News
  • Nidhi Kolhapur
    author-profile
    Nidhi Kolhapur right arrow
    Author

    Nidhi is a Certified Digital Marketing Executive and Passionate crypto Journalist covering the world of alternative currencies. She shares the latest and trending news on Cryptocurrency and Blockchain.

    • author facebook
    • author twitter
    • linkedin
  • Reviewed by: Zafar Naik
    author profile
    Zafar Naik right arrow
    Reviewed

    Zafar is a seasoned crypto and blockchain news writer with four years of experience. Known for accuracy, in-depth analysis, and a clear, engaging style, Zafar actively participates in blockchain communities. Beyond writing, Zafar enjoys trading and exploring the latest trends in the crypto market.

    • 2 minutes read

    Leaked Files Reveal North Korean Hackers with 30+ Fake Identities in Crypto Job Scam

    Story Highlights
    • Leaked files link DPRK hackers to 30+ fake identities used to land remote crypto jobs

    • Network tied to $680K Favrr exploit and multiple major crypto heists

    • North Korea has stolen $1.6B in crypto in 2025

    A sophisticated cyber operation is quietly infiltrating remote tech jobs worldwide. 

    Blockchain investigator ZachXBT uncovered a major leak from a DPRK IT workerโ€™s device showing a small team of five managing 30+ fake identities, with government IDs and purchased Upwork/LinkedIn accounts to obtain developer jobs at projects. They also claimed experience at top blockchain companies like Polygon Labs, OpenSea, and Chainlink.

    Inside the DPRK Remote Job Operation

    The spreadsheets reveal how DPRK IT workers operated, including weekly reports, expense tracking, and meeting schedules, and include a script used for the fake identity โ€œHenry Zhang.โ€ Their expenses show purchases of SSNs, Upwork and LinkedIn accounts, phone numbers, AI tools, rented computers, and VPNs or proxies.

    Leaked Google Drive files, Chrome profiles, and device screenshots revealed that they managed schedules, tasks, and budgets mostly in English. Telegram chats show how they coordinated to land jobs, handle payments, and route salaries through crypto wallets.

    One of the key signs pointing to North Korea was their use of Google Translate into Korean during searches, sometimes routed through Russian IP addresses.

    Wallet Linked to $680K Favrr Exploit

    Notably, one wallet was linked to multiple payments and the $680K  Favrr exploit in June 2025, where DPRK ITWs acted as CTO and developers using fraudulent documents. Additional operatives were connected to other projects through this same wallet address.

    DPRK IT Workers Flood Remote Jobs

    ZachXBT points out that the biggest challenge in stopping DPRK IT workers is poor coordination between companies and security services, along with recruitment teams who often ignore or resist warnings.

    These IT workers are not especially sophisticated, but they are persistent, flooding the global job market for remote developer roles and commonly use Payoneer to convert regular payments into crypto.

    North Koreaโ€™s Crypto Crime Network

    North Koreaโ€™s cyber theft operations are massive and growing. In January, operatives stole $2.2M, and in June, authorities seized over $7.7M linked to fake remote job schemes. 

    North Korean hackers are tricking people with fake IT job offers to access cloud systems and steal crypto. Since 2020, these campaigns have targeted major crypto platforms, contributing to massive thefts such as Axie Infinityโ€™s $620M breach, DMM Bitcoinโ€™s $305M hack, and Bybitโ€™s $1.5B heist.

    Experts estimate that North Korea has stolen $1.6B in crypto so far in 2025, accounting for 35% of all stolen crypto last year, and they are showing no signs of slowing down.ย 

    Never Miss a Beat in the Crypto World!

    Stay ahead with breaking news, expert analysis, and real-time updates on the latest trends in Bitcoin, altcoins, DeFi, NFTs, and more.

    FAQs

    How can I protect my crypto from scammers and fraudulent schemes?

    To protect your crypto, always verify platforms, use reputable exchanges, enable two-factor authentication (2FA), and be skeptical of โ€œtoo good to be trueโ€ returns or unsolicited offers. Store large amounts in secure hardware wallets, never share private keys, and be wary of phishing links.

    What are the common red flags to identify a crypto scam or fake investment platform?

    Common red flags include promises of guaranteed high returns, pressure tactics to invest quickly, anonymous or unknown project teams, poorly written whitepapers, and demands for crypto payments for services or unexpected fees. Check for inconsistent website details, grammar errors, and lack of customer support numbers.

    What tools do these scammers use?

    Leaks reveal purchases ofย SSNs, AI tools, VPNs, rented PCs, and crypto wallets to launder salariesโ€”often routing payments viaย Payoneer-to-cryptoย conversions.

    Show More

    Related Articles

    Back to top button