Kraken says

A hacker supported by North Korea tried to get a job in Kraken to access the company systems, according to Thursday.
The applicant posed as an engineer and was caught in the middle after Kraken's security teams led a complete examination of the human identity and the digital trail. According to the company, the recruitment process became an intelligence surgery when Red Flags began to show.
According to Kraken reached a workplace request during the routine recruitment process. However, the situation became serious if the candidate gave a different name from his CV during the first call and then quickly improved it. The man's voice shifted several times during the interview, making the recruiters believe that someone else had led them live.
Kraken uses violation data and e -mail tracking to reveal the action
The applicant had submitted an email that responded to one of the cryptocurrency contacts who had warned that North -Korea hacker units actively apply for companies in the sector. After confirming the match, Kraken's inner red team triggered a deeper investigation using esint techniques to analyze data related to the E -mail account.
This search revealed a wider fake identity network. The person behind the application had created several pseudonyms, some of which had already been hired in other companies. The team found working email messages related to these fake names.
One of them belonged to someone as a foreign representative known in the list of international sanctions. The continuation of the fake was connected to the Github account with the E -letter E -letter and the ID appeared. The candidate used the remote control Mac desktop and directed throughout the VPN traffic -the setting designed to hide their actual location.
Kraken said the ID probably came from the case of a two -year identity theft. At that point, the security team had enough evidence to consider Osa-Mimo Solo's solo cheater for the National Infiltration Campaign.
Kraken controls complete sting through the interview process
Instead of interrupting communication, Kraken's recruitment and security teams continued to push the process. The applicant was conducted by assessments and identity reviews of various rounds, including Infesec.
In the latest interview, Kraken's security guard Nick Percoco participated in a candidate with a candidate with a group of other employees for what the company called the chemical interview.
During this speech, Nick and his team added control to the conversation. They asked the applicant to confirm their location, show the government's identity card and name the local restaurants in the city where they claimed they were living. The applicant could not keep up.
They hesitated, gave unclear answers, and failed the basic questions about their alleged hometown. The result was under pressure, exposing that the applicant had no real knowledge of their alleged location or identity they used.
At the end of the interview, Kraken said it was clear that this was not a real applicant. It was a foreign -supported scam who used a fake identity to try access to an inner circle for a cryptocurrency company.
Nick confirmed the incident in a public statement, saying, “Do not trust, check. This crypto principle is more appropriate in the digital age than ever. State-supported attacks are not only a cryptocurrency or US company theme-them theme.
Kraken said they release the full details of the case to warn other cryptocurrencies that traditional hiring managers are now being used as foreign government invasion tools. Exchange also noted that hackers associated with North Korea stole over $ 650 million from cryptocurrencies in 2024, with the work schemes changed to a new trend.
Cryptopolitan Academy: Do you want to raise your money in 2025? Here's how to do this in our upcoming web class. Save your place