April 25, 2025
11 11 11 AM
Latest Post
Nasdaq Tells SEC Precise Crypto Labeling Will Be Everything in Future Regulation Want to Have Dinner With the U.S. President? All You Would Need Is to Hold $420 Worth of TRUMP CoinDesk 20 Performance Update: SUI Surges 13.7% as Index Trades Higher from Thursday Shiba Inu Breaks Free From Downtrend as Bitcoin Eyes $100K, Dogecoin Sees Accumulation Around 18 Cents Semler Scientific Pushes Bitcoin Stack to Over 3,300 BTC With $10M Buy Crypto Daybook Americas: SUI, STX Outperform as Bitcoin Whales Position for Gains BlackRock’s Bitcoin ETF Will Be the World’s Biggest ETF in a Decade, Michael Saylor Says Bitcoin Whales Return in Force, Buy the BTC Price Rally, On-Chain Data Show ARK Invest Raises 2030 Bitcoin Price Target to as High as $2.4M in Bullish Scenario Stacks’ STX Is Week’s Best Performer as Bitgo Link Seen Boosting Institutional Use

North Korean Hackers Targeting Crypto Developers With U.S. Shell Firms

North Korean hackers posing as American tech entrepreneurs quietly registered companies in New York and New Mexico as part of a campaign to compromise developers in the crypto industry, security firm Silent Push said Thursday.

Two businesses, Blocknovas and Softglide, were created using fictitious identities and addresses. The operation is tied to a subgroup within the Lazarus Group.

The North Korean-backed hacking unit has stolen billions worth of crypto in the past years using sophisticated techniques and strategies that target unsuspecting individuals or companies.

“This is a rare example of North Korean hackers actually managing to set up legal corporate entities in the US in order to create corporate fronts used to attack unsuspecting job applicants,” said Kasey Best, director of threat intelligence at Silent Push, said.

The hackers’ playbook is as manipulative as it is effective: use fake LinkedIn-style profiles and job postings to lure crypto developers into interviews. Then, during the recruitment process, they are tricked into downloading malware disguised as job application tools.

Silent Push identified multiple victims of the operation, especially those contacted through Blocknovas, which researchers say was the most active of the three front companies. The firm’s listed address in South Carolina appears to be an empty lot, while Softglide was registered through a tax office in Buffalo, New York.

The firm added that the malware used in the campaign includes at least three virus strains previously tied to North Korean cyber units. These programs can steal data, provide remote access to infected systems, and serve as entry points for additional spyware or ransomware.

The FBI has seized the Blocknovas domain, per Reuters. A notice posted to the site states it was taken down “as part of a law enforcement action against North Korean cyber actors who utilised this domain to deceive individuals with fake job postings and distribute malware.”

This post was originally published on this site