Kraken Foils North Korean Infiltration Attempt
North Korean Spy Identified During Job Interview at Cryptocurrency Exchange Kraken
Here's a breakdown of the recent Kraken exchange's close call with a clever North Korean operative seeking to infiltrate the company.
The Job Interview Trap
In a riveting blog post published on May 1, US-based crypto exchange Kraken revealed details about a North Korean agent who attempted to secure a job at the company. The story unravels like a spy thriller, as what began as a routine hiring process soon transformed into an intelligence-gathering operation.
Kraken suspiciously advanced the applicant through their interview process following several unsettling signs. The candidate joined video calls using a name different from the application, which raised the first red flag. Furthemore, during the calls, they occasionally switched between voices – an indication of real-time coaching from others.
Disguise and Deception
Kraken's security team unearthed the deception thanks to a tip from industry partners. The anonymous informants had warned that North Korean operatives were actively seeking employment at crypto companies. The team received a list of suspicious email addresses, and one matched the applicant's application email.
With this lead, Kraken discovered a network of fake identities being used by the hacker. These identities had been employed to apply to multiple companies across the industry.
Intriguingly, the applicant used remote Mac desktops accessed through VPNs to hide their true location. The identification documents they provided seemed altered, likely stolen in previous identity theft cases. Moreover, the GitHub profile linked to the applicant's resume contained an email address that had been exposed in a previous data breach – another suspicious connection.
Kraken Chief Security Officer Nick Percoco conducted impromptu identity verification tests during the final interviews. These tests included asking the candidate to show government ID, verify their city of residence, and name local restaurants from their supposed location. A flustered and caught-off-guard candidate struggled with the tests, finally unraveling under pressure.
North Korea's Cyber War on Crypto
The infiltration attempt comes amid increased cyber activity from North Korea. International sanctions have isolated the country from the global financial system, pushing the regime to target crypto as an alternative source of funds. North Korean hackers have pilfered billions worth of cryptocurrency this year alone, with the Lazarus Group endorsed by North Korea responsible for numerous high-profile hacks, including the $1.4 billion Bybit exchange heist – the industry's largest theft to date.
In April, a subgroup of Lazarus established three shell companies, including two in the US. These firms were created to deliver malware to unsuspecting users and scam crypto developers. According to a joint statement by the US, Japan, and South Korea, North Korean-linked hackers stole over $650 million through several crypto heists in 2024, and have also deployed IT workers to infiltrate blockchain and crypto companies as insider threats.
The remote work trend has made it easier for such agents to conceal their identities and locations. By embedding agents within firms, the regime gains access to sensitive data and can deploy ransomware or malicious code. "Don't trust, verify," states Percoco. "State-sponsored attacks aren't just a crypto or US corporate issue; they're a global threat."
North Korean Hacking Tactics
North Korean hackers deploy a range of strategies to target crypto companies. They create shell companies registered in the US with fictitious names and fake addresses to pose as recruiters or investors, offering job interviews or coding assignments to crypto developers – thereby deploying sophisticated malware to steal credentials and compromise wallets.
Moreover, they use custom malware capable of infecting multiple platforms (like Windows, Linux, and macOS) to target IT professionals globally, especially those in Web3 and blockchain development. According to recent research, North Korean groups such as UNC1069, UNC4899, and UNC5342 specialize in social engineering schemes, sending fake meeting invitations on platforms like Telegram, or incorporating malicious code in supply chain compromises to pilfer digital assets.
North Korean hackers have also been observed commandeering Zoom's remote-control feature to seize control of victims' systems, enabling crypto theft and infiltration of exchange environments. As the digital world continues to evolve, staying vigilant and staying aware of these threats is crucial for companies across the globe.
The attempted infiltration of Kraken by a North Korean operative highlights the growing nexus between cryptocurrency, technology, and cybersecurity. With North Korea intensifying its cyber activities to circumvent international financial sanctions, crypto exchanges need to be more vigilant than ever, strengthening their investment strategies in cybersecurity to protect their systems and users' assets.
The hiring process, initially seemingly routine, transformed into an intelligence-gathering operation, demonstrating the extent to which North Korean operatives will manipulate technology and finance to achieve their goals. As the work-from-home trend persists, it's increasingly crucial for companies to thoroughly verify identities and maintain a high level of cybersecurity awareness, as state-sponsored attacks aren't just a crypto issue; they're a global threat.


