Home Crypto Exchanges North Korea’s Crypto Heists Now Begin with a Fake Job Offer

North Korea’s Crypto Heists Now Begin with a Fake Job Offer

Crypto Hack

A new cybersecurity threat is quietly emerging—and it starts with a job offer that’s too good to be true. North Korean hacking groups, particularly the infamous Lazarus Group and its subunit BlueNoroff, are now targeting Web3 developers through fake job interviews, deepfake video calls, and malware-infected coding tests, all designed to gain access to sensitive wallets, repositories, and internal crypto infrastructure.

This strategy marks a shift from the typical smash-and-grab hacks seen in earlier years. Instead, it shows a more calculated and deceptive campaign, where the attack begins with a handshake instead of a brute-force exploit.

How the Scam Works

The latest report from cybersecurity firm Huntress, released on June 18, outlines a disturbing pattern. The operation starts with what looks like a professional LinkedIn message from a recruiter. Developers are offered roles at reputable-sounding crypto consulting firms—some even registered in the U.S.—such as BlockNovas, Angeloper, and SoftGlide.

After some email exchanges, the developers are invited to a Zoom interview, only to be greeted by what appears to be a company executive. But the person on the other end isn’t real. The video feed is generated using deepfake technology, designed to look and sound like a senior figure from a legitimate company.

Candidates are then sent a file to complete a “technical assessment.” In one case, the file named zoom_sdk_support.scpt installed malware known as BeaverTail—a sophisticated tool capable of stealing crypto wallet data, browser extensions like MetaMask, GitHub credentials, and even seed phrases from plaintext files.

The Developer Shortage Adds to the Risk

The open-source nature of crypto development means that a single developer may have high-level access to critical systems, including smart contracts, bridges, and wallets. With fewer than 40,000 new active crypto developers last year and a 7% year-over-year decline, there is a growing reliance on a shrinking pool of seasoned engineers.

This imbalance gives threat actors a dangerous opportunity. If even one well-positioned developer is compromised, it can lead to wide-scale breaches.

Not Just a Scam—A State-Sponsored Strategy

What sets this campaign apart is the level of coordination and funding behind it. These are not ordinary cybercriminals. They are part of a government-backed operation aimed at funding North Korea’s sanctioned weapons program.

Since 2017, the regime’s hackers have stolen over $1.5 billion in crypto assets. The $620 million Ronin/Axie Infinity breach in 2022 and the recent $1.5 billion Bybit exploit in February 2025 both bear the hallmarks of this state-driven campaign. The stolen assets are often laundered through platforms like Tornado Cash, Sinbad, and THORChain.

In a statement, Sue J. Bai of the U.S. Department of Justice’s National Security Division confirmed the seriousness of the operation. On June 16, the DOJ announced the seizure of $7.74 million in crypto linked to these fake job schemes.

Fake Recruiters, Real Impact

The attackers are using advanced deception techniques to infiltrate companies and gain trust. Fake Calendly links, Google Meet invites, and even cloned Zoom platforms are part of their toolkit. Many developers, under pressure to find stable jobs in a bearish market, don’t notice the subtle red flags.

Once inside a system, the malware begins scanning for browser-based wallets like MetaMask and Phantom, extracting wallet.dat files, and searching devices for keywords like “mnemonic” and “seed” to locate recovery phrases.

Security experts from Huntress and Unit 42 have tracked multiple malware variants including BeaverTail, InvisibleFerret, and OtterCookie—all designed with modular and cross-platform support to maximize reach.

The Bigger Picture: Pyongyang’s Growing Digital Army

This kind of operation isn’t isolated. In 2024 alone, North Korea-linked groups were responsible for 47 separate crypto hacks, accounting for $1.34 billion—over 60% of all reported crypto theft that year.

The FBI has already attributed multiple attacks to the Lazarus Group, including a massive breach of Japan’s DMM Bitcoin, where a developer was tricked into running malware during a job application process. In that case, the attacker posed as a recruiter and used a malicious “coding test” to gain access.

North Korea’s tactics have evolved from phishing emails to fully developed personas that can pass human resources checks. With the help of AI tools, the fake recruiters and executives now appear strikingly real in interviews, making it harder than ever for targets to spot the trap.

Global Law Enforcement Pushback

Authorities are beginning to respond. The FBI seized the BlockNovas domain in April, and international enforcement agencies are ramping up efforts to monitor suspicious domains, track blockchain transactions, and freeze illicit funds.

Yet, the North Korean operation shows no signs of slowing down. New shell companies and malware variants continue to surface, and the deceptive job interview approach is proving to be alarmingly effective.

Why This Matters Now

In the Web3 space, developers aren’t just employees—they are often the custodians of billions of dollars in decentralized infrastructure. A single compromised engineer can jeopardize the entire ecosystem of a project, especially when dealing with bridge protocols or high-value smart contracts.

With the rise of remote work and globally distributed teams, trust is often established digitally. And as this campaign proves, that trust can be manipulated.

Conclusion

North Korea’s evolving crypto tactics reveal how deeply state actors are embedding themselves into the fabric of the digital asset world. What may seem like a routine job application could actually be the first step in a sophisticated and damaging cyberattack.

As long as the industry continues to rely on remote hiring and open-source development, defending the recruitment pipeline will be just as important as securing the code.

Read more about:
Share on

Maheen Hernandez

A finance graduate, Maheen Hernandez has been drawn to cryptocurrencies ever since Bitcoin first emerged in 2009. Nearly a decade later, Maheen is actively working to spread awareness about cryptocurrencies as well as their impact on the traditional currencies. Appreciate the work? Send a tip to: 0x75395Ea9a42d2742E8d0C798068DeF3590C5Faa5

Crypto newsletter

Get the latest Crypto & Blockchain News in your inbox.

By clicking Subscribe, you agree to our Privacy Policy.

Get the latest updates from our Telegram channel.

Telegram Icon Join Now ×