North Korea’s infiltration of crypto is far worse than anyone realises.Pablo Sabbatella, founder of web3 audit firm opsek and current Security Alliance member, dropped a bombshell at Devconnect in Buenos Aires: North Korean infiltrators are embedded in up to 20% of all crypto companies.“North Korea is much worse than everybody thinks,” Sabbatella said in an interview with DL News. Even more alarming is that Sabatella reckons North Korean operatives may operate “30% to 40%” of all crypto applications.If those estimates are correct, the scope of potential damage is staggering. Moreover, the scale of North Korean penetration isn’t just about hackers stealing funds, even though they’ve gotten away with billions. Instead, it’s about workers getting hired at legitimate companies, gaining access to systems, and operating infrastructure that underpins major crypto companies. Hackers from North Korea have stolen more than $3 billion worth of cryptocurrency over the past three years through sophisticated malware and social engineering, said the US Treasury department in November. The funds were then put to use for Pyongyang’s nuclear weapons programmes. How they get hiredFor the most part, North Korean workers don’t apply for jobs directly, because international sanctions make that impossible.Instead, they find unsuspecting remote workers from around the world to act as fronts. Some of them now act as recruiters who bring in collaborators from outside North Korea to work under stolen identities. According to a recent Security Alliance report, these recruiters use freelance platforms like Upwork and Freelancer to reach individuals around the world — particularly in Ukraine, the Philippines, and other developing countries.The pitch is simple. Hand over your verified account credentials or let the North Korean actor use your identity remotely. In exchange, the collaborator gets 20% of earnings. The North Korean operative keeps 80%.A lot of North Korean hackers target the US, Sabbatella said.“What they do to get hired is find someone in the US to become their ‘front-end,’” Sabbatella explained. “So they pretend to be someone from China that doesn’t know how to speak English but they need to get an interview.”They then infect the front person’s computer with malware, giving them access to a US IP address and much more of the internet than they could reach from North Korea. Once hired, companies keep them around because they deliver.“They work well, they work a lot, and they never complain,” Sabbatella told DL News. So how does a company know if they’re employing a North Korean hacker? “Ask them if they think Kim Jong Un is a creep or something bad,” Sabbatella said. “They aren’t allowed to say anything bad.” Operational securityNorth Korea’s successful criminal endeavours aren’t just clever social engineering, however. It’s that crypto companies — and users — make it easy for them. “The crypto industry probably has the worst opsec in the entire computer industry,” Sabbatella said. Crypto founders are “fully doxxed, do a terrible job at holding their private keys securely, and easily fall victim to social engineering.”Operational Security, or OPSEC, is a systematic process for identifying and protecting critical information from adversaries. The lack of operational security creates an environment where “every single person’s computer is going to get infected with malware at some point in their lives,” said Sabbatella. Pedro Solimano is DL News’ Buenos Aires-based markets correspondent. Got a tip? Email him at psolimano@dlnews.com.North Korea’s infiltration of crypto is far worse than anyone realises.Pablo Sabbatella, founder of web3 audit firm opsek and current Security Alliance member, dropped a bombshell at Devconnect in Buenos Aires: North Korean infiltrators are embedded in up to 20% of all crypto companies.“North Korea is much worse than everybody thinks,” Sabbatella said in an interview with DL News. Even more alarming is that Sabatella reckons North Korean operatives may operate “30% to 40%” of all crypto applications.If those estimates are correct, the scope of potential damage is staggering. Moreover, the scale of North Korean penetration isn’t just about hackers stealing funds, even though they’ve gotten away with billions. Instead, it’s about workers getting hired at legitimate companies, gaining access to systems, and operating infrastructure that underpins major crypto companies. Hackers from North Korea have stolen more than $3 billion worth of cryptocurrency over the past three years through sophisticated malware and social engineering, said the US Treasury department in November. The funds were then put to use for Pyongyang’s nuclear weapons programmes. How they get hiredFor the most part, North Korean workers don’t apply for jobs directly, because international sanctions make that impossible.Instead, they find unsuspecting remote workers from around the world to act as fronts. Some of them now act as recruiters who bring in collaborators from outside North Korea to work under stolen identities. According to a recent Security Alliance report, these recruiters use freelance platforms like Upwork and Freelancer to reach individuals around the world — particularly in Ukraine, the Philippines, and other developing countries.The pitch is simple. Hand over your verified account credentials or let the North Korean actor use your identity remotely. In exchange, the collaborator gets 20% of earnings. The North Korean operative keeps 80%.A lot of North Korean hackers target the US, Sabbatella said.“What they do to get hired is find someone in the US to become their ‘front-end,’” Sabbatella explained. “So they pretend to be someone from China that doesn’t know how to speak English but they need to get an interview.”They then infect the front person’s computer with malware, giving them access to a US IP address and much more of the internet than they could reach from North Korea. Once hired, companies keep them around because they deliver.“They work well, they work a lot, and they never complain,” Sabbatella told DL News. So how does a company know if they’re employing a North Korean hacker? “Ask them if they think Kim Jong Un is a creep or something bad,” Sabbatella said. “They aren’t allowed to say anything bad.” Operational securityNorth Korea’s successful criminal endeavours aren’t just clever social engineering, however. It’s that crypto companies — and users — make it easy for them. “The crypto industry probably has the worst opsec in the entire computer industry,” Sabbatella said. Crypto founders are “fully doxxed, do a terrible job at holding their private keys securely, and easily fall victim to social engineering.”Operational Security, or OPSEC, is a systematic process for identifying and protecting critical information from adversaries. The lack of operational security creates an environment where “every single person’s computer is going to get infected with malware at some point in their lives,” said Sabbatella. Pedro Solimano is DL News’ Buenos Aires-based markets correspondent. Got a tip? Email him at psolimano@dlnews.com.

