Bitcoin
$91,081 and altcoins continue to rise, but escalating risks shadow their growth as advancing technology paves the way for sophisticated cyber traps. While both the technology and cryptocurrency markets expand, so does the network of crypto fraudsters. Binance‘s Security Director voices crucial warnings.
North Korea: A Hub for Cyber Fraud
North Korea has developed into a sophisticated hub for cyber fraud. Within its borders, hacking is a legitimate profession, offering access to wealth and resources beyond what the average citizen can achieve. Notably, these efforts are driven by motivations that support the nation’s nuclear ambitions, creating a uniquely incentivized group of state-supported hackers.
From a young age, North Korean children aspire to be hackers, viewing this line of work as a prestigious career path nurtured by the state. With no restrictions within their own country, such circumstance fuels North Korea’s reputation as a center for cyber fraud.
While every country has its global notoriety, North Korea’s fame lies in its adept cybercriminals.
Warnings from Binance
Jimmy Su, Binance’s Chief Security Officer, highlights the daily influx of fraudulent resumes from North Korean operatives. He identifies these attackers as the primary threat to crypto companies, especially notorious groups like Lazarus, which have concentrated on crypto over recent years, finding notable success in their campaigns.
These attacks often involve insider cooperation from within the companies they target, enabling major breaches.
Binance meticulously reviews numerous resumes daily. North Korean attackers frequently pass the initial screening, but at the video interview stage, their deception becomes evident. They employ fake videos, deepfakes, voice modulation, and various techniques to deceive human resources personnel.
Data indicates candidates often possess Japanese or Chinese surnames. However, advances in AI now enable these attackers to craft identities resembling any developer. Recently, they’ve even posed as candidates from Europe and the Middle East, using voice changers and video deepfakes during interviews.
Identifying the Deceivers
A key method for detecting them is through their slow internet connections. During interviews, they consistently claim connectivity issues, which are actually delays caused by translation and voice-changing software running simultaneously.
Another telltale sign is their hesitation to touch their face on camera, a request that disrupts deepfake presentations. Numerous undisclosed detection techniques complement this strategy.
Attention Crypto Holders
These attackers employ similar techniques not just to infiltrate jobs but also to recruit victims. If convinced of your significant crypto holdings, they might approach you with a job offer.
For instance, you might receive a DM or mention, followed by an enticing offer and a video interview. They might then lead you to use a previously compromised NPM or direct you to fake sites for renowned APIs, facilitating interaction with a harmful file.
Always remember, if something seems too good to be true, it likely isn’t.


