Fireblocks has disclosed details of a highly coordinated cyber campaign in which North Korean threat actors impersonated the company’s recruiters to target cryptoFireblocks has disclosed details of a highly coordinated cyber campaign in which North Korean threat actors impersonated the company’s recruiters to target crypto

Fireblocks Exposes Sophisticated Lazarus-Linked Hiring Scam

2026/01/23 15:04
4 min read
For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

Fireblocks has disclosed details of a highly coordinated cyber campaign in which North Korean threat actors impersonated the company’s recruiters to target crypto developers with malware. The investigation, published on January 22, 2026, revealed that attackers linked to the Lazarus Group leveraged fake recruitment processes to compromise victims’ systems and steal sensitive digital asset credentials.

The operation, internally labeled Operation Contagious Interview by Fireblocks’ security team, demonstrated a high level of sophistication. Attackers posed as legitimate Fireblocks recruiters on LinkedIn and used realistic hiring workflows to establish credibility before delivering malicious payloads disguised as routine coding tasks.

Impersonation Tactics and Social Engineering

According to the findings, the attackers created multiple convincing LinkedIn profiles that appeared to belong to Fireblocks executives, recruiters, and hiring managers. These profiles included professional photographs, detailed employment histories, and network connections aligned with blockchain and technical roles. Unlike many phishing attempts, the campaign avoided obvious warning signs such as spelling mistakes or poor formatting.

Once developers engaged with these profiles, they were sent professionally designed PDF documents outlining a fictitious initiative referred to as the Fireblocks Poker Platform. To further reinforce authenticity, the attackers built detailed design mockups using tools such as Figma. The materials closely mirrored Fireblocks’ real branding and referenced the company’s recent acquisition of Dynamic, which had been announced only weeks earlier. This level of accuracy indicated that the attackers were actively monitoring Fireblocks’ public announcements.

Fake Interviews and Malware Delivery

The scam extended beyond written communication into live interaction. Victims were invited to video interviews conducted over Google Meet, where the impostors followed standard hiring practices by asking about work experience and compensation expectations. After establishing rapport, the interviewers assigned what was presented as a code review or technical assessment and abruptly ended the call, citing scheduling constraints.

The malicious stage of the attack occurred when candidates followed standard developer workflows. Victims were instructed to clone a GitHub repository and run npm install, a common setup step. Executing this command triggered hidden malicious code, granting attackers access to the victim’s system. The malware infrastructure also employed a technique known as EtherHiding, which uses blockchain smart contracts to host command-and-control instructions, making the operation more resilient to takedowns.

Attribution to the Lazarus Group

Fireblocks’ security research team attributed the campaign to APT 38, a subgroup of the Lazarus Group known for financially motivated cyber operations. The investigation identified similarities with earlier attacks, including a previous recruitment scam that impersonated Multibank Group and used a comparable fake poker platform as bait.

The primary objective of the operation was financial theft. By compromising developers’ machines, the attackers sought to steal credentials, private keys, seed phrases, and access to development environments. Because developers often have elevated access to production systems and sensitive repositories, successful infections could provide attackers with entry points into entire organizations.

Indicators and Campaign Disruption

Fireblocks identified at least twelve fake personas used during the campaign. Indicators of compromise included the use of personal email addresses instead of corporate domains, Calendly links hosted on non-corporate sites, AI-generated profile descriptions, and LinkedIn accounts with little historical activity that suddenly became active.

The campaign began to unravel when several job seekers contacted Fireblocks employees directly to ask about the supposed poker platform project. These inquiries were escalated internally, allowing the security team to confirm the impersonation. Fireblocks then worked with LinkedIn to report and remove fraudulent profiles and coordinated the takedown of malicious repositories.

Guidance for the Crypto Community

Fireblocks has stated that it coordinated with intelligence partners and law enforcement to reduce the risk of follow-on attacks. The company, which reports securing more than $10 trillion in digital asset transfers across hundreds of millions of wallets, emphasized the importance of vigilance during recruitment processes.

Job seekers in the crypto sector are advised to verify recruiter outreach against official company career pages and ensure that communications originate from verified corporate email addresses. Fireblocks also noted that being asked to clone repositories and run installation commands as part of an interview process should be treated with caution, even when the overall interaction appears legitimate.

The post Fireblocks Exposes Sophisticated Lazarus-Linked Hiring Scam appeared first on CoinTrust.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

This is Trump's tell that all isn't well

This is Trump's tell that all isn't well

Years ago, I was drinking with friends in a dive bar with a jukebox. I went over, quarters in hand, and noticed “It’s the Same Old Song” by the Four Tops, sitting
Share
Rawstory2026/03/10 17:30
How The ByteDance App Survived Trump And A US Ban

How The ByteDance App Survived Trump And A US Ban

The post How The ByteDance App Survived Trump And A US Ban appeared on BitcoinEthereumNews.com. WASHINGTON, DC – MARCH 13: Participants hold signs in support of TikTok outside the U.S. Capitol Building on March 13, 2024 in Washington, DC. (Photo by Anna Moneymaker/Getty Images) Getty Images From President Trump’s first ban attempt to a near-blackout earlier this year, TikTok’s five-year roller coaster ride looks like it’s finally slowing down now that Trump has unveiled a deal framework to keep the ByteDance app alive in the U.S. A look back at the saga around TikTok starting in 2020, however, shows just how close the app came to being shut out of the US – how it narrowly averted a ban and forced sale that found rare bipartisan backing in Washington. Recapping TikTok’s dramatic five-year battle When I interviewed Brendan Carr back in 2022, for example, the future FCC chairman was already certain at that point that TikTok’s days were numbered. For a litany of perceived sins — everything from the too-cozy relationship of the app’s parent company with China’s ruling regime to the app’s repeated floating of user privacy — Carr was already convinced, at least during his conversation with me, that: “The tide is going out on TikTok.” It was, in fact, one of the few issues that Washington lawmakers seemed to agree on. Even then-President Biden was on board, having resurrected Trump’s aborted TikTok ban from his first term and signed it into law. “It feels different now than it did two years ago at the end of the Trump administration, when concerns were first raised,” Carr told me then, in August of 2022. “I think, like a lot of things in the Trump era, people sort of picked sides on the issue based on the fact that it was Trump.” One thing led to another, though, and it looked like Carr was probably…
Share
BitcoinEthereumNews2025/09/18 07:29
Pudgy Penguins (PENGU) Price: Token Rises 9% After Pudgy World Game Launch

Pudgy Penguins (PENGU) Price: Token Rises 9% After Pudgy World Game Launch

TLDR Pudgy Penguins launched Pudgy World, a browser-based game with 12 towns, quests, and mini-games The PENGU token rose around 9% following the launch announcement
Share
Coincentral2026/03/10 17:22