Close Menu
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
What's Hot

Bengaluru or Colombo to host 2025 Women’s World Cup final

June 4, 2025

FBI says Palm Springs bombing suspects used AI chat program

June 4, 2025

‘One of Them Days’ Sequel Movie in the Works With Keke Palmer, SZA

June 4, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
Home » North Korean hackers target crypto devs with fake recruitment tests
Blockchain

North Korean hackers target crypto devs with fake recruitment tests

HarishBy HarishApril 17, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
Share
Facebook Twitter Pinterest Reddit WhatsApp Email


North Korean hackers linked to the $1.4 billion Bybit exploit are reportedly targeting crypto developers using fake recruitment tests infected with malware. 

Cybersecurity outlet The Hacker News reported that crypto developers have received coding assignments from malicious actors posing as recruiters. The coding challenges have reportedly been used to deliver malware to unsuspecting developers.

Malicious actors approach crypto developers on LinkedIn and tell them about fraudulent career opportunities. Once they convince the developer, the hackers send a malicious document containing the details of a coding challenge on GitHub. If opened, the file installs stealer malware capable of compromising the victim’s system.

The scam is reportedly run by a North Korean hacking group known as Slow Pisces, also referred to as Jade Sleet, Pukchong, TraderTraitor and UNC4899. 

Cybersecurity professionals warn of fraudulent job offers 

Hakan Unal, senior security operations center lead at security firm Cyvers, told Cointelegraph that the hackers often want to steal developer credentials and access codes. He said these actors often look for cloud configurations, SSH keys, iCloud Keychain, system and app metadata, and wallet access. 

Luis Lubeck, service project manager at security firm Hacken, told Cointelegraph that they also try to access API keys or production infrastructure. 

Lubeck said that the main platform used by these malicious actors is LinkedIn. However, the Hacken team observed hackers using freelance marketplaces like Upwork and Fiverr as well.

“Threat actors pose as clients or hiring managers offering well-paid contracts or tests, particularly in the DeFi or security space, which feels credible to devs,” Lubeck added. 

Hayato Shigekawa, principal solutions architect at Chainalysis, told Cointelegraph that the hackers often create “credible-looking” employee profiles on professional networking websites and match them with resumes that reflect their fake positions. 

They make all this effort to ultimately gain access to the Web3 company that employs their targeted developer. “After gaining access to the company, the hackers identify vulnerabilities, which ultimately can lead to exploits,” Shigekawa added. 

Related: Ethical hacker intercepts $2.6M in Morpho Labs exploit

Be wary of unsolicited developer gigs

Hacken’s onchain security researcher Yehor Rudytsia noted that attackers are becoming more creative, imitating bad traders to clean funds and utilizing psychological and technical attack vectors to exploit security gaps. 

“This makes developer education and operational hygiene just as important as code audits or smart contract protections,” Rudytsia told Cointelegraph. 

Unal told Cointelegraph that some of the best practices developers can adapt to avoid falling victim to such attacks include using virtual machines and sandboxes for testing, verifying job offers independently and not running code from strangers. 

The security professional added that crypto developers must avoid installing unverified packages and use good endpoint protection. 

Meanwhile, Lubeck recommended reaching out to official channels to verify recruiter identities. He also suggested avoiding storing secrets in plain text format.

“Be extra cautious with ‘too-good-to-be-true’ gigs, especially unsolicited ones,” Lubeck added. 

Magazine: Your AI ‘digital twin’ can take meetings and comfort your loved ones



Source link

Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
Previous ArticleMantra OM token crash exposes ‘critical’ liquidity issues in crypto
Next Article GFN Thursday: 11 new games on GeForce NOW
Harish
  • Website
  • X (Twitter)

Related Posts

Swift legislation turns Kyrgyzstan into Central Asia’s primary crypto hub

June 4, 2025

Canada’s direction on digital asset innovation remains uncertain.

June 4, 2025

What South Korea president Lee Jae-myung means for crypto

June 4, 2025

How to use Chainabuse and Scamwatch to report a Bitcoin scammer

June 4, 2025

Bybit revamps security after $1.4 billion hack

June 4, 2025

DePIN to reach $3.5T by 2028 on crypto, AI convergence: WEF

June 4, 2025
Add A Comment
Leave A Reply Cancel Reply

Our Picks

Bengaluru or Colombo to host 2025 Women’s World Cup final

June 4, 2025

FBI says Palm Springs bombing suspects used AI chat program

June 4, 2025

‘One of Them Days’ Sequel Movie in the Works With Keke Palmer, SZA

June 4, 2025

Your Score: Simulcast Week of 2025-05-26

June 4, 2025
Don't Miss
Blockchain

Swift legislation turns Kyrgyzstan into Central Asia’s primary crypto hub

June 4, 20255 Mins Read

Kyrgyzstan’s growing reputation as a crypto-friendly jurisdiction stems from careful and comprehensive regulatory measures implemented…

Canada’s direction on digital asset innovation remains uncertain.

June 4, 2025

What South Korea president Lee Jae-myung means for crypto

June 4, 2025

How to use Chainabuse and Scamwatch to report a Bitcoin scammer

June 4, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to Luminari, your go-to hub for mastering modern tech and staying ahead in the digital world.

At Luminari, we’re passionate about breaking down complex technologies and delivering insights that matter. Whether you’re a developer, tech enthusiast, job seeker, or lifelong learner, our mission is to equip you with the tools and knowledge you need to thrive in today’s fast-moving tech landscape.

Our Picks

Hugging Face says its new robotics model is so efficient it can run on a MacBook

June 4, 2025

Reddit sues Anthropic for allegedly not paying for training data

June 4, 2025

Klarna CEO says company will use humans to offer VIP customer service

June 4, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 luminari. Designed by luminari.

Type above and press Enter to search. Press Esc to cancel.