Friend
Professional
- Messages
- 2,653
- Reaction score
- 850
- Points
- 113
Crypto projects are losing millions due to North Korea's social engineering.
In its new warning, the FBI states that employees of DeFi companies and cryptocurrency projects have recently been attacked by North Korea. Hackers from the DPRK use sophisticated social engineering techniques to introduce malware and steal digital assets of companies.
Cyberattacks are highly personalized and go undetected until the last moment. Even highly technical professionals can be vulnerable to such attacks. Attackers are actively investigating targeted companies and their employees, using social media and professional platforms to create customized deception scenarios.
North Korean hackers often offer their victims fictitious jobs or investments, relying on personal data (professional experience, interests, or connections) to create the illusion of credibility. Fakes usually look believable, cybercriminals can use photos of famous personalities or imitate real events to provoke actions on the part of the victims.
The FBI warns that hackers are carefully preparing for their operations by analyzing cryptocurrency companies, including those that work with crypto ETFs (exchange-traded funds). The main goal is unauthorized access to corporate networks and the theft of significant amounts of digital assets.
To protect against such attacks, the FBI recommends that companies implement multi-factor authentication and strictly restrict access to critical systems and data. In addition, organizations are advised to create their own methods to verify the identity of new contacts, avoid running suspicious programs and scripts on devices connected to the corporate network, and keep a close eye on atypical job or investment offers.
The FBI also offers a number of indicators that may indicate that a company or its employees have fallen victim to North Korean hackers. These include unexpected offers of cooperation, requests to complete test tasks using third-party applications or scripts, as well as switching to unusual communication platforms. In such cases, it is recommended to immediately disconnect the devices from the network and contact law enforcement agencies.
In response to the threat of North Korea, it is important to share experiences and raise awareness among colleagues about possible risks, as well as actively cooperate with cybersecurity experts to minimize the consequences of attacks.
Recall that recently there has been a trend of hackers from the DPRK to get a job in a US company in order to use new sources of income. So, in early August, 38-year-old Matthew Isaac Knuth was arrested in the United States on charges of helping North Korean IT specialists get remote work in American companies.
Such cases are becoming more common among American companies that hire employees to work remotely. North Korean engineers, for example, in China, are trying to get remote positions in American companies in order to earn money for the DPRK, working under false names.
Source
In its new warning, the FBI states that employees of DeFi companies and cryptocurrency projects have recently been attacked by North Korea. Hackers from the DPRK use sophisticated social engineering techniques to introduce malware and steal digital assets of companies.
Cyberattacks are highly personalized and go undetected until the last moment. Even highly technical professionals can be vulnerable to such attacks. Attackers are actively investigating targeted companies and their employees, using social media and professional platforms to create customized deception scenarios.
North Korean hackers often offer their victims fictitious jobs or investments, relying on personal data (professional experience, interests, or connections) to create the illusion of credibility. Fakes usually look believable, cybercriminals can use photos of famous personalities or imitate real events to provoke actions on the part of the victims.
The FBI warns that hackers are carefully preparing for their operations by analyzing cryptocurrency companies, including those that work with crypto ETFs (exchange-traded funds). The main goal is unauthorized access to corporate networks and the theft of significant amounts of digital assets.
To protect against such attacks, the FBI recommends that companies implement multi-factor authentication and strictly restrict access to critical systems and data. In addition, organizations are advised to create their own methods to verify the identity of new contacts, avoid running suspicious programs and scripts on devices connected to the corporate network, and keep a close eye on atypical job or investment offers.
The FBI also offers a number of indicators that may indicate that a company or its employees have fallen victim to North Korean hackers. These include unexpected offers of cooperation, requests to complete test tasks using third-party applications or scripts, as well as switching to unusual communication platforms. In such cases, it is recommended to immediately disconnect the devices from the network and contact law enforcement agencies.
In response to the threat of North Korea, it is important to share experiences and raise awareness among colleagues about possible risks, as well as actively cooperate with cybersecurity experts to minimize the consequences of attacks.
Recall that recently there has been a trend of hackers from the DPRK to get a job in a US company in order to use new sources of income. So, in early August, 38-year-old Matthew Isaac Knuth was arrested in the United States on charges of helping North Korean IT specialists get remote work in American companies.
Such cases are becoming more common among American companies that hire employees to work remotely. North Korean engineers, for example, in China, are trying to get remote positions in American companies in order to earn money for the DPRK, working under false names.
Source