Customise Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorised as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyse the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customised advertisements based on the pages you visited previously and to analyse the effectiveness of the ad campaigns.

No cookies to display.

North Korean Cyber Threats: Crypto Job Posting Hacks on the Rise

DL News investigation reveals that North Korean operatives are intensifying their cyber infiltration tactics in the booming crypto industry by exploiting job postings.

Shaun Potts from Plexus, a crypto-specific recruiting firm, highlights the ongoing challenge of such attacks and emphasizes the importance of risk mitigation.

Understanding the Strategy

Cybersecurity experts explain that North Korean hackers employ social engineering techniques to target cryptocurrency companies. These hackers deceive employees through fake job offers or technical support requests, leading them to unwittingly expose the company’s private data to malicious software.

The attackers initiate contact through social or messaging platforms, tricking employees into downloading harmful files under the guise of a skills test or software bug fix, resulting in severe data breaches.

Security expert Taylor Monahan outlines a common method used by hackers to gain access to company systems through social engineering tactics.

Taylor Monahan advises individuals on ways to avoid falling victim to such scams by eliminating single points of failure, using hardware wallets, avoiding running codes from unknown sources, and staying vigilant.

Global Impact and Wider Ramifications

Job posting hacks orchestrated by North Korean operatives are not limited to the crypto industry but extend to other sectors. The UN Security Council reports the involvement of thousands of North Korean nationals with false credentials working in Western tech companies, funneling substantial funds back to their home country annually.

The crypto industry, with its anonymity in digital transactions and job applications, presents an attractive target for such malicious activities. The financial losses resulting from North Korean-related crypto hacks have surpassed $3 billion.

Traditional money launderers are increasingly utilizing cryptocurrency for illicit money transfers, as revealed in a recent Chainalysis report. The report indicates that a significant portion of illicit funds is channeled through intermediary wallets, mixers, privacy coins, and cross-chain protocols.

Image Source: DALL-E, Chart from Tradingview