North Korea Targets You in Major Centralized Exchange Hack

  • FBI warns North Korea of ​​targeting large cryptocurrency institutions Using sophisticated social engineering scams.
  • North Korean hackers $3 billion stolen so far.
  • Social engineering scams also include Fake recruitment information and “pig killing” scam.

You roll out of bed, stagger over to your desk, and log into Slack and your corporate email at Central Coin Exchange, Inc. It’s that time again. It’s hard work, managing a lot of Bitcoin Building the industry’s leading cryptocurrency exchange for you.

It’s time to laugh at the degens who are frantically chasing the latest meme coin on the lesser-known DEX; you know The real way to crypto wealth is to earn six figures in good quality traditional fiat currency holding $BTC in your custodial walletthen HODL some more.

But first, you get a catch-up call from a “slightly bigger boss.” this “Biggest Boss,” of course (so it doesn’t seem too unreal), but definitely a name you know.

You met them once before, eight months ago, during the interview process. You’re honored that they took the time to reach out to you!

They were nice enough to send an email last week saying they would be in touch. The invite was for 9:30, so you quickly scanned a few emails and clicked on the link.

This isn’t a Zoom or Google Meets link, so that’s a little weird.. But you shrug it off, still shocked by the possibility of a personal check-in with a “slightly bigger boss.”

Video conferencing software is available, but No one showed up. Strange. Ten minutes later, you suspect something has gone wrong, so you leave the meeting room and send a quick email to your more senior boss.

Only later, when Millions of dollars lost from exchange wallets Someone has sent you an FBI alert.

FBI warns of North Korean social engineering hackers

this The scale of the hacker attack is huge; Most of your $BTC is gonethe exchange’s corporate wallet was emptied out before the development team was able to stop it.

Then you understand. Remember the email your big boss sent you? Weird video conference link?Now you realize, with a heavy heart, This is totally fake.

North Korean hackers target crypto finance employees

Sound too far-fetched? The FBI says that’s not the case, Warning about North Korean government-backed hackers Advanced social engineering tactics are being used to compromise employees in the cryptocurrency space.

These include decentralized finance and exchange-traded funds (ETFs).

Hackers Extensive pre-assignment research (personal and professional information) Potential Targets Plan a personalized attack.

Attackers often impersonate known peopleLike a recruiter or a technical expert. You know, people just like “a slightly bigger boss.” A United Nations survey found that the former strategy is the favorite of North Korean hackers.

(…) We discovered that attackers based in the Democratic People’s Republic of Korea posed as employers and lured software developers, many of whom were associated with the cryptocurrency industry, through the job interview process to install malware hosted in a GitHub repository.UN investigation

As in the hypothetical case above, they Using stolen photos and creating fake profiles Look for trust in professional networks. They show no signs of poor English and it is not obvious. They can also communicate fluently and Very knowledgeable about the cryptocurrency industry.

All of this hides a sinister purpose – to deploy malware to allow hackers Stealing large amounts of cryptocurrency From centralized exchanges and large financial institutions.

and This seems to be a recipe for success. – North Korean hackers More than $3 billion stolen Social engineering schemes have been used so far.

Advanced Cybersecurity Awareness Is Now a Cryptocurrency Must-Have

Crypto social engineering scams are becoming increasingly common in the crypto space, and even individuals with advanced technical knowledge can fall victim.

Social Engineering Schemes Tapping into human psychology using trust, urgency, and fear Manipulate us. Attackers use proven methods like phishing, impersonation, and pretexting to exploit our trust, our tendency to make mistakes, or both.

These technologies Can even effectively hack into highly secure organizations Because they bypass people’s technical acumen.

It doesn’t matter if you are a cryptocurrency expert – That “trusted” Telegram confidant or “big shot” who pays you respect via email could be a gateway to hacking.

How to detect social engineering schemes early and avoid becoming a victim? Learn to develop human safety measures (e.g. wondering why your boss’s boss is suddenly interested in a new hire like you) rather than just technical knowledge.

These are an essential part of modern life and the rapidly evolving world of crypto-hacking and cybersecurity. Every link, download or QR code is a potential entry point for malware and bad actors Steal banking and crypto wallet credentials.

refer to

Disclaimer: The opinions expressed in this article do not constitute financial advice. We encourage readers to conduct their own research and determine their own risk tolerance before making any financial decisions. Cryptocurrency is a highly volatile, high-risk asset class.

Technical Report - Editorial ProcessTechnical Report - Editorial ProcessOur Editorial Process

The Tech Report’s editorial policy is centered around providing useful, accurate content that delivers real value to our readers. We only work with experienced writers who have a specific understanding of the topics they cover, including the latest developments in technology, online privacy, cryptocurrency, software, and more. Our editorial policy ensures that every topic is researched and collated by our in-house editors. We maintain strict journalistic standards and every article is 100% written by real authors.

Our Blog

Receive the latest news, updates and offers


Receive the latest news, updates and offers

This will close in 20 seconds