identity theft two years ago.”
During the final interviews, Kaken’s chief security staff Nick PercoCO conducted the TRP audit tests that failed the candidate, confirming deception.
Related to: The temporary suspension of the Lazaros Group for 2024 was re -identified for $ 1.4 billion in BYBIT
“Don’t trust, achieve. This basic encryption principle is more relevant than ever in the digital age,” said Peruku. “The state’s attacks are not just an encrypted or the issue of American companies-they are a global threat.”
North Korea withdraws the largest encryption ever
The Lazarus Collective Group that followed North Korea was responsible for penetrating the $ 1.4 billion in the stock exchange in February, the largest ever for the encryption industry.
North Korea’s infiltrators stole more than 650 million dollars through many encryption speeds during 2024, while information technology workers were published to infiltrate into Blockchain and Crypto companies as threats from the inside, According to A statement issued by the United States, Japan and South Korea in January.
In April, a sub -group of Lazaros was found that created three shell companies, with two in the United States, to deliver harmful programs to reassuring users and fraud coding developers.
magazine: Flags of the Japanese star, the red star, L2 associated with alibaba running at 100,000 TPS: asia Express