North Korean crypto infiltration is much worse than everyone thinks, says SEAL member

2025/11/22 15:12
3분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 crypto.news@mexc.com으로 연락주시기 바랍니다

North Korea’s infiltration of crypto is far worse than anyone realises.

Pablo Sabbatella, founder of web3 audit firm opsek and current Security Alliance member, dropped a bombshell at Devconnect in Buenos Aires: North Korean infiltrators are embedded in up to 20% of all crypto companies.

“North Korea is much worse than everybody thinks,” Sabbatella said in an interview with DL News. Even more alarming is that Sabatella reckons North Korean operatives may operate “30% to 40%” of all crypto applications.

If those estimates are correct, the scope of potential damage is staggering.

Moreover, the scale of North Korean penetration isn’t just about hackers stealing funds, even though they’ve gotten away with billions. Instead, it’s about workers getting hired at legitimate companies, gaining access to systems, and operating infrastructure that underpins major crypto companies.

Hackers from North Korea have stolen more than $3 billion worth of cryptocurrency over the past three years through sophisticated malware and social engineering, said the US Treasury department in November.

The funds were then put to use for Pyongyang’s nuclear weapons programmes.

How they get hired

For the most part, North Korean workers don’t apply for jobs directly, because international sanctions make that impossible.

Instead, they find unsuspecting remote workers from around the world to act as fronts. Some of them now act as recruiters who bring in collaborators from outside North Korea to work under stolen identities.

According to a recent Security Alliance report, these recruiters use freelance platforms like Upwork and Freelancer to reach individuals around the world — particularly in Ukraine, the Philippines, and other developing countries.

The pitch is simple. Hand over your verified account credentials or let the North Korean actor use your identity remotely. In exchange, the collaborator gets 20% of earnings. The North Korean operative keeps 80%.

A lot of North Korean hackers target the US, Sabbatella said.

“What they do to get hired is find someone in the US to become their ‘front-end,’” Sabbatella explained. “So they pretend to be someone from China that doesn’t know how to speak English but they need to get an interview.”

They then infect the front person’s computer with malware, giving them access to a US IP address and much more of the internet than they could reach from North Korea.

Once hired, companies keep them around because they deliver.

“They work well, they work a lot, and they never complain,” Sabbatella told DL News.

So how does a company know if they’re employing a North Korean hacker?

“Ask them if they think Kim Jong Un is a creep or something bad,” Sabbatella said. “They aren’t allowed to say anything bad.”

Operational security

North Korea’s successful criminal endeavours aren’t just clever social engineering, however.

It’s that crypto companies — and users — make it easy for them.

“The crypto industry probably has the worst opsec in the entire computer industry,” Sabbatella said. Crypto founders are “fully doxxed, do a terrible job at holding their private keys securely, and easily fall victim to social engineering.”

Operational Security, or OPSEC, is a systematic process for identifying and protecting critical information from adversaries.

The lack of operational security creates an environment where “every single person’s computer is going to get infected with malware at some point in their lives,” said Sabbatella.

Pedro Solimano is DL News’ Buenos Aires-based markets correspondent. Got a tip? Email him at psolimano@dlnews.com.

시장 기회
Farcana 로고
Farcana 가격(FAR)
$0.003668
$0.003668$0.003668
-1.74%
USD
Farcana (FAR) 실시간 가격 차트
면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, crypto.news@mexc.com으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

$30,000 in PRL + 15,000 USDT

$30,000 in PRL + 15,000 USDT$30,000 in PRL + 15,000 USDT

Deposit & trade PRL to boost your rewards!