North Korean hackers are employing sophisticated tactics to infiltrate key IT roles in the crypto industry, using fake identities and document manipulation.
Methods Used by North Korean Hackers
Recent investigations have shown that a group of five North Korean hackers is utilizing over 30 fake identities to apply for IT and cryptocurrency positions. These hackers leverage counterfeit identification and freelance accounts on platforms like Upwork and LinkedIn.
Detection of Fake Identities
Authorities have found that Binance continuously filters candidates from North Korea, as hackers attempt to access critical positions in the crypto sector. Some hackers create fake profiles on social media to enhance their hiring prospects. There have been instances where hackers built infrastructure for Web3 projects, leading to compromised smart contracts.
Vulnerabilities in the Crypto Industry
There are concerns that the infiltration of North Korean hackers into the crypto industry could result in significant vulnerabilities. Hackers have offered Upwork users to connect to their computers remotely to use new accounts. Attempts to infect software through fake download links that disguise malware are also being reported.
The situation surrounding the activity of North Korean hackers highlights the importance of vetting candidates in the IT sector, particularly in high-risk areas like cryptocurrency.