CoinInsight360.com logo CoinInsight360.com logo
America's Social Casino

Moralis Money
Crypto Potato 2025-04-26 20:26:28

North Korean Hackers Set Up US Shell Companies to Target Crypto Developers: Report

North Korean hackers linked to the state’s notorious Lazarus Group have successfully set up shell companies within the United States to distribute malware to cryptocurrency developers, in a scheme that violates US sanctions and exposes major vulnerabilities in business registration systems. According to Reuters, cybersecurity firm Silent Push revealed that two companies—Blocknovas LLC in New Mexico and Softglide LLC in New York—were formed using falsified names, addresses, and documentation, which helped North Korean actors pose as legitimate employers offering jobs in the crypto industry. A third entity, Angeloper Agency, has also been linked to the campaign but has not been registered in the country. Scam Job Offers, Empty Lots, and Malware Silent Push attributed the operation to a subgroup within the Lazarus Group, a state-sponsored hacking unit operating under North Korea’s Reconnaissance General Bureau. The group is known for its role in high-profile cyber thefts and espionage activities. In this campaign, the hackers used fake professional profiles and job postings to approach developers, primarily on platforms such as LinkedIn. Once contact was made, victims were invited to “interviews” where they were encouraged to download malware disguised as hiring software or technical assessments. Blocknovas was the most active entity, with multiple confirmed victims. Its listed physical address in South Carolina was found to be an empty lot. Meanwhile, Softglide was registered through a Buffalo-based tax preparation service, which further complicated efforts to trace those behind the operations. The malware used included strains previously attributed to North Korean cyber units, capable of data theft, remote access, and further network infiltration. The FBI has seized the Blocknovas domain, with a notice on its website indicating it was used to deceive job seekers and spread malware. North Korean Malware Trap The Lazarus Group has repeatedly exploited fake employment opportunities to deliver malware. For instance, it had launched a cyber campaign called “ClickFix” targeting job seekers in the centralized finance (CeFi) crypto sector. Cybersecurity firm Sekoia recently revealed that the group impersonates companies like Coinbase and Tether to lure marketing and business applicants into fake interviews. One of Lazarus’s biggest crypto thefts came in 2021, when a bogus job offer led to the $625 million Ronin Bridge hack targeting Axie Infinity. The post North Korean Hackers Set Up US Shell Companies to Target Crypto Developers: Report appeared first on CryptoPotato .

https://www.digistore24.com/redir/325658/ceobig/
면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.