아이콘_설치_ios_웹 아이콘_설치_ios_웹 아이콘_안드로이드_웹_설치

After reverse hacking North Korean hackers, I saw how they workRecommended Articles

분석2시간 전업데이트 와이엇
348 0

Odaily Planet Daily에서 편집( @오데일리차이나 ); Translated by Azuma ( @아즈마_에스 )

Editor’s Note: North Korean hackers have always been a major threat to the 암호화폐currency market. In the past, victims and industry security professionals could only infer North Korean hackers’ behavior patterns by reverse engineering related security incidents. However, yesterday, renowned on-chain detective ZachXBT, in a recent tweet, cited an investigation and analysis by a white-hat hacker who reverse-hackered North Korean hackers. This proactive analysis reveals the North Korean hackers’ working methods for the first time , potentially providing positive insights into preemptive security measures for industry projects.

The following is the full text of ZachXBT, compiled by Odaily Planet Daily.

After reverse hacking North Korean hackers, I saw how they workRecommended Articles

An anonymous hacker recently compromised the device of a North Korean IT worker, revealing how a five-person technical team operated over 30 fake identities , using fake government-issued IDs and purchased Upwork and LinkedIn accounts to infiltrate various development projects.

After reverse hacking North Korean hackers, I saw how they workRecommended ArticlesAfter reverse hacking North Korean hackers, I saw how they workRecommended Articles

Investigators obtained Google Drive data, Chrome browser profiles, and device screenshots, which revealed that the team relied heavily on Google tools to coordinate work schedules, assign tasks, and manage budgets, with all communications conducted in English.

After reverse hacking North Korean hackers, I saw how they workRecommended Articles

A weekly report from 2025 revealed the hacker team’s work patterns and the difficulties they encountered. For example, one member complained that they “couldn’t understand the job requirements and didn’t know what to do.” The corresponding solution was to “dedicate ourselves and work harder.”

After reverse hacking North Korean hackers, I saw how they workRecommended ArticlesAfter reverse hacking North Korean hackers, I saw how they workRecommended Articles

Detailed expense records show that their expenditure items include purchasing social security numbers (SSNs), Upwork and LinkedIn account transactions, renting phone numbers, subscribing to AI services, renting computers, and purchasing VPN/proxy services.

After reverse hacking North Korean hackers, I saw how they workRecommended Articles

One spreadsheet detailed the schedule and scripts for meetings attended by the fictitious “Henry Zhang.” The operational process revealed that these North Korean IT workers would first purchase Upwork and LinkedIn accounts, rent computer equipment, and then complete outsourced work using the AnyDesk remote control tool.

After reverse hacking North Korean hackers, I saw how they workRecommended Articles

After reverse hacking North Korean hackers, I saw how they workRecommended Articles

One of the wallet addresses they used to send and receive funds was: 0x78e1a4781d184e7ce6a124dd96e765e2bea96f2c ;

After reverse hacking North Korean hackers, I saw how they workRecommended Articles

After reverse hacking North Korean hackers, I saw how they workRecommended Articles

This address is closely linked to the $680,000 Favrr protocol attack in June 2025. Its CTO and other developers were later confirmed to be North Korean IT workers with forged credentials. This address has also been used to identify North Korean IT personnel involved in other infiltration projects.

After reverse hacking North Korean hackers, I saw how they workRecommended Articles

The team also found the following key evidence in their search records and browser history.

After reverse hacking North Korean hackers, I saw how they workRecommended ArticlesAfter reverse hacking North Korean hackers, I saw how they workRecommended Articles

One might ask, “How can we be sure they are from North Korea?” In addition to all the fraudulent documents detailed above, their search history also shows that they frequently use Google Translate and translate into Korean using a Russian IP.

After reverse hacking North Korean hackers, I saw how they workRecommended ArticlesAfter reverse hacking North Korean hackers, I saw how they workRecommended Articles

Currently, the main challenges for enterprises in preventing North Korean IT workers are as follows:

  • Lack of systematic collaboration: There is a lack of effective information sharing and cooperation mechanisms between platform service providers and private enterprises;
  • Employer oversight: Hiring teams often become defensive after receiving risk warnings, or even refuse to cooperate with investigations;
  • Impact of numerical advantage: Although its technical means are not complicated, it continues to penetrate the global job market with its huge base of job seekers;
  • Funding conversion channels: Payment platforms such as Payoneer are frequently used to convert fiat currency income from development work into cryptocurrency;

I have introduced the indicators that need attention many times. If you are interested, you can check out my historical tweets. I will not repeat them here.

이 글은 인터넷에서 퍼왔습니다: After reverse hacking North Korean hackers, I saw how they workRecommended Articles

Related: SOL ETF approved. Who is playing the role of Solana version of MicroStrategy in the US stock market?

On June 30, the Solana spot staking ETF jointly launched by REX and Osprey was approved and will officially start trading on July 2, this Wednesday. This is the first cryptocurrency ETF in the US market that includes on-chain staking income. After the news was announced, the price of SOL rose by nearly 6%, breaking through $160 in a short period of time and now at $154. Previously, the SOL ETF applications submitted by many well-known institutions have not been approved for a long time, but an unknown company has passed customs first. What is the difference between the ETF launched by REX-Osprey, which was the first to cross the line? In the US stock market, what other companies and assets are betting on the Solana ecosystem and becoming investment…

© 版权声명

상关文章