Kraken details how it spotted North Korean hacker in job interview

The US Crypto Exchange Kraken has detailed North Korea's attempt to identical the organization by applying for a job interview.
“What started as a routine hire process for an engineering role that quickly became a intelligence operation,” the company write In a post on the blog of 1 May.
Kraken said the applicant's red flags appeared early in the process when they joined an interview under a name that was different from what they had applied and “occasionally moved between the voices,” seemed guided through the interview.
Instead of immediately rejecting the applicant, Kraken decided to advance them through the process of renting to gather information about the tactics used.
International penalties have effectively cut North Korea from the rest of the world, and the ruling dictatorship of the country's family Kim has long been targeting crypto companies and users to raise country coffee. It has been stolen billion -billions of crypto worth this year.
Kraken reports that industry partners have removed them that North Korea actors are actively applying for jobs in crypto companies.
“We received a list of email addresses linked to the hacker group, and one of them matched the email that the candidate used to apply to Kraken,” he said.
In this information, the company's security team has no cover on a network of fake identities that the hacker uses to apply to many companies.
Kraken also noted the technical inconsistencies, which included the use of remote MAC desktops through VPNs and changed the identity documents.
Kraken CSO @c7five Recently spoken @Cbsnews About how an North Korean operative was not successfully attempted to get a job in Kraken.
Don't trust. I -verify 👇 pic.twitter.com/1vvo3perh2
– Kraken Exchange (@krakenfx) May 1, 2025
The applicant's resume is linked to a GitHub profile containing an email address exposed to a previous data violation, and the exchange states that the candidate's main ID form has “appeared to have been modified, likely to use details stolen in a case of identity theft two years before.”
In the final interviews, chief security security official Nick Percooco conducted trials in verifying BITAG identity that the candidate failed, confirming the deception.
Related: The 2024 pause of Lazarus Group repositions for $ 1.4B bybit hack
“Don't trust, i -verify. This basic crypto principle is more relevant than ever before the digital age,” butco said. “State-sponsored attacks are not just a crypto or US corporate issue-they are a global threat.”
North Korea pulled the largest-ever crypto hack
North Korea associated with the hacking of the collective Lazarus Group is responsible for the $ 1.4 billion in February hack, the largest ever for the crypto industry.
North Korean -related hackers also stole more than $ 650 million through many crypto heists during 2024, while sending IT workers to enter Blockchain and Crypto companies as insider threats, According to In a statement released by the US, Japan and South Korea in January.
In April, a Lazarus subgroup was found to set up three shell companies, with two in the US, to deliver malware to unrelated Crypto users and developers.
Magazine: Japanese Porn Star's Coin Red Flags, Alibaba-Link L2 runs at 100k TPS: Asia Express