BTCC / BTCC Square / Cryptoslate /
North Korea’s Latest Crypto Scam: Lucrative Job Offers That Empty Your Wallet

North Korea’s Latest Crypto Scam: Lucrative Job Offers That Empty Your Wallet

Published:
2025-06-20 11:04:09
4
1

You’re Hired! North Korea’s new crypto scam starts with a job offer

Pyongyang's cybercriminals are back—this time with fake job listings that drain crypto accounts faster than a bear market.

How the scam works:

Recruiters posing as blockchain startups lure targets with promises of high-paying remote work. After 'hiring' victims, they request access to crypto wallets for 'payroll setup'—only to vanish with the funds.

Why it works:

The scheme preys on crypto professionals hungry for opportunities in the current downturn. Fake companies use stolen LinkedIn profiles and forged regulatory documents to appear legitimate.

The bitter irony:

While Wall Street funds charge 2% for mediocre returns, these scammers deliver 100% losses with military efficiency. At least they're transparent about their exit strategy.

North Korean hackers developer infiltration

On 18 June , cybersecurity firm Huntress reported a campaign attributed to BlueNoroff, a notorious Lazarus Group subgroup targeting a developer at a major Web3 foundation.

The ruse began with a polished recruiter pitch on LinkedIn, followed by what appeared to be a Zoom interview with a senior executive. In reality, the video feed was a deep‑fake, and the “technical‑assessment” file the candidate was asked to run, `zoom_sdk_support.scpt`, deployed cross‑platform malware dubbed BeaverTail that can harvest seed phrases, crypto‑wallets, and GitHub credentials.

These tactics represent a sharp escalation. “In this new campaign, the threat‑actor group is using three front companies in the crypto consulting industry … to spread malware via ‘job‑interview lures,’” researchers at Silent Push wrote in April, referring to companies such as BlockNovas, SoftGlide, and Angeloper. All three maintained U.S. corporate registrations and LinkedIn job posts that easily passed HR sniff tests.

The FBI seized the BlockNovas domain in April . By then, multiple developers had reportedly sat through fake Zoom calls where they were urged to install custom apps or run scripts. Many complied.

These aren’t simple smash‑and‑grab scams but part of a well‑funded, state‑directed campaign. Since 2017, North Korean hacking groups have stolen over $1.5 billion in crypto, including the $620 million Ronin/Axie Infinity hack.

The stolen assets are routinely funneled through mixers such as Tornado Cash and Sinbad, laundering Pyongyang’s take and ultimately bankrolling its weapons programme, according to the U.S. Treasury.

“For years, North Korea has exploited global remote IT contracting and crypto ecosystems to evade U.S. sanctions and bankroll its weapons programs,” said Sue J. Bai of the DoJ’s National Security Division. On 16 June, her office announced the seizure of $7.74 million in crypto tied to the fake‑IT‑worker scheme.

Crypto developer focus

The targets are carefully selected. The open‑source nature of crypto protocols means that a single engineer, often pseudonymous and globally distributed, may hold commit privileges to critical infrastructure, from smart contracts to bridge protocols.

Electric Capital’s most recent publicly available Developer Report counted about 39,148 new active crypto developers, with total developers down roughly 7% year‑on‑year. Industry analysts say the supply of seasoned maintainers has only tightened, making each compromised developer disproportionately dangerous.

That imbalance is why the hiring pipeline itself has become a cybersecurity battleground. Once a front‑company recruiter gets past HR, engineers, eager for stability in a bearish market, may not spot the red flags in time. In several cases, the attackers even used Calendly links and Google Meet invites that silently redirected victims to attacker‑controlled Zoom look‑alike domains.

The malware stack is advanced and modular. Huntress and Unit 42 have catalogued BeaverTail, InvisibleFerret, and OtterCookie variants, all compiled with the Qt framework for cross‑platform compatibility. Once installed, the tools scrape browser extensions such as MetaMask and Phantom, exfiltrate `wallet.dat` files, and search for terms like “mnemonic” or “seed” in plaintext files.

Yet despite the technical sophistication, law‑enforcement pressure is mounting. The FBI’s domain seizures, the DoJ’s financial forfeitures, and Treasury sanctions on mixers have begun to raise the cost of doing business for Pyongyang’s hackers. The regime, however, remains adaptive.

Each new shell company, recruiter persona, or malware payload arrives wrapped in more convincing packaging. Thanks to generative‑AI tools, even the fake executives in live calls now look and MOVE credibly. DeFi’s trustless systems still rely on a surprisingly small and vulnerable circle of trusted human maintainers.

North Korean crypto target onslaught

Recent CryptoSlate coverage paints a broader canvas of Pyongyang’s crypto onslaught. One year-end analysis found that North Korea-linked groups siphoned $1.34 billion from 47 hacks in 2024, which was a total of 61 % of all crypto stolen that year.

A big slice of that tally came from the $305 million breach of Japan’s DMM Bitcoin, which the FBI says started when a TraderTraitor operative posed as a LinkedIn recruiter and slipped a malicious “coding test” to a Ginco wallet engineer.

The same playbook escalated this February when the bureau attributed a record $1.5 billion Bybit exploit to Lazarus, noting the thieves had already laundered 100,000 ETH through THORChain within days.

North Korean operatives are impersonating venture capitalists, recruiters, and remote IT workers, using AI-generated profiles and deep-fake interviews, to earn salaries, exfiltrate source code, and extort firms in what Microsoft researchers call a “triple-threat” scheme.

In a world where jobs can be remote, trust is digital, and software runs the money, the subsequent state‑sponsored breach may begin not with an exploit but with a handshake.

|Square

Get the BTCC app to start your crypto journey

Get started today Scan to join our 100M+ users