Kraken Cryptocurrency Exchange Detects Infiltration Attempt from North Korea via Phony Job Application
Headline: Kraken's Close Call with a North Korean Hacker Masquerading as a Job Candidate
Cryptocurrency exchange Kraken had a narrow escape when a North Korean hacker posed as a software engineering job applicant, attempting to infiltrate the company.
At first glance, this seemed like a regular recruitment process. But alarm bells rang when it became apparent that the candidate wasn't who they claimed to be. During the interview, they went by a different name than on their resume, switched voices, and relied on a peculiar setup of colocated Mac desktops and VPNs to hide their location.
Suspicions were heightened when Kraken's team cross-checked the applicant's email address, finding it matched one previously flagged as associated with North Korean hacker groups. Subsequent investigation revealed the individual was part of a network of fabricated identities, some of which had already landed jobs at other crypto companies.
Kraken didn't rush to reject the suspect applicant. Instead, they allowed them to advance through multiple interview rounds, gathering intel on the hacker's tactics. The final interview, led by the Chief Security Officer Nick Percoco, included shrewd identity-proofing questions. The applicant fell flat, unable to provide local knowledge or produce live ID verification, confirming Kraken's suspicions.
Kraken's experience underscores a growing pattern of North Korean hackers targeting crypto firms. In 2024, these cybercriminals reportedly stole over $650 million from such companies, with a focus on European targets as awareness of North Korean infiltration efforts grew in the U.S. following the Bybit hack.
In the shadows:While specific data about an increase in North Korean IT workers infiltrating European tech firms during 2024-2025 isn't readily available, the broader context suggests North Korea's escalating cyber warfare activities. Here are a few insights:
- Cyber Espionage and Deception: North Korean cyber operatives have been employing cunning strategies to infiltrate industries—posing as U.S. companies to hack cryptocurrency developers and slipping malicious code into job applications.
- Global Ambitions: North Korea has been broadening its international reach, as seen by sending soldiers to Russia for military training, indicating its willingness to engage globally, possibly including tech industries.
- Threat Across Borders: Although there's no direct evidence of North Korean IT workers targeting European firms specifically, their tactics used in the U.S. (such as creating fake companies) could be adapted for Europe. European companies must remain vigilant against cybersecurity threats, given the known capabilities of North Korean hackers.
- Despite the candidate's convincing resume, theodd setup of colocated Mac desktops and VPNs raised red flags for Kraken's team, hinting at potential cybersecurity concerns.
- With the stolen funds from cryptocurrency companies amounting to over $650 million in 2024, it's evident that North Korean hackers have a significant focus on cryptocurrency infiltration.
- As North Korean hackers increase their global reach, successfully infiltrating US cryptocurrency firms, European tech companies must be on high alert for similar patterns of cybercrime.
- In an effort to avoid detection, North Korean cyber operatives have been known to disguise themselves as legitimate job applicants, even going as far as creating convincing resumes and adopting sophisticated identity masking techniques.
- Nick Percoco, Kraken's Chief Security Officer, put the applicant to the test, probing for local knowledge and insisting on live ID verification, ultimately exposing the hacker's inability to authenticate their identity.
- General-news outlets report an uptick in North Korean IT workers collaborating with various global entities, highlighting the broader context of intensifying cyber warfare activities.
- As the incidence of North Korean IT infiltration in European tech firms isn't easily trackable, it's crucial for cybersecurity experts to closely monitor crime-and-justice reports for any signs of North Korean deception and perpetrate vigilant measures to protect against cyberattacks.
