Close Menu
    Facebook X (Twitter) Instagram
    Monday, May 12
    X (Twitter) Instagram LinkedIn YouTube
    Chain Tech Daily
    Banner
    • Altcoins
    • Bitcoin
    • Crypto
    • Coinbase
    • Litecoin
    • Ethereum
    • Blockchain
    • Lithosphere News Releases
    Chain Tech Daily
    You are at:Home » North Korean Hackers Created U.S.-Based Firms to Target Crypto Devs
    Crypto

    North Korean Hackers Created U.S.-Based Firms to Target Crypto Devs

    James WilsonBy James WilsonApril 25, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Key Takeaways

    •  The malware also targeted developers’ login credentials, which could then be used to gain unauthorized access to larger systems.
    • The entities, Blocknovas LLC and Softglide LLC, were reportedly registered in New Mexico and New York under false identities and addresses

    Two U.S.-based companies allegedly set up by North Korean operatives have been linked to a cyber campaign aimed at stealing sensitive data from cryptocurrency developers, according to findings shared by cybersecurity firm Silent Push. 

    Reportedly, the entities, Blocknovas LLC and Softglide LLC, were reportedly registered in New Mexico and New York under false identities and addresses—moves that violate U.S. sanctions and international restrictions on North Korean business activities.

    The scheme, which U.S. authorities have now disrupted, is attributed to a subgroup within the Lazarus Group, a North Korea-backed hacking organization connected to the country’s Reconnaissance General Bureau, its principal foreign intelligence body. The firms reportedly served as fronts to pose as legitimate employers offering jobs in the cryptocurrency sector, only to distribute malware to applicants during the recruitment process.

    “These attacks utilize fake personas offering job interviews, which lead to sophisticated malware deployments in order to compromise the cryptocurrency wallets of developers,” said Kasey Best, director of threat intelligence at Silent Push. She added that the malware also targeted developers’ login credentials, which could then be used to gain unauthorized access to larger systems.

    The campaign is part of what cybersecurity analysts describe as a broader North Korean effort to generate funds through illicit cyber operations. The malware deployed through the fake job application processes reportedly enabled attackers to harvest private keys and passwords tied to digital wallets.

    According to Silent Push, a third entity, Angeloper Agency, is also linked to the campaign, though it does not appear to have been registered in the U.S.

    The FBI confirmed enforcement action against the domain of Blocknovas, stating on its seizure notice that the website was used “to deceive individuals with fake job postings and distribute malware.” The agency said the seizure was part of a broader operation targeting North Korean actors involved in cybercrime.

    This operation is not isolated. Earlier this month, Manta Network co-founder Kenny Li was reportedly targeted by a phishing attempt using tactics similar to those linked to the Lazarus Group. In that case, malware was delivered via a fake Zoom call invite.

    Additionally, a recent report by GTIG, another cybersecurity firm, found that North Korean IT workers are attempting to secure remote roles in countries such as the United States, Germany, and the United Kingdom using fake resumes and forged documents. These individuals aim to gain access to internal company systems, financial platforms, and sensitive client data.

    The formation of Blocknovas and Softglide in the U.S. marks a rare instance of North Korean operatives successfully registering corporate entities on American soil. The act violates sanctions imposed by the U.S. Treasury’s Office of Foreign Assets Control and the United Nations.

    While the immediate threat from the identified domains has been neutralized, Silent Push has warned that the malware associated with the campaign has already affected some users, compromising their wallets and personal credentials. Investigations into the extent of the operation and any additional entities are underway



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleOndo Finance hits $3B market cap amid SEC tokenization talks
    Next Article SEC to drop lawsuit against Dragonchain
    James Wilson

    Related Posts

    Dow Jones surges 1000 points After Trump announced new U.S. trade deal with China

    May 12, 2025

    token surpasses USDT in market cap, eyes $3 as altseason brews

    May 12, 2025

    Is Mantra about to break out? OM reaches key resistance at $0.45

    May 12, 2025
    Leave A Reply Cancel Reply

    Don't Miss

    Crypto ETFs Set Record With $62,900,000,000 Yearly Flows After Four Straight Green Weeks: CoinShares

    Dow Jones surges 1000 points After Trump announced new U.S. trade deal with China

    token surpasses USDT in market cap, eyes $3 as altseason brews

    Is Mantra about to break out? OM reaches key resistance at $0.45

    About
    About

    ChainTechDaily.com is your daily destination for the latest news and developments in the cryptocurrency space. Stay updated with expert insights and analysis tailored for crypto enthusiasts and investors alike.

    X (Twitter) Instagram YouTube LinkedIn
    Popular Posts

    Crypto ETFs Set Record With $62,900,000,000 Yearly Flows After Four Straight Green Weeks: CoinShares

    May 12, 2025

    Dow Jones surges 1000 points After Trump announced new U.S. trade deal with China

    May 12, 2025

    token surpasses USDT in market cap, eyes $3 as altseason brews

    May 12, 2025
    Lithosphere News Releases

    AGII Deploys Smart Detection Models for On-Chain Infrastructure Resilience

    May 12, 2025

    Colle AI Strengthens Solana Strategy to Scale NFT Development and Liquidity

    May 12, 2025

    Atua AI Expands XRP Cryptocurrency Layers for Financial Automation Scalability

    May 12, 2025
    Copyright © 2025

    Type above and press Enter to search. Press Esc to cancel.