Close Menu
  • Home
  • News
  • Cryptocurrency
  • Blockchain
  • Metaverse
  • Policy
  • Opinion
  • Finance
  • All Posts
What's Hot

No Need to Carry Cash! Thailand Announces Travelers Can Use Cryptocurrency for All Expenses, Including Dining and Entertainment

Aug. 18, 2025

LINE Pay Reports Double Growth in Revenue and Gross Profit, Achieving Record High Revenue in July; However, Why Did Net Profit Decline?

Aug. 12, 2025

Are You a Resident of These 5 Counties? Binance Offers Relief with Up to $80 in BNB Directly Credited!

Aug. 7, 2025
Facebook X (Twitter) Instagram
Remix Eth PulseRemix Eth Pulse
Facebook X (Twitter) Instagram
SUBSCRIBE
  • Home
  • News
  • Cryptocurrency
  • Blockchain
  • Metaverse
  • Policy
  • Opinion
  • Finance
  • All Posts
Remix Eth PulseRemix Eth Pulse
Home » The Offer You Received May Be Written by AI! Unveiling North Korean Hackers’ New Scam: Fake Recruitment, Real Cloud Vault Theft
News

The Offer You Received May Be Written by AI! Unveiling North Korean Hackers’ New Scam: Fake Recruitment, Real Cloud Vault Theft

By adminAug. 5, 2025No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
The Offer You Received May Be Written by AI! Unveiling North Korean Hackers' New Scam: Fake Recruitment, Real Cloud Vault Theft
The Offer You Received May Be Written by AI! Unveiling North Korean Hackers' New Scam: Fake Recruitment, Real Cloud Vault Theft
Share
Facebook Twitter LinkedIn Pinterest Email

What Happened?

North Korean hacker groups have begun using high-paying IT freelance job offers as bait to contact employees of target companies through social platforms such as LinkedIn and Telegram. They establish trust in this way, luring victims to execute malicious programs, thus infiltrating corporate internal systems. The ultimate goal of the hackers is the companies’ cloud platforms (such as AWS and Google Cloud). Given that cryptocurrency companies generally adopt a “cloud-first” architecture, the cloud has become a “vault” for storing critical assets. After obtaining initial access, hackers move laterally into the cloud, stealing credentials and searching for key servers that handle transactions to steal cryptocurrencies worth millions of dollars.

Such attacks are not isolated incidents but are orchestrated by state-level organizations comprising thousands of members, resulting in billions of dollars in losses. The hackers’ techniques are continually evolving; they not only know how to bypass security mechanisms but have also started using AI to generate more realistic phishing emails and malicious scripts, significantly increasing the scale and success rate of their threats.

A “Dream Job” Invitation: The Beginning of a Company’s Disaster?

According to the latest research report from Google Cloud and cloud security company Wiz, North Korean hacker organizations are employing social engineering tactics, using high-paying freelancer positions as bait to deceive tech professionals and infiltrate corporate cloud systems, stealing cryptocurrencies worth millions of dollars. Google Cloud points out in its “Cloud Threat Landscape Report for the Second Half of 2025” that the Google Threat Intelligence Group (GTIG) is actively tracking a North Korean hacker group known as “UNC4899.” This group is believed to be affiliated with North Korea’s Reconnaissance General Bureau, and its activities overlap significantly with the publicly reported “TraderTraitor” threat behavior.

The report reveals two real cases that occurred between the third quarter of 2024 and the first quarter of 2025. In these incidents, members of UNC4899 contacted employees from different companies through social platforms such as LinkedIn and Telegram, posing as providers of software development freelance opportunities. After establishing trust through multiple communications with the targets, the hackers would assign tasks, enticing employees to execute malicious software on their workstations. Once an employee falls for the trap, malware such as the downloader “GLASSCANNON” and backdoor programs “PLOTTWIST” and “MAZEWIRE” would be implanted, establishing a connection with the hackers’ command and control center.

Subsequently, hackers could conduct reconnaissance on the victim company’s internal networks, stealing login credentials and ultimately shifting their focus to the company’s cloud environment. The report details one attack targeted at Google Cloud: the hackers used stolen credentials to operate remotely through an anonymous VPN service, successfully locating the server responsible for processing cryptocurrency transactions. Although they encountered obstacles due to multi-factor authentication (MFA) at one point, the hackers eventually discovered an account with administrative privileges. They briefly disabled the MFA requirement for that account, successfully stealing “cryptocurrencies worth millions of dollars,” before quickly re-enabling MFA to cover their tracks, demonstrating highly cunning tactics. Another incident occurred within the AWS cloud environment, also resulting in millions of dollars in cryptocurrency losses.

The Evolution of Malicious Attacks and Their Large Scale

The report from the cybersecurity company Wiz also confirms this threat, indicating that “TraderTraitor” is more of a term encompassing a mode of activity, covering multiple well-known North Korean hacker groups such as “Lazarus Group,” “APT38,” and “BlueNoroff.” These activities can be traced back to 2020 when they began using job bait to lure employees into downloading malicious cryptocurrency applications based on JavaScript and Node.js. Such activities have led to several significant cybersecurity incidents, including the Lazarus Group stealing $620 million worth of assets from the sidechain of the well-known blockchain game Axie Infinity. By 2024, they intensified their focus on cryptocurrency exchanges, resulting in several astonishing thefts, including the $305 million heist from the Japanese exchange DMM Bitcoin and the $1.5 billion loss from a hacking attack on the Bybit exchange at the end of 2024.

