North Korean hacker team exposed: false identification infiltrates encryption project

robot
Abstract generation in progress

Revealing the Internal Operations of North Korean Hacker Teams

Recently, an anonymous white-hat Hacker successfully infiltrated the device of a North Korean IT worker, revealing the inside story of how a five-person technical team used over 30 fake identities for online activities. This team not only possessed forged official identification documents but also penetrated various development projects by purchasing accounts on online platforms.

Investigators obtained the team's cloud storage data, browser configuration files, and device screenshots. The data shows that the team heavily relies on a certain tech giant's office suite to coordinate work schedules, allocate tasks, and manage budgets, with all communication conducted in English.

A weekly report document from 2025 reveals the working patterns and challenges faced by the Hacker team. For example, some members complained that "they couldn't understand the work requirements and didn't know what to do," while the corresponding solution was surprisingly "to invest more effort and double down on hard work."

The team's expense details show that their spending items include purchasing a Social Security Number (SSN), online trading platform accounts, renting phone numbers, subscribing to AI services, leasing computers, and purchasing VPN/proxy services, etc.

A detailed spreadsheet recorded the schedule and script for attending the meeting under the false identity "Henry Zhang". The operation process shows that these North Korean IT workers first purchase online platform accounts, rent computer equipment, and then complete outsourced work through remote control tools.

The investigation also found a wallet address used by the team for receiving and sending funds, which has a close on-chain connection to the $680,000 protocol attack incident that occurred in June 2025. It was later confirmed that the CTO of the attacked project and other developers were North Korean IT workers holding forged documents. Through this address, other North Korean IT personnel in infiltrated projects were also identified.

A large amount of key evidence was found in the search records and browser history of the team members. Some may question how to confirm that they are from North Korea; in addition to the fraudulent documents mentioned above, their search history also shows frequent use of online translation services and the use of Russian IPs to translate content into Korean.

Currently, the main challenges that companies face in preventing North Korean IT workers include:

  1. Lack of systematic collaboration: There is a lack of effective information sharing and cooperation mechanisms between platform service providers and private enterprises.
  2. Employer negligence: The hiring team often exhibits a defensive attitude after receiving risk warnings and may even refuse to cooperate with the investigation.
  3. Quantity advantage impact: Although its technical means are not complex, it continues to penetrate the global job market thanks to a large base of job seekers.
  4. Fund conversion channels: Some payment platforms are frequently used to convert fiat income from development work into cryptocurrencies.

This investigation provides the industry with a rare opportunity to actively reveal the "working" methods of North Korean hackers, which is of significant importance for project parties to conduct preemptive security measures. Both enterprises and individuals should remain vigilant and enhance their ability to identify and prevent potential threats.

IP-0.5%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 10
  • Repost
  • Share
Comment
0/400
SchrodingerAirdropvip
· 10h ago
What is this weird thing?
View OriginalReply0
BlockchainThinkTankvip
· 22h ago
Based on years of industry experience, it is advised that the dark web hackers have been unusually active recently, and project parties should raise their vigilance.
View OriginalReply0
MetaNomadvip
· 08-17 19:25
So cool, I really want to learn Hacker.
View OriginalReply0
AirdropHunterXiaovip
· 08-17 08:04
This corresponds to the workers in North Korea.
View OriginalReply0
PanicSeller69vip
· 08-16 18:31
Is there really someone who makes a living working on construction sites?
View OriginalReply0
OnchainDetectiveBingvip
· 08-16 18:31
Programmers who slack off will also be checked!
View OriginalReply0
faded_wojak.ethvip
· 08-16 18:31
Still using Google office software...
View OriginalReply0
WhaleWatchervip
· 08-16 18:30
Hacker won't do it, it's obviously outsourced.
View OriginalReply0
MintMastervip
· 08-16 18:23
At a glance, it's obvious that they are a corporate slave.
View OriginalReply0
ReverseFOMOguyvip
· 08-16 18:07
In the end, just "work hard" then.
View OriginalReply0
View More
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)