Kraken details how it spotted North Korean hacker in job interview
Us Crypto Exchange Kraken detailed the attempt at a North Korean pirate to infiltrate the organization by applying for a job interview.
“What started as a routine hiring process for an engineering role quickly turned into an information collection operation,” the company wrote in a blog article on May 1.
Kraken said that the applicant’s red flags appeared early in the process when they joined an interview under a different name from what they applied and “sometimes changed their votes”, apparently guided through the interview.
Rather than immediately rejecting the applicant, Kraken decided to advance them through his job process to collect information on the tactics used.
International sanctions have effectively reduced North Korea to the rest of the world, and the Kim family dictatorship in power in the country has long targeted cryptographic companies and users to complete the country’s chests. So far, it has stolen billions of billions of crypto this year.
Kraken reported that industry partners had invoked them that North Korean actors were actively applying for jobs in cryptographic companies.
“We have received a list of email addresses linked to the pirate group, and one of them equaled the email that the candidate used in Kraken,” he said.
With this information, the company’s security team discovered a network of false identities used by the pirate to apply to several companies.
Kraken also noted technical inconsistencies, which included the use of remote mac offices via VPN and modified identification documents.
Kraken CSO @ c7five recently spoken to @Cbsnews On the way in which a North Korean operator tried without success to obtain a job at Kraken.
Do not trust. Check 👇 pic.twitter.com/1vvo3perh2
– Kraken Exchange (@krakenfx) May 1, 2025
The applicant’s curriculum vitae was linked to a GitHub profile containing an e-mail address exposed in an earlier data violation, and the exchange said that the main form of the identification candidate “seemed to be changed, probably using the stolen details in an identity flight case two years before.”
During the end interviews, Kraken’s security director Nick Percoco carried out trap identity check tests that the candidate failed, confirming the deception.
In relation: The break in 2024 of the Lazarus group was repositioned for a hacking of $ 1 billion
“Do not trust, check. This basic crypto principle is more relevant than ever in the digital age,” said Peroco. “State -sponsored attacks are not only a problem of American crypto or business – they are a global threat.”
North Korea achieves the greatest cryptography hacking
The collective hacking group affiliated with North Korea Lazarus was responsible for the piracy of Bybit of $ 1.4 billion in February, the largest ever never sentenced to the cryptography industry.
North Korean pirates also stole more than $ 650 million thanks to several cryptography crampons in 2024, while deploying IT workers to infiltrate blockchain and crypto companies as initiates, according to a statement published by the United States, Japan and South Korea in January.
In April, a Lazarus subgroup was created three Shell companies, with two in the United States, to deliver malicious software to without distrust users and developers of arnan cryptos.
Review: Reds of currency of the Japanese porn star, L2 linked to the Alibaba works at 100K TPS: Asia Express