温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.bee.com/ko/61470.html
点击访问原文链接

Stealth Warfare: North Korean hackers have infiltrated 20% of crypto companies | Bee Network

Stealth Warfare: North Korean hackers have infiltrated 20% of crypto companies | Bee Network Login 인기 뉴스 밈 런치패드 AI 에이전트 DeSci 탑체인 익스플로러 뉴비의 경우 100x 코인 꿀벌 게임 필수 웹사이트 필수 앱 암호화폐 유명인 드핀 루키 에센셜 함정 탐지기 기본 도구 고급 웹사이트 교환 NFT 도구 안녕, 로그아웃 웹3 유니버스 계략 DApp 꿀벌 하이브 성장하는 플랫폼 기원 후 찾다 영어 코인 충전 로그인 다운로드 웹3 유니 계략 DApp 꿀벌 하이브 기원 후 분석•본문 Stealth Warfare: North Korean hackers have infiltrated 20% of crypto companies분석3개월 전업데이트와이엇 15,249 6 Original article translated by: Deep Tide TechFlow

Pablo Sabbatella, SEAL member and founder of Web3 auditing firm opsek. Source: Pedro Solimano

North Korean agents have infiltrated 15%-20% of 암호화폐 companies.

According to a SEAL member, 30%-40% of crypto industry job applications may come from North Korean agents.

The encryption industry has been criticized for having “the worst operational security (opsec) in the entire computer industry,” according to Pablo Sabbatella.

North Korea’s penetration into the crypto industry is far greater than people realize.

Pablo Sabbatella, founder of Web3 auditing firm Opsek and a current member of the Security Alliance, dropped a bombshell at the Devconnect conference in Buenos Aires: North Korean agents may have infiltrated as many as 20% of crypto companies.

“The situation in North Korea is much worse than people imagine,” Sabbatella told DL News. He further alarmingly pointed out that 30-40% of crypto industry job applications may come from North Korean agents attempting to infiltrate related organizations.

If these estimates are true, their potential destructive power would be incredible.

More importantly, North Korea’s infiltration isn’t just about stealing funds through hacking, although they have already stolen billions of dollars through sophisticated malware and social engineering. The bigger problem is that these agents are employed by legitimate companies, gain system privileges, and manipulate the infrastructure that underpins major crypto companies.

According to a U.S. Treasury report last November, North Korean hackers stole more than $3 billion in cryptocurrency over the past three years. These funds were subsequently used to support Pyongyang’s nuclear weapons program.

How do North Korean agents infiltrate the crypto industry? North Korean workers typically do not apply for jobs directly because international sanctions prevent them from participating in the recruitment process under their real identities.

Instead, they seek out unsuspecting remote workers around the world to act as “agents.” Some of these agents have even transitioned into recruiters, helping North Korean agents use stolen identities to hire more overseas collaborators.

According to a recent report by Security Alliance, these recruiters reach out to individuals around the world through freelance platforms such as Upwork and Freelancer, with a primary focus on Ukraine, the Philippines, and other developing countries.

Their “deal” is very simple: provide verified account credentials or allow North Korean agents to use your identity remotely. In return, the collaborator receives 20% of the revenue, while the North Korean agents keep 80%.

Sabbatella stated that many North Korean hackers target the United States.

“Their approach is to find Americans to act as their ‘front end’,” Sabbatella explained. “They would pretend to be from China, not speak English, and need someone to help them with the interviews.”

Next, they would infect the computers of the “front-end” personnel with malware, thereby obtaining US IP addresses and gaining access to more internet resources than they had in North Korea.

Once hired, these hackers are usually not fired because their performance satisfies the company.

“They are highly efficient, work long hours, and never complain,” Sabbatella told DL News.

Sabbatella offered a simple test: “Ask them if they think Kim Jong-un is a weirdo or something bad about him.” He said, “They are not allowed to say anything bad.”

Operational security vulnerabilities However, North Korea’s success is not solely due to sophisticated social engineering.

Crypto companies—and users—have made it all easier.

