温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.bee.com/ur/55579.html
点击访问原文链接

After reverse hacking North Korean hackers, I saw how they workRecommended Articles | Bee Network

After reverse hacking North Korean hackers, I saw how they workRecommended Articles | Bee Network Login ٹرینڈنگ نیوز میمی لانچ پیڈ اے آئی ایجنٹس DeSci TopChainExplorer نیوبی کے لیے 100x سکے مکھی کا کھیل ضروری ویب سائٹس اے پی پی کا ہونا ضروری ہے۔ کرپٹو مشہور شخصیات DePIN Rookies ضروری ٹریپ ڈیٹیکٹر بنیادی ٹولز اعلی درجے کی ویب سائٹس تبادلہ NFT ٹولز ہیلو، باہر جائیں ویب 3 کائنات کھیل ڈی اے پی پی شہد کی مکھیوں کا چھتا بڑھتا ہوا پلیٹ فارم AD تلاش کریں۔ انگریزی سکے ریچارج کریں۔ لاگ ان کریں ڈاؤن لوڈ کریں ویب 3 یونی کھیل ڈی اے پی پی شہد کی مکھیوں کا چھتا AD گھرتجزیہ•After reverse hacking North Korean hackers, I saw how they workRecommended Articles After reverse hacking North Korean hackers, I saw how they workRecommended Articlesتجزیہ7 ماہ پہلے更新وائٹ 25,8801 31 Odaily Planet Daily کے ذریعہ مرتب کردہ ( @OdailyChina ); Translated by Azuma ( @azuma_eth )

Editor’s Note: North Korean hackers have always been a major threat to the کرپٹوcurrency market. In the past, victims and industry security professionals could only infer North Korean hackers’ behavior patterns by reverse engineering related security incidents. However, yesterday, renowned on-chain detective ZachXBT, in a recent tweet, cited an investigation and analysis by a white-hat hacker who reverse-hackered North Korean hackers. This proactive analysis reveals the North Korean hackers’ working methods for the first time , potentially providing positive insights into preemptive security measures for industry projects.

The following is the full text of ZachXBT, compiled by Odaily Planet Daily.

An anonymous hacker recently compromised the device of a North Korean IT worker, revealing how a five-person technical team operated over 30 fake identities , using fake government-issued IDs and purchased Upwork and LinkedIn accounts to infiltrate various development projects.

Investigators obtained Google Drive data, Chrome browser profiles, and device screenshots, which revealed that the team relied heavily on Google tools to coordinate work schedules, assign tasks, and manage budgets, with all communications conducted in English.

A weekly report from 2025 revealed the hacker team’s work patterns and the difficulties they encountered. For example, one member complained that they “couldn’t understand the job requirements and didn’t know what to do.” The corresponding solution was to “dedicate ourselves and work harder.”

Detailed expense records show that their expenditure items include purchasing social security numbers (SSNs), Upwork and LinkedIn account transactions, renting phone numbers, subscribing to AI services, renting computers, and purchasing VPN/proxy services.

One spreadsheet detailed the schedule and scripts for meetings attended by the fictitious “Henry Zhang.” The operational process revealed that these North Korean IT workers would first purchase Upwork and LinkedIn accounts, rent computer equipment, and then complete outsourced work using the AnyDesk remote control tool.

One of the wallet addresses they used to send and receive funds was: 0x78e1a4781d184e7ce6a124dd96e765e2bea96f2c ;

This address is closely linked to the $680,000 Favrr protocol attack in June 2025. Its CTO and other developers were later confirmed to be North Korean IT workers with forged credentials. This address has also been used to identify North Korean IT personnel involved in other infiltration projects.

The team also found the following key evidence in their search records and browser history.

One might ask, “How can we be sure they are from North Korea?” In addition to all the fraudulent documents detailed above, their search history also shows that they frequently use Google Translate and translate into Korean using a Russian IP.

Currently, the main challenges for enterprises in preventing North Korean IT workers are as follows:

Lack of systematic collaboration: There is a lack of effective information sharing and cooperation mechanisms between platform service providers and private enterprises; Employer oversight: Hiring teams often become defensive after receiving risk warnings, or even refuse to cooperate with investigations; Impact of numerical advantage: Although its technical means are not complicated, it continues to penetrate the global job market with its huge base of job seekers; Funding conversion channels: Payment platforms such as Payoneer are frequently used to convert fiat currency income from development work into cryptocurrency; I have introduced the indicators that need attention many times. If you are interested, you can check out my historical tweets. I will not repeat them here.

