Market Cap: $2.9856T -0.980%
Volume(24h): $63.0109B -19.610%
  • Market Cap: $2.9856T -0.980%
  • Volume(24h): $63.0109B -19.610%
  • Fear & Greed Index:
  • Market Cap: $2.9856T -0.980%
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
Top News
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
bitcoin
bitcoin

$96474.685590 USD

-0.63%

ethereum
ethereum

$1833.022451 USD

-0.70%

tether
tether

$1.000349 USD

0.01%

xrp
xrp

$2.215162 USD

-0.62%

bnb
bnb

$599.986858 USD

-0.43%

solana
solana

$148.607115 USD

-1.18%

usd-coin
usd-coin

$0.999965 USD

0.00%

dogecoin
dogecoin

$0.181277 USD

-1.29%

cardano
cardano

$0.698441 USD

-3.26%

tron
tron

$0.249140 USD

1.71%

sui
sui

$3.451508 USD

-1.34%

chainlink
chainlink

$14.522237 USD

-2.85%

avalanche
avalanche

$21.114867 USD

-4.55%

stellar
stellar

$0.274150 USD

-1.53%

unus-sed-leo
unus-sed-leo

$8.928571 USD

-0.19%

Cryptocurrency News Articles

Kraken’s Security Team Thwarted a Sophisticated Infiltration Attempt by a North Korean Hacker Posing as a Job Applicant

May 03, 2025 at 07:30 am

In a striking example of cybersecurity vigilance, crypto exchange Kraken has revealed it recently uncovered and neutralized an attempt by a North Korean hacker to infiltrate the company via its hiring process.

Kraken’s Security Team Thwarted a Sophisticated Infiltration Attempt by a North Korean Hacker Posing as a Job Applicant

Crypto exchange Kraken has disclosed a recent encounter with a North Korean hacker who attempted to infiltrate the company during its hiring process.

As recounted in a blog post, the applicant, applying for an engineering role, displayed anomalies like inconsistent names, a voice change mid-interview (implied to be due to live coaching, and an email address that matched intelligence from industry partners about a known hacker network targeting crypto companies.

Instead of immediate rejection, Kraken's security team kept the candidate engaged, collecting intelligence as they advanced through the hiring stages. Using OSINT tools and breach data analysis, the team discovered a network of fake identities, past work credentials, and even a sanctioned foreign agent alias linked to the suspect.

During a final interview with Kraken's CSO, further identity verification like showing ID and answering local trivia was requested, ultimately confirming the applicant as an imposter.

Commenting on the event, Nick Percoco, CSO at Kraken, said:

"State-sponsored attacks aren’t just a crypto, or U.S. corporate issue, they’re a global threat. Any individual or business handling value is a target, and resilience starts with operationally preparing to withstand these types of attacks. We're thankful for our partners at Chainalysis and other industry peers who contribute to the collective defense against bad actors."

The full story from Kraken:

We recently had an interesting encounter with a North Korean hacker who tried to apply for a job at Kraken. It began with a routine application for an open engineering role. The applicant's email address caught our attention as it matched intelligence we had received from Chainalysis and other industry partners about a known hacker network targeting cryptocurrency companies.

Furthermore, throughout the hiring process, the applicant displayed anomalies that grew increasingly suspicious. Their name varied across different platforms and communications, and during one interview, the applicant's voice changed mid-call, which we later learned was likely due to live coaching from someone else. They also preferred to communicate through cloaked systems like colocated Macs and VPNs.

Despite these anomalies, we didn't want to reject the candidate out of hand. Instead, our security team decided to keep them engaged and collect more intelligence as we advanced them through our standard hiring procedures. Using OSINT tools and breach data analysis, we discovered a network of fake identities, past work credentials, and even a sanctioned foreign agent alias linked to the applicant.

The true scope of the deception unraveled during a final interview with me. As we reached the final stages of the interview process, we realized we needed to take additional steps to verify the applicant's identity. We asked them to show their ID, a request which they refused, and we posed a question of local trivia, which they failed to answer correctly. At this point, we were able to confirm that the applicant was an imposter.

We notified the authorities and are working with our partners to mitigate any potential risk. We also want to thank the many people who helped us to identify and report this activity.

This experience highlights a key challenge we're facing in crypto today. As attackers get more sophisticated, they're now walking through the front door, rather than just trying to breach the firewall. With AI now being used to create deep fakes and other forms of deception, we need to create more dynamic, real-time verification methods and foster a culture of security awareness across all departments of our organizations, not just IT.

Only by working together can we effectively combat this threat. We urge all companies and individuals in the crypto industry to be vigilant and take the necessary steps to protect themselves from North Korean hackers.

We're also grateful for the work of our partners at Chainalysis and other industry peers who are helping to develop new tools and techniques for detecting and reporting malicious activity. Together, we can make a difference.

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on May 03, 2025