North Korean crypto infiltration is much worse than everyone thinks, says SEAL member
0
0

North Koreaâs infiltration of crypto is far worse than anyone realises.
Pablo Sabbatella, founder of web3 audit firm opsek and current Security Alliance member, dropped a bombshell at Devconnect in Buenos Aires: North Korean infiltrators are embedded in up to 20% of all crypto companies.
âNorth Korea is much worse than everybody thinks,â Sabbatella said in an interview with DL News. Even more alarming is that Sabatella reckons North Korean operatives may operate â30% to 40%â of all crypto applications.
If those estimates are correct, the scope of potential damage is staggering.
Moreover, the scale of North Korean penetration isnât just about hackers stealing funds, even though theyâve gotten away with billions. Instead, itâs about workers getting hired at legitimate companies, gaining access to systems, and operating infrastructure that underpins major crypto companies.
Hackers from North Korea have stolen more than $3 billion worth of cryptocurrency over the past three years through sophisticated malware and social engineering, said the US Treasury department in November.
The funds were then put to use for Pyongyangâs nuclear weapons programmes.
How they get hired
For the most part, North Korean workers donât apply for jobs directly, because international sanctions make that impossible.
Instead, they find unsuspecting remote workers from around the world to act as fronts. Some of them now act as recruiters who bring in collaborators from outside North Korea to work under stolen identities.
According to a recent Security Alliance report, these recruiters use freelance platforms like Upwork and Freelancer to reach individuals around the world â particularly in Ukraine, the Philippines, and other developing countries.
The pitch is simple. Hand over your verified account credentials or let the North Korean actor use your identity remotely. In exchange, the collaborator gets 20% of earnings. The North Korean operative keeps 80%.
A lot of North Korean hackers target the US, Sabbatella said.
âWhat they do to get hired is find someone in the US to become their âfront-end,ââ Sabbatella explained. âSo they pretend to be someone from China that doesnât know how to speak English but they need to get an interview.â
They then infect the front personâs computer with malware, giving them access to a US IP address and much more of the internet than they could reach from North Korea.
Once hired, companies keep them around because they deliver.
âThey work well, they work a lot, and they never complain,â Sabbatella told DL News.
So how does a company know if theyâre employing a North Korean hacker?
âAsk them if they think Kim Jong Un is a creep or something bad,â Sabbatella said. âThey arenât allowed to say anything bad.â
Operational security
North Koreaâs successful criminal endeavours arenât just clever social engineering, however.
Itâs that crypto companies â and users â make it easy for them.
âThe crypto industry probably has the worst opsec in the entire computer industry,â Sabbatella said. Crypto founders are âfully doxxed, do a terrible job at holding their private keys securely, and easily fall victim to social engineering.â
Operational Security, or OPSEC, is a systematic process for identifying and protecting critical information from adversaries.
The lack of operational security creates an environment where âevery single personâs computer is going to get infected with malware at some point in their lives,â said Sabbatella.
Pedro Solimano is DL Newsâ Buenos Aires-based markets correspondent. Got a tip? Email him at psolimano@dlnews.com.
0
0
Securely connect the portfolio youâre using to start.
