温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.bee.com/ur/61470.html
点击访问原文链接

Stealth Warfare: North Korean hackers have infiltrated 20% of crypto companies | Bee Network

Stealth Warfare: North Korean hackers have infiltrated 20% of crypto companies | Bee Network Login ٹرینڈنگ نیوز میمی لانچ پیڈ اے آئی ایجنٹس DeSci TopChainExplorer نیوبی کے لیے 100x سکے مکھی کا کھیل ضروری ویب سائٹس اے پی پی کا ہونا ضروری ہے۔ کرپٹو مشہور شخصیات DePIN Rookies ضروری ٹریپ ڈیٹیکٹر بنیادی ٹولز اعلی درجے کی ویب سائٹس تبادلہ NFT ٹولز ہیلو، باہر جائیں ویب 3 کائنات کھیل ڈی اے پی پی شہد کی مکھیوں کا چھتا بڑھتا ہوا پلیٹ فارم AD تلاش کریں۔ انگریزی سکے ریچارج کریں۔ لاگ ان کریں ڈاؤن لوڈ کریں ویب 3 یونی کھیل ڈی اے پی پی شہد کی مکھیوں کا چھتا AD گھرتجزیہ•مرکزی متن Stealth Warfare: North Korean hackers have infiltrated 20% of crypto companiesتجزیہ3 ماہ پہلے更新وائٹ 15,336 8 Original article translated by: Deep Tide TechFlow

Pablo Sabbatella, SEAL member and founder of Web3 auditing firm opsek. Source: Pedro Solimano

North Korean agents have infiltrated 15%-20% of کرپٹو companies.

According to a SEAL member, 30%-40% of crypto industry job applications may come from North Korean agents.

The encryption industry has been criticized for having “the worst operational security (opsec) in the entire computer industry,” according to Pablo Sabbatella.

North Korea’s penetration into the crypto industry is far greater than people realize.

Pablo Sabbatella, founder of Web3 auditing firm Opsek and a current member of the Security Alliance, dropped a bombshell at the Devconnect conference in Buenos Aires: North Korean agents may have infiltrated as many as 20% of crypto companies.

“The situation in North Korea is much worse than people imagine,” Sabbatella told DL News. He further alarmingly pointed out that 30-40% of crypto industry job applications may come from North Korean agents attempting to infiltrate related organizations.

If these estimates are true, their potential destructive power would be incredible.

More importantly, North Korea’s infiltration isn’t just about stealing funds through hacking, although they have already stolen billions of dollars through sophisticated malware and social engineering. The bigger problem is that these agents are employed by legitimate companies, gain system privileges, and manipulate the infrastructure that underpins major crypto companies.

According to a U.S. Treasury report last November, North Korean hackers stole more than $3 billion in cryptocurrency over the past three years. These funds were subsequently used to support Pyongyang’s nuclear weapons program.

How do North Korean agents infiltrate the crypto industry? North Korean workers typically do not apply for jobs directly because international sanctions prevent them from participating in the recruitment process under their real identities.

Instead, they seek out unsuspecting remote workers around the world to act as “agents.” Some of these agents have even transitioned into recruiters, helping North Korean agents use stolen identities to hire more overseas collaborators.

According to a recent report by Security Alliance, these recruiters reach out to individuals around the world through freelance platforms such as Upwork and Freelancer, with a primary focus on Ukraine, the Philippines, and other developing countries.

Their “deal” is very simple: provide verified account credentials or allow North Korean agents to use your identity remotely. In return, the collaborator receives 20% of the revenue, while the North Korean agents keep 80%.

Sabbatella stated that many North Korean hackers target the United States.

“Their approach is to find Americans to act as their ‘front end’,” Sabbatella explained. “They would pretend to be from China, not speak English, and need someone to help them with the interviews.”

Next, they would infect the computers of the “front-end” personnel with malware, thereby obtaining US IP addresses and gaining access to more internet resources than they had in North Korea.

Once hired, these hackers are usually not fired because their performance satisfies the company.

“They are highly efficient, work long hours, and never complain,” Sabbatella told DL News.

Sabbatella offered a simple test: “Ask them if they think Kim Jong-un is a weirdo or something bad about him.” He said, “They are not allowed to say anything bad.”

Operational security vulnerabilities However, North Korea’s success is not solely due to sophisticated social engineering.

Crypto companies—and users—have made it all easier.

“The crypto industry is probably the worst in terms of operational security (opsec) in the entire computer industry,” Sabbatella said. He criticized the founders of the crypto industry as “fully doxxed, poor at protecting their private keys, and vulnerable to social engineering.”

