North Korean Hackers Set Up US Shell Companies to Target Crypto Developers: Report

North Korean Hackers Set Up US Shell Companies to Target Crypto Developers: Report

Table of Contents

North Korean infiltrators associated with the famous Lazarus Sroup group in the state have created paralysis companies inside the United States to distribute malware to cryptocurrencies, in a scheme that violates US sanctions and displays the main weaknesses of business registration systems.

According to Reuters, the Silent Push company at Cyber ​​Security Company revealed that two companies – Blocknovas LLC in New Mexico and SoftGlide LLC in New York – have been formed using forged names, addresses and documents, which helped actors in North Korea in the form of agents who provide jobs in the Crypto industry. A third entity, Angelburb, was also linked to the campaign but was not registered in the country.

Fraud job offers, empty many, and harmful programs

Silent payment Attributed The operation of a sub -group within the Lazaros group, a state -sponsored piracy unit operates under the General Office of North Korea. The group is famous for its role in prominent electronic thefts and spy activities.

In this campaign, infiltrators used false professional profiles and spread functions to approach developers, primarily on platforms like LinkedIn. Once the connection was made, the victims were invited to “interviews” as they were encouraged to download harmful programs as a program of employment or technical assessments.

Blocknovas was the most active entity, with many confirmed victims. Its material title listed in South Carolina was found to be a lot of empty. Meanwhile, SoftGlide was recorded through a buffalo -based tax service, which increased the complex efforts to track those behind the operations. The harmful programs used included previously attributed to North Korean Internet units, capable of stealing data, remote access, and more network infiltration.

The FBI seized the Blocknovas field, with notice on its website, indicating that it was used to deceive job seekers and publish harmful programs.

North Korean malignant trap

Lazarus collection took advantage of fake jobs repeatedly to provide harmful programs. For example, an electronic campaign called “Clickfix” was launched targeting job seekers in the Central Finance Curvement Sector (CEFI). Cybrania Security Company Sekoia recently open The group is latering companies like Coinbase and Tether to attract marketing and business applicants in fake interviews.

One of the biggest encryption thefts in Lazaros came in 2021, when a huge work offer led to the Ronin Bridge worth $ 625 million. breakthrough Axie Infinity targeting.

Special offer (sponsored)

Binance Free $ 600 (exclusive Cryptopotato): Use this link To register a new account and receive an exclusive welcome of $ 600 on Binance ((Full details).

Limited offer for Cryptopotato readers in bybit: Use this link To register and open the position of 500 dollars for free on any currency!

Our offer on Sallar Marketplace