How North Koreans Infiltrated the Crypto Industry to Fund the Regime - Ep. 715
Oct 8, 2024
auto_awesome
Sam Kessler, CoinDesk’s deputy managing editor for tech, and Taylor Monahan, co-founder of MyEtherWallet, dive into the alarming infiltration of the crypto industry by North Korean operatives. They discuss how these 'IT' workers use deception to bypass hiring processes and the ethical dilemmas facing companies unknowingly employing them. The conversation highlights security vulnerabilities, red flags to watch for, and personal stories that reveal the unique tactics deployed by these hackers. They also reflect on industry improvements and the ongoing fight to secure crypto protocols.
North Korean operatives have infiltrated the crypto industry using fake identities, significantly funding the regime's missile programs through stolen assets.
The lack of structured recruitment processes in crypto companies contributes to vulnerability, often leading to the hiring of North Korean developers without proper background checks.
Adopting stricter security measures, conducting thorough audits, and ensuring shared control over sensitive funds are essential to mitigate risks from infiltration.
Deep dives
The Threat of North Korean IT Workers
North Korean IT workers have been infiltrating the crypto industry since as early as 2018, often using fake identities and resumes to secure employment within tech companies. These workers help to extract money that ultimately supports the heavily sanctioned regime in North Korea, with a significant portion of this revenue reportedly funneled toward funding missile programs. The breadth of this infiltration is alarming, with around a dozen crypto companies unknowingly employing these North Korean developers, and the operations extend to well-known projects like Cosmos Hub and Yearn Finance. As these infiltrators blend into reputable organizations, they pose a sophisticated threat to the integrity and security of the crypto market.
Hiring Practices and Vulnerabilities
The crypto industry's informal hiring practices contribute to the susceptibility of companies to North Korean infiltration. Many organizations lack structured recruitment processes, often hiring developers based solely on interactions in Discord or GitHub rather than conducting thorough interviews or background checks. This laxity enables North Korean workers to gain positions as trusted employees, sometimes resulting in multiple hires from the same organization. Disturbingly, organizations frequently overlook red flags, like inconsistent personal narratives or odd claims, allowing these infiltrators to integrate seamlessly into their teams.
Tech Exploitation and Social Engineering
North Korean infiltrators primarily utilize social engineering techniques to exploit their positions within companies, gaining trust before launching attacks. Common themes in these hacks include sending malicious links or gaining access to private keys through seemingly innocuous conversations. In a notable example, an employee at a DAO was able to upload exploitative code to redirect funds after gaining access through their previous position. These tactics underscore the urgent need for crypto organizations to scrutinize both their hiring practices and code access to mitigate the associated risks.
Anonymity and Blockchain Transparency
The anonymity that characterizes the crypto industry complicates the process of verifying employee identities, contributing to the challenge of preventing infiltration by North Korean agents. However, blockchain technology provides a robust transparency framework, allowing for the tracing of funds and identifying patterns of illicit activities associated with these infiltrators. Investigators have been able to decipher complex laundering networks and pinpoint the origins and destinations of funds stemming from hack-related activities. This visibility can serve as a valuable tool for organizations to better safeguard themselves against potential threats.
Encouraging Better Security Practices
To combat the ongoing threat of infiltration, crypto protocols need to adopt stricter security measures and conduct audits focused on potential vulnerabilities. The consensus is that organizations should establish rigorous background checks and create a culture of robust procedures around code access and redeploying opportunities for their team members. Moreover, the discussion emphasizes the importance of ensuring that no single employee possesses total control over sensitive funds or administration keys to limit the impact of future breaches. By implementing these practices, companies can diminish their exposure to risks brought on by North Korean infiltrators and other malicious actors.
The crypto community is facing a new kind of threat—North Korean devs are infiltrating crypto companies to steal millions and funnel funds back to the regime in order to bypass sanctions.
In this episode, Sam Kessler, CoinDesk’s deputy managing editor for tech and protocols, and Taylor Monahan, security at MetaMask, explain how North Korea has embedded its operatives into the crypto space, the red flags companies should watch for, and what these hackers are doing once inside crypto firms.
Plus, they share their most interesting stories about how these hackers have gotten hired at crypto companies and the red flags the industry should know about.
Show highlights:
What Sam found in his investigation about North Koreans infiltrating the industry
How Taylor has found that this is a recurring issue
Why Sam and Taylor refer to these infiltrated workers as ‘IT’ workers
The most interesting stories that Sam and Taylor have discovered
The trends in the hiring process that lead to North Koreans being hired and also what the big red flags are
How “easy it is to de-anonymize” addresses and transactions in blockchains
What assets and networks these workers often use to get paid
How, after infiltrating a company, those projects get hacked
How to deal with a situation in which you’ve already hired North Koreans
How to protect a protocol from another type of North Korean hack: by hacking groups
Whether the industry is getting better at security
Visit our website for breaking news, analysis, op-eds, articles to learn about crypto, and much more: unchainedcrypto.com