Operational Security (OPSEC) is a systematic process for identifying and protecting critical information from adversary threats.

The lack of operational security creates a high-risk environment. “Almost everyone’s computer will be infected with malware at least once in their lifetime,” Sabbatella said.

Update Notes

Update: This article has been updated to include a clarification from Sabbatella, who points out that North Korea does not control 30%-40% of crypto applications; the aforementioned percentage actually refers to the proportion of North Korean agents in crypto job applications.

یہ مضمون انٹرنیٹ سے لیا گیا ہے: Stealth Warfare: North Korean hackers have infiltrated 20% of crypto companiesRecommended Articles

Related: Aster CEO explains token value; staking and on-chain buybacks are coming. Compiled by Odaily Planet Daily ( @OdailyChina ); Translated by Ethan ( @ethanzhang_web3) With privacy once again becoming a focal point, DEXs face not only a battle for traffic but also the ultimate test of their underlying architecture and user experience. Even so, most DEXs still struggle to balance performance, transparency, and privacy protection, failing to meet the needs of professional traders and institutional users. Aster is attempting to provide its own answer to how to build a trading ecosystem that combines the smoothness of a CEX with the trustworthiness of a DEX. In a community AMA on November 10th, Aster CEO Leonard systematically outlined Aster’s complete roadmap for building an institutional-grade DEX, centered around its self-developed privacy-focused L1 blockchain. The discussion covered a wide range of topics of concern…

# تجزیہ# کرپٹو# ٹوکن# web3© 版权声明صف 上一篇 Institutional selling? What is the real meaning behind BlackRock's large transfer of cryptocurrency to Coinbase? 下一篇 The latest SOL proposal aims to lower the inflation rate. What are the opponents thinking? 相关文章 Bybit co-founder and CEO Ben Zhou outlined a new blueprint for cryptocurrencies in his mid-year keynote speech.Recommend 6086cf14eb90bc67ca4fc62b 28,727 3 Solana CEO Interview: From Garage Startup to Top Public Chain, Talking about Solana’s Past and Future 6086cf14eb90bc67ca4fc62b 47,790 12 Earning $4 million in two months, revealing James Wynn’s “hedge trumpet” 6086cf14eb90bc67ca4fc62b 27,212 1 Beyond Self-Criticism, What Else Is Vitalik Pondering? 6086cf14eb90bc67ca4fc62b 8,829 1 بائننس کے سی ای او چانگپینگ ژاؤ، جو شنگھائی سے فرار ہو گئے، ٹرمپ کے ذریعے معافی کیسے ملی؟ کریپٹو کرنسی کے تجربہ کار کی یادوں کی دہائی اور صنعت کے اسرار 6086cf14eb90bc67ca4fc62b 18,957 24-Hour Hot Coins and News | The probability of a 25 basis point Fed rate cut in October is 91.9%; 6086cf14eb90bc67ca4fc62b 20,469 کوئی تبصرہ نہیں آپ کو ایک تبصرہ چھوڑنے کے لیے لاگ ان ہونا چاہیے! فوری طور پر لاگ ان کریں۔ کوئی تبصرہ نہیں... Bee.com دنیا کا سب سے بڑا Web3 پورٹل شراکت دار سکے کارپ بائننس CoinMarketCap سکے گیکو سکے لائیو آرمر Bee Network APP ڈاؤن لوڈ کریں اور web3 کا سفر شروع کریں۔ سفید کاغذ کردار عمومی سوالات © 2021–2026۔ جملہ حقوق محفوظ ہیں۔. رازداری کی پالیسی | سروس کی شرائط Bee Network APP ڈاؤن لوڈ کریں۔ اور ویب 3 کا سفر شروع کریں۔ دنیا کا سب سے بڑا Web3 پورٹل شراکت دار CoinCarp Binance CoinMarketCap CoinGecko Coinlive Armors سفید کاغذ کردار عمومی سوالات © 2021–2026۔ جملہ حقوق محفوظ ہیں۔. رازداری کی پالیسی | سروس کی شرائط تلاش کریں۔ تلاش کریں۔InSiteآنچینسماجیخبریں 热门推荐: ایئر ڈراپ ہنٹرز ڈیٹا تجزیہ کرپٹو مشہور شخصیات ٹریپ ڈیٹیکٹر اردو English 繁體中文 简体中文 日本語 Tiếng Việt العربية 한국어 Bahasa Indonesia हिन्दी Русский اردو

智能索引记录