The Cloud as the Main Battlefield, AI Fuels Threats

Experts analyze that North Korean hackers focus their targets on cloud systems because companies in the cryptocurrency industry are often newer and tend to adopt a “cloud-first” architecture. Benjamin Read, the Director of Strategic Threat Intelligence at Wiz, states: “We believe TraderTraitor focuses on cloud-related vulnerabilities because the data is there, and so is the money.” The scale of these hacker organizations is astonishing; Read estimates that the related personnel “could number in the thousands,” operating in multiple overlapping teams. In the first half of 2025 alone, they stole a total of $1.6 billion in cryptocurrencies.

“While it’s difficult to arrive at a specific figure, it is evident that the North Korean regime is investing substantial resources.” Jamie Collier, Senior Advisor at Google Threat Intelligence Group, points out that North Korean hackers are pioneers in adopting new technologies, as they have already begun using artificial intelligence (AI) to generate “more persuasive relationship-building emails” and to script malicious content. The use of AI has produced a “multiplier effect” in their capabilities, allowing them to scale their attacks. “When contacting targets, they often impersonate headhunters, journalists, subject matter experts, or university professors,” he adds, noting that they typically communicate back and forth several times to establish rapport with their targets.

According to a report from TRM Labs, 35% of the cryptocurrency funds stolen globally last year flowed to North Korea. Experts unanimously agree that given the continuously evolving techniques and flexible strategies of North Korean hacker organizations, they will remain one of the leading threats in the cryptocurrency space for the foreseeable future. Collier concludes: “We see no signs that they will slow down and expect this expansion to continue.”

References: decrypt, google cloud

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

No Need to Carry Cash! Thailand Announces Travelers Can Use Cryptocurrency for All Expenses, Including Dining and Entertainment

Aug. 18, 2025

LINE Pay Reports Double Growth in Revenue and Gross Profit, Achieving Record High Revenue in July; However, Why Did Net Profit Decline?

Aug. 12, 2025

ETmeta Sports Metaverse Involved in Fraud! ETM Platform Token Used for Fundraising, Main Suspect Liao Wenli Has a Criminal Record for Fraud

Aug. 6, 2025

The Nakamoto Satoshi Statue Encountered an Incident: Horrifically “Dismembered” and Disposed of in a Lake—What Motivated the Perpetrator?

Aug. 5, 2025

PayPal and Wall Street Compete to Launch Stablecoins: What Are the Costs Involved?

Aug. 5, 2025

From “Retail Investor Paradise” to Financial Behemoth: How Robinhood Breaks Through with Web3 and What Strategies Will It Employ in the Second Half?

Aug. 4, 2025
Add A Comment
Leave A Reply Cancel Reply

Don't Miss
Finance

No Need to Carry Cash! Thailand Announces Travelers Can Use Cryptocurrency for All Expenses, Including Dining and Entertainment

Aug. 18, 2025

What Happened?To revitalize tourism, Thailand has launched a new initiative called “TouristDigiPay,”…

LINE Pay Reports Double Growth in Revenue and Gross Profit, Achieving Record High Revenue in July; However, Why Did Net Profit Decline?

Aug. 12, 2025

Are You a Resident of These 5 Counties? Binance Offers Relief with Up to $80 in BNB Directly Credited!

Aug. 7, 2025

Kakao Account Set for Major Transformation: How South Korea’s Largest Online Bank Plans to Change Our Wallets with Stablecoins?

Aug. 7, 2025
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
About Us
About Us

Dive deep into the latest Ethereum and blockchain news to stay updated on the dynamic world of cryptocurrency. Remix Eth Pulse provides comprehensive and professional coverage of the most important events, trends, and analyses in the industry. From technical updates to market trends, we offer a one-stop information platform to help you stay informed and make informed decisions.

Our Picks

No Need to Carry Cash! Thailand Announces Travelers Can Use Cryptocurrency for All Expenses, Including Dining and Entertainment

Aug. 18, 2025

LINE Pay Reports Double Growth in Revenue and Gross Profit, Achieving Record High Revenue in July; However, Why Did Net Profit Decline?

Aug. 12, 2025
Most Popular

What sets Polymarket apart from other online betting platforms in terms of being called in for questioning about its online presidential election predictions?

Dec. 29, 2023

Analyzing Two Major Factors: Matrixport Report Sparks Bitcoin Plunge! Evaluating Whether it is an Opportunistic Move

Jan. 8, 2024
Facebook X (Twitter) Instagram Pinterest
  • Home
  • News
  • Cryptocurrency
  • Blockchain
  • Metaverse
  • Policy
  • Opinion
  • Finance
  • All Posts
© 2025 Remix Eth Pulse All rights reserved.

Type above and press Enter to search. Press Esc to cancel.