CoinDesk Podcast Network cover image

UNCHAINED: How North Koreans Infiltrated the Crypto Industry to Fund the Regime

CoinDesk Podcast Network

CHAPTER

Crypto Vulnerabilities and North Korean Infiltration

This chapter explores the vulnerabilities of the crypto industry, particularly in hiring practices that invite exploitation due to insufficient background checks. It discusses the methods used by North Korean agents to infiltrate the sector, including social engineering tactics and the flow of cryptocurrency to the regime. Additionally, the chapter highlights the ease of tracking illicit transactions on blockchain platforms, underscoring the inherent transparency in cryptocurrency operations.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner