Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Sony’s blockchain venture Soneium has a phishing scam issue

    August 14, 2025

    The Business Imperative Behind the Ethereum Vision

    August 14, 2025

    North Korean IT workers used 30+ fake IDs to target crypto companies: report

    August 14, 2025
    Facebook X (Twitter) Instagram
    Block Buzz News
    • Bitcoin
    • Coinbase
      • Litecoin
      • Altcoins
    • Blockchain
    • Crypto
    • Ethereum
    • Lithosphere News Releases
    Facebook X (Twitter) Instagram YouTube
    Block Buzz News
    Home » North Korean IT workers used 30+ fake IDs to target crypto companies: report
    Crypto

    North Korean IT workers used 30+ fake IDs to target crypto companies: report

    James WilsonBy James WilsonAugust 14, 2025No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email



    A compromised device from a North Korean IT worker has exposed the inner workings of the team behind the $680,000 Favrr hack and their use of Google tools to target crypto projects.

    Summary

    • A compromised device belonging to a North Korean IT worker exposed the inner workings of threat actors.
    • Evidence shows operatives used Google powered tools, AnyDesk, and VPNs to infiltrate crypto firms.

    According to on-chain sleuth ZachXBT, the trail began with an unnamed source who gained access to one of the workers’ computers, uncovering screenshots, Google Drive exports, and Chrome profiles that pulled back the curtain on how the operatives planned and carried out their schemes.

    Drawing on wallet activity and matching digital fingerprints, ZachXBT verified the source material and tied the group’s cryptocurrency dealings to the June 2025 exploit of the fan-token marketplace Favrr. One wallet address, “0x78e1a,” showed direct links to stolen funds from the incident.

    Inside the operation

    The compromised device showed that the small team — six members in total — shared at least 31 fake identities. To land blockchain development jobs, they amassed government-issued IDs and phone numbers, even buying LinkedIn and Upwork accounts to complete their cover.

    An interview script found on the device showed them boasting of experience at well-known blockchain firms, including Polygon Labs, OpenSea, and Chainlink.

    Google tools were central to their organized workflow. The threat actors were found to be using drive spreadsheets to track budgets and schedules, while Google Translate bridged the language gap between Korean and English. 

    Among the information pulled from the device was a spreadsheet that showed IT workers were renting computers and paying for VPN access to buy fresh accounts for their operations.

    The team also relied on remote access tools such as AnyDesk, allowing them to control client systems without revealing their true locations. VPN logs tied their activity to multiple regions, masking North Korean IP addresses.

    Additional findings revealed the group looking up ways to deploy tokens across different blockchains, scouting AI firms in Europe, and mapping out fresh targets in the crypto space.

    North Korean threat actors use remote jobs

    ZachXBT found the same pattern flagged in multiple cybersecurity reports — North Korean IT workers landing legitimate remote jobs to slip into the crypto sector. By posing as freelance developers, they gain access to code repositories, backend systems, and wallet infrastructure.

    One document uncovered on the device was interview notes and preparation materials likely meant to be kept on-screen or nearby during calls with potential employers.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    James Wilson

    Related Posts

    Bitcoin price hits new all time high, what’s next?

    August 14, 2025

    Maple launches yield-bearing collateral for perps on Drift

    August 14, 2025

    Altcoin season or not? A look at the numbers driving speculation

    August 14, 2025

    What is Rekt? Guide to history, uses, and future trends

    August 14, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    MicroStrategy director quietly dumps all his MSTR shares

    June 15, 2025

    Can XRP rally to $7 with Ripple’s bullish catalysts in 2025?

    June 15, 2025

    Polyhedra’s ZKJ token collapses following ‘abnormal on-chain activity’

    June 16, 2025

    Colle AI Releases Design-Focused NFT Tools for Real-Time Creator Prototyping

    June 16, 2025
    Don't Miss
    Coinbase

    Sony’s blockchain venture Soneium has a phishing scam issue

    By John SmithAugust 14, 2025

    A quick search on Google for Soneium reveals a deceptive top result that, if engaged…

    The Business Imperative Behind the Ethereum Vision

    August 14, 2025

    North Korean IT workers used 30+ fake IDs to target crypto companies: report

    August 14, 2025

    Michael Saylor says he’s paying bitcoin taxes, unlike ‘crypto-anarchists’

    August 14, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us

    BlockBuzzNews: Your daily dose of the latest in cryptocurrency trends, insights, and updates!

    Our Picks

    Sony’s blockchain venture Soneium has a phishing scam issue

    August 14, 2025

    The Business Imperative Behind the Ethereum Vision

    August 14, 2025

    North Korean IT workers used 30+ fake IDs to target crypto companies: report

    August 14, 2025
    Most Popular

    MicroStrategy director quietly dumps all his MSTR shares

    June 15, 2025

    Can XRP rally to $7 with Ripple’s bullish catalysts in 2025?

    June 15, 2025

    Polyhedra’s ZKJ token collapses following ‘abnormal on-chain activity’

    June 16, 2025

    Type above and press Enter to search. Press Esc to cancel.