0%

How we identified a North Korean hacker who tried to get a job at Kraken

4 jam yang lalu 5 menit baca
Gambar Spanduk Artikel Berita

Our teams recently identified a North Korean hacker’s attempts to infiltrate our ranks by applying for a job at Kraken.

Watch CBS News’ full coverage of how Kraken identified — and then strategically interacted with — a North Korean hacker who tried to get a job at Kraken

What started as a routine hiring process for an engineering role quickly turned into an intelligence gathering operation, as our teams carefully advanced the candidate through our hiring process to learn more about their tactics at every stage of the process.

This is an established challenge for the crypto community, with estimates indicating that North Korean hackers stole over $650 million from crypto firms in 2024 alone. We’re disclosing these events today as part of our ongoing transparency efforts and to help companies, both in crypto and beyond, to strengthen their defenses.

The candidate’s red flags

From the outset, something felt off about this candidate. During their initial call with our recruiter, they joined under a different name from the one on their resume, and quickly changed it. Even more suspicious, the candidate occasionally switched between voices, indicating that they were being coached through the interview in real time.

Before this interview, industry partners had tipped us off that North Korean hackers were actively applying for jobs at crypto companies. We received a list of email addresses linked to the hacker group, and one of them matched the email the candidate used to apply to Kraken.

With this intelligence in hand, our Red Team launched an investigation using Open-Source Intelligence gathering (OSINT) methods. One method involved analyzing breach data, which hackers often use to identify users with weak or reused passwords. In this instance, we discovered that one of the emails associated with the malicious candidate was part of a larger network of fake identities and aliases.

This meant that our team had uncovered a hacking operation where one individual had established multiple identities to apply for roles in the crypto space and beyond. Several of the names had previously been hired by multiple companies, as our team identified work-related email addresses linked to them. One identity in this network was also a known foreign agent on the sanctions list.

As our team dug deeper into the candidate’s history and credentials, technical inconsistencies emerged

  • The candidate used remote colocated Mac desktops but interacted with other components through a VPN, a setup commonly deployed to hide location and network activity.

  • Their resume was linked to a GitHub profile containing an email address exposed in a past data breach.

  • The candidate’s primary form of ID appeared to be altered, likely using details stolen in an identity theft case two years prior.

By this point, the evidence was clear, and our team was confident this wasn’t just a suspicious job applicant, but a state-sponsored infiltration attempt.

Turning the tables – how our team responded

Instead of tipping off the applicant, our security and recruitment teams strategically advanced them through our rigorous recruitment process – not to hire, but to study their approach. This meant putting them through multiple rounds of technical infosec tests and verification tasks, designed to extract key details about their identity and tactics.

The final round interview? A casual chemistry interview with Kraken’s Chief Security Officer (CSO) Nick Percoco and several other team members. What the candidate didn’t realize was that this was a trap – a subtle but deliberate test of their identity.

Between standard interview questions, our team slipped in two-factor authentication prompts, such as asking the candidate to verify their location, hold up a government-issued ID, and even recommend some local restaurants in the city they claimed to be in.

At this point, the candidate unraveled. Flustered and caught off guard, they struggled with the basic verification tests, and couldn’t convincingly answer real-time questions about their city of residence or country of citizenship. By the end of the interview, the truth was clear: this was not a legitimate applicant, but an imposter attempting to infiltrate our systems.

Commenting on the events, CSO Nick Percoco, said:

“Don’t trust, verify. This core crypto principle is more relevant than ever in the digital age. State-sponsored attacks aren’t just a crypto, or U.S. corporate, issue – they’re a global threat. Any individual or business handling value is a target, and resilience starts with operationally preparing to withstand these types of attacks.”

Key takeaways

  • Not all attackers break in, some try to walk through the front door. As cyber threats evolve, so must our security strategies. A holistic, proactive approach is critical to protect an organization.

  • Generative AI is making deception easier, but isn’t foolproof. Attackers can trick parts of the hiring process, like a technical assessment, but genuine candidates will usually pass real-time, unprompted verification tests. Try to avoid patterns in the types of verification questions that hiring managers use.

  • A culture of productive paranoia is key. Security isn’t just an IT responsibility. In the modern era, it’s an organizational mindset. By actively engaging this individual, we identified areas to strengthen our defenses against future infiltration attempts.

The next time a suspicious job application comes through remember: Sometimes, the biggest threats come disguised as opportunities.

Watch the CBS News video

The post appeared first on Kraken Blog.

Berita populer

How to Set Up and Use Trust Wallet for Binance Smart Chain
#Bitcoin#Bitcoins#Config+2 lebih banyak tag

How to Set Up and Use Trust Wallet for Binance Smart Chain

Your Essential Guide To Binance Leveraged Tokens

Your Essential Guide To Binance Leveraged Tokens

How to Sell Your Bitcoin Into Cash on Binance (2021 Update)
#Subscriptions

How to Sell Your Bitcoin Into Cash on Binance (2021 Update)

What is Grid Trading? (A Crypto-Futures Guide)

What is Grid Trading? (A Crypto-Futures Guide)

Mulai trading dengan Cryptohopper secara gratis!

Gratis digunakan - tanpa perlu kartu kredit

Mari kita mulai
Cryptohopper appCryptohopper app

Disclaimer: Cryptohopper bukanlah entitas teregulasi. Bot trading mata uang kripto melibatkan risiko besar, dan kinerja masa lalu tidak merefleksikan hasil di masa depan. Keuntungan yang ditampilkan dalam tangkapan layar produk hanya untuk tujuan ilustrasi dan mungkin terkesan dibesar-besarkan. Bergabunglah trading bot hanya jika Anda memiliki pengetahuan yang cukup atau mencari panduan dari penasihat keuangan yang terkualifikasi. Dalam situasi apa pun Cryptohopper tidak akan bertanggung jawab kepada orang atau entitas mana pun atas (a) kerugian atau kerusakan, secara keseluruhan atau sebagian, yang disebabkan oleh, yang timbul dari, atau sehubungan dengan transaksi yang melibatkan perangkat lunak kami atau (b) kerugian langsung, tidak langsung, khusus, konsekuensial, atau insidental. Harap dicatat bahwa konten yang tersedia di platform trading sosial Cryptohopper dibuat oleh anggota komunitas Cryptohopper dan bukan merupakan saran atau rekomendasi dari Cryptohopper atau atas namanya. Keuntungan yang ditampilkan di Marketplace tidak merefleksikan hasil di masa depan. Dengan menggunakan layanan Cryptohopper, Anda mengakui dan menerima risiko yang terkait dalam trading mata uang kripto dan setuju untuk membebaskan Cryptohopper dari segala kewajiban atau kerugian yang terjadi. Peninjauan dan pemahaman atas Ketentuan Layanan dan Kebijakan Pengungkapan Risiko kami sangatlah penting sebelum Anda menggunakan perangkat lunak kami atau terlibat dalam aktivitas trading apa pun. Silakan berkonsultasi dengan profesional hukum dan keuangan untuk mendapatkan saran yang dipersonalisasi berdasarkan keadaan spesifik Anda.

©2017 - 2025 Hak cipta oleh Cryptohopper™ - Semua hak dilindungi undang-undang.