gtag('config', 'G-0PFHD683JR');
Crypto News

The North Korean infiltrators are displayed by a candidate for the job

KAKEN, a prominent encrypted currency exchange, has revealed an attempt to infiltrate by one of the North Korean infiltrators that appear as a job candidate.

Security and employment teams presented the candidate through the recruitment process. The goal was to study their strategies and collect critical visions.

How the North Korean infiltrator tried to infiltrate into cars

Kraken detailed the accident in a newly blocked post on May 1. The infiltrator applied for an engineering role on the stock exchange, as he initially appeared as a legal candidate, Stephen Smith. However, several red flags appeared during the recruitment process.

“What started as a routine recruitment process for an engineering role quickly turned into the process of collecting intelligence, as our teams have carefully applied the candidate through our recruitment process to learn more about their tactics at each stage of the process.” male.

The candidate used a different name during the interview and continued to switch the sounds, indicating training. Advance an email linked to North Korean infiltrators.

Moreover, the Open Source Intelligence Collection (OSINT) discovered the candidate’s participation in a network of fake identities.

“This means that our team has revealed a penetration process as an individual has created multiple identities to apply for roles in the encryption space and beyond. Several names have been employed by multiple companies, as our team identified the electronic email addresses related to its associated work. One identity in this network was also a well -known foreign agent in the sanctions list.” Reading the blog.

In addition, technical contradictions in their preparation, such as the use of Mac, referred to a remote access via VPN and the identifiers that have been changed, have indicated an attempt to infiltrate. This information confirmed that the candidate was likely to be infiltrated under the auspices of the state.

In a final interview with the candidate, the chief security officer in Krakin, Nick Persico, and some team members confirmed the company’s doubts. They revealed the failure of the candidate to verify his position or answer questions about their city and their citizenship as lawyers.

“Their mission is to start their work to steal intellectual property, steal money from those companies, acquire a salary, and do so in a wide way,” Berkoku told CBS about the infiltrators.

https://www.youtube.com/watch?

FINCEN suggests a ban on the Huione group on North Korean relations

Meanwhile, in another development, the American Financial Crime Network (FINCEN) proposed a banning of the Campodia -based Huione Group of the US financial system. The administration has identified the main facilitator of North Korean pirate groups, including participants in electronic payments and “swine slaughtering”.

“Huione Group has created itself as a market for the selection of harmful electronic actors such as DPRK and Criminal Cyndicates, who stole billions of dollars from ordinary Americans,” the Secretary of the Treasury Scott best He said.

FINCEN has accused the laundry group more than $ 4 billion of illegal funds between August 2021 and January 2025. According to the administration, the Huione network, including Huione Pay, Huione Crypto, and Haowang Laffice, is a favorite market for cryptocurrencies, and provides services such as payment processing and online market.

“The proposed procedure today will cut the arrival of the Huione group to correspondent banking services, which breaks down the ability of these groups to wash their illegal gains. The cabinet is still committed to disrupting any attempt by harmful cyber actors to secure revenues from or for their criminal plans,” Besent added.

These incidents highlighted a pattern of North Korean electronic attacks in the encrypted currency sector. In 2024, infiltrators stole more than $ 659 million from encryption companies.

According to a joint statement issued by the United States, Japan and the Republic of Korea, North Korean infiltrators targeted the industry using tactics such as social engineering and harmful programs (for example, Tradertraitor, Applejeus). In addition, North Korea IT workers have been identified as threats from the interior of private sector companies.

Previously, Beincrypto reports highlighted the notorious Lazarus collection, a collective participation in North Korea, sponsored by the state in the bombings of Bybit and Upbit. Moreover, the groups of infiltrators from the country were behind the Hack Capital Hack and the exploitation of Bitco DMM.

In fact, the investigator in the series Zakspite discovered a great participation in North Korea in the decentralized financing protocols (Defi), some of which depend on approximately 100 % of its monthly size/fees from the Democratic Republic of Korea (DPRK).

Disintegration

In adherence to the confidence project guidance, beincrypto is committed to unprepared and transparent reporting. This news article aims to provide accurate information in time. However, readers are advised to independently verify facts and consult with a professional before making any decisions based on this content. Please note that the terms, conditions, privacy policy have been updated and the evacuation of responsibility.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button