یہ مضمون انٹرنیٹ سے لیا گیا ہے: After reverse hacking North Korean hackers, I saw how they workRecommended Articles

Related: SOL ETF approved. Who is playing the role of Solana version of MicroStrategy in the US stock market? On June 30, the Solana spot staking ETF jointly launched by REX and Osprey was approved and will officially start trading on July 2, this Wednesday. This is the first cryptocurrency ETF in the US market that includes on-chain staking income. After the news was announced, the price of SOL rose by nearly 6%, breaking through $160 in a short period of time and now at $154. Previously, the SOL ETF applications submitted by many well-known institutions have not been approved for a long time, but an unknown company has passed customs first. What is the difference between the ETF launched by REX-Osprey, which was the first to cross the line? In the US stock market, what other companies and assets are betting on the Solana ecosystem and becoming investment…

# تجزیہ# کرپٹو# مارکیٹ# ٹول© 版权声明صف 上一篇 MyStonks' $6.2 million withdrawal blocked: regulatory enforcement, not platform misappropriationRecommended Articles 下一篇 ETHGlobal NYC Hackathon Concludes: A Roundup of the Top 10 Winning ProjectsRecommended Articles 相关文章 Metrics Ventures Market Watch: Chaotic Consolidation Continues 6086cf14eb90bc67ca4fc62b 18,053 From 0 to 400 million US dollars in market value, the rise of aixbt 6086cf14eb90bc67ca4fc62b 38,784 LayerZero proposed acquiring Stargate: Both tokens surged by over 20%, but this group strongly opposed itRecommended Art 6086cf14eb90bc67ca4fc62b 23,584 1 Must-watch next week | The Federal Reserve announces a new interest rate decision; ODOS and other projects will soon hol 6086cf14eb90bc67ca4fc62b 40,855 2 Matrixport Market Observation: Macroeconomic stabilization and continued inflow of traditional funds have contributed to 6086cf14eb90bc67ca4fc62b 34,099 The Fed meeting minutes revealed serious disagreement: many believed a December rate cut was inappropriate, and some worried about a disorderly stock market decline. 6086cf14eb90bc67ca4fc62b 18,074 1 تبصرے آپ کو ایک تبصرہ چھوڑنے کے لیے لاگ ان ہونا چاہیے! فوری طور پر لاگ ان کریں۔ #BeelieverPD352YL مہمان اچھی

1 ہفتہ پہلے تازہ ترین مضامین Did Jane Street “Manipulate” BTC? Decoding the AP System, Understanding the Power Struggle Behind ETF Creation and Redemption Pricing 9 گھنٹے پہلے 413 Stop Comparing Bitcoin to Gold—It’s Now a High-Volatility Software Stock 9 گھنٹے پہلے 544 Matrixport Research: $25 Billion Gamma Unwinding Imminent, Liquidity Yet to Return Behind the Rebound 9 گھنٹے پہلے 511 ERC-5564: Ethereum’s Stealth Era Has Arrived, Receiving Addresses No Longer ‘Exposed’ 9 گھنٹے پہلے 465 Hong Kong Regulatory Green Light: Asseto Enables DL Holdings to Achieve Compliance for Two RWA Business Implementations 9 گھنٹے پہلے 500 مشہور ویب سائٹسTempoLighterGAIBگلائیڈرپلانکریلزبی سی پوکرووئی Bee.com دنیا کا سب سے بڑا Web3 پورٹل شراکت دار سکے کارپ بائننس CoinMarketCap سکے گیکو سکے لائیو آرمر Bee Network APP ڈاؤن لوڈ کریں اور web3 کا سفر شروع کریں۔ سفید کاغذ کردار عمومی سوالات © 2021–2026۔ جملہ حقوق محفوظ ہیں۔. رازداری کی پالیسی | سروس کی شرائط Bee Network APP ڈاؤن لوڈ کریں۔ اور ویب 3 کا سفر شروع کریں۔ دنیا کا سب سے بڑا Web3 پورٹل شراکت دار CoinCarp Binance CoinMarketCap CoinGecko Coinlive Armors سفید کاغذ کردار عمومی سوالات © 2021–2026۔ جملہ حقوق محفوظ ہیں۔. رازداری کی پالیسی | سروس کی شرائط تلاش کریں۔ تلاش کریں۔InSiteآنچینسماجیخبریں 热门推荐: ایئر ڈراپ ہنٹرز ڈیٹا تجزیہ کرپٹو مشہور شخصیات ٹریپ ڈیٹیکٹر اردو English 繁體中文 简体中文 日本語 Tiếng Việt العربية 한국어 Bahasa Indonesia हिन्दी Русский اردو

智能索引记录