North Korean Hacker Team Identification Exposed: Over 30 Fake Accounts Penetrate Developer Circle

[Coin World] ZachXBT revealed that a source infiltrated the devices of North Korean IT personnel and discovered that a small team among them used over 30 fake identities to obtain developer positions, purchased accounts on a certain platform and a certain professional social networking platform using government identification, and worked through remote desktop software. Relevant data includes cloud drive export files, browser profiles, and screenshots. The wallet address 0x78e1 is closely related to a $680,000 attack on the Favrr platform in June 2025. More North Korean IT personnel have been identified. The team used a certain tech company’s product to schedule tasks, purchase SSNs, AI subscriptions, and VPNs. Some browsing history indicates that they frequently used online translation for Korean translations, and the IP addresses were from Russia. The negligence of recruiters and the lack of coordination between services are the main challenges in combating such activities.

IP-0.43%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 3
  • Repost
  • Share
Comment
0/400
MEVVictimAlliancevip
· 08-13 13:50
A painful lesson of losing 500,000 dollars
View OriginalReply0
PretendingToReadDocsvip
· 08-13 13:34
The hacker is really dead.
View OriginalReply0
AirdropHunterXiaovip
· 08-13 13:23
Finally caught!
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)