“The crypto industry is probably the worst in terms of operational security (opsec) in the entire computer industry,” Sabbatella said. He criticized the founders of the crypto industry as “fully doxxed, poor at protecting their private keys, and vulnerable to social engineering.”

Operational Security (OPSEC) is a systematic process for identifying and protecting critical information from adversary threats.

The lack of operational security creates a high-risk environment. “Almost everyone’s computer will be infected with malware at least once in their lifetime,” Sabbatella said.

Update Notes

Update: This article has been updated to include a clarification from Sabbatella, who points out that North Korea does not control 30%-40% of crypto applications; the aforementioned percentage actually refers to the proportion of North Korean agents in crypto job applications.

이 글은 인터넷에서 퍼왔습니다: Stealth Warfare: North Korean hackers have infiltrated 20% of crypto companiesRecommended Articles

Related: Aster CEO explains token value; staking and on-chain buybacks are coming. Compiled by Odaily Planet Daily ( @OdailyChina ); Translated by Ethan ( @ethanzhang_웹3) With privacy once again becoming a focal point, DEXs face not only a battle for traffic but also the ultimate test of their underlying architecture and user experience. Even so, most DEXs still struggle to balance performance, transparency, and privacy protection, failing to meet the needs of professional traders and institutional users. Aster is attempting to provide its own answer to how to build a trading ecosystem that combines the smoothness of a CEX with the trustworthiness of a DEX. In a community AMA on November 10th, Aster CEO Leonard systematically outlined Aster’s complete roadmap for building an institutional-grade DEX, centered around its self-developed privacy-focused L1 blockchain. The discussion covered a wide range of topics of concern…

# 분석# 암호# 토큰# 웹3© 版权声명배열 上一篇 Institutional selling? What is the real meaning behind BlackRock's large transfer of cryptocurrency to Coinbase? 下一篇 The latest SOL proposal aims to lower the inflation rate. What are the opponents thinking? 상关文章 더운Chillhouse, the leader in the rise, and the past and present of the “Web3 Fun Man” 6086cf14eb90bc67ca4fc62b 19,119 1 Monthly transaction volume exceeds 84 million USD, is Odin.Fun the new savior of BTC ecosystem? (with gameplay tutorial) 6086cf14eb90bc67ca4fc62b 38,723 4 YZi Labs’ first biotech investment: Renewal Bio Investment 6086cf14eb90bc67ca4fc62b 17,666 3 InfoFi’s Dilemma in the Attention Economy 6086cf14eb90bc67ca4fc62b 28,807 1 Say Goodbye to Mnemonic Phrase Anxiety: Understand How Account Abstraction Can Refactor the Web3 Experience 6086cf14eb90bc67ca4fc62b 19,571 Arthur Hayes’ latest podcast: He got the script for next year and has already fired 90% of the shots. 6086cf14eb90bc67ca4fc62b 18,919 2 댓글 없음 댓글을 남기시려면 로그인이 필요합니다! 즉시 로그인 댓글이 없습니다... Bee.com 세계 최대의 Web3 포털 파트너 코인카프 바이낸스 코인마켓캡 코인게코 코인라이브 갑옷 Bee Network 앱을 다운로드하고 web3 여정을 시작하세요 백지 역할 자주하는 질문 © 2021-2026. 모든 권리 보유. 개인 정보 정책 | 서비스 약관 꿀벌 네트워크 앱 다운로드 Web3 여정을 시작해보세요 세계 최대의 Web3 포털 파트너 CoinCarp Binance CoinMarketCap CoinGecko Coinlive Armors 백지 역할 자주하는 질문 © 2021-2026. 모든 권리 보유. 개인 정보 정책 | 서비스 약관 찾다 찾다사이트에온체인사회의소식 熱门推荐 : 에어드롭 헌터 데이터 분석 암호화폐 유명인 함정 탐지기 한국어 English 繁體中文 简体中文 日本語 Tiếng Việt العربية Bahasa Indonesia हिन्दी اردو Русский 한국어

智